Hacker News new | past | comments | ask | show | jobs | submit login

So if the length of the resulting message is leaking information, salt it by adding some extra random bits to the end to increase the length by a random amount.



Which may be useful, unless you can use a padding oracle attack or timing attack, or you're using something stupid like ECB mode, or you aren't authenticating your ciphertext.

In general, it is safe to assume that whatever countermeasure you are thinking of has already been defeated by an attacker, unless you have researched for a really long time and found no possible alternative.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: