In Charm 0.43, any two users can collude to achieve the ability to decrypt YCT14 data.
References
Link | Resource |
---|---|
https://www2.hci.uni-hannover.de/papers/Tan2019.pdf | Technical Description Third Party Advisory |
https://github.com/JHUISI/charm/issues/276 | Issue Tracking Third Party Advisory |
https://github.com/JHUISI/charm/blob/dev/charm/schemes/abenc/abenc_yct14.py | Third Party Advisory |
https://eprint.iacr.org/2020/460 | Third Party Advisory |
Configurations
Information
Published : 2021-07-30 07:15
Updated : 2021-08-09 11:35
NVD link : CVE-2021-37588
Mitre link : CVE-2021-37588
JSON object : View
CWE
CWE-326
Inadequate Encryption Strength
Products Affected
jhu
- charm