How To Break XML En­cryp­ti­on

Tibor Jager, Juraj So­mo­rovs­ky

In Pro­cee­dings of the 18th ACM Con­fe­rence on Com­pu­ter and Com­mu­ni­ca­ti­ons Se­cu­ri­ty (CCS), 2011.


Ab­stract

XML En­cryp­ti­on was stan­dar­di­zed by W3C in 2002, and is im­ple­men­ted in XML frame­works of major com­mer­ci­al and open-sour­ce or­ga­niza­t­i­ons like Apa­che, red­hat, IBM, and Micro­soft. It is em­ploy­ed in a large num­ber of major web- based ap­p­li­ca­ti­ons, ran­ging from busi­ness com­mu­ni­ca­ti­ons, e-com­mer­ce, and fi­nan­ci­al ser­vices over health­ca­re ap­p­li­ca­ti­ons to go­vern­men­tal and mi­li­ta­ry in­fra­struc­tu­res.

In this work we de­scri­be a prac­tical at­tack on XML En­cryp­ti­on, which al­lows to de­crypt a ci­pher­text by sen­ding re­la­ted ci­pher­texts to a Web Ser­vice and eva­lua­ting the ser­ver re­s­pon­se. We show that an ad­versa­ry can de­crypt a ci­pher­text by per­for­ming only 14 re­quests per plain­text byte on aver­a­ge. This poses a se­rious and truly prac­tical se­cu­ri­ty thre­at on all cur­rent­ly used im­ple­men­ta­ti­ons of XML En­cryp­ti­on.

In a sense the at­tack can be seen as a ge­ne­ra­liza­t­i­on of pad­ding ora­cle at­tacks (Vau­den­ay, Eu­ro­crypt 2002). It ex­ploits a subt­le cor­re­la­ti­on bet­ween the block ci­pher mode of ope­ra­ti­on, the cha­rac­ter en­co­ding of en­cryp­ted text, and the re­s­pon­se be­ha­viour of a Web Ser­vice if an XML mes­sa­ge can­not be par­sed cor­rect­ly.

The di­stri­bu­ted do­cu­ment has been pro­vi­ded by the cont­ri­bu­ting aut­hors as a means to en­su­re ti­me­ly dis­se­mi­na­ti­on of scho­lar­ly and tech­ni­cal work on a non­com­mer­ci­al basis. Co­py­right and all rights the­r­ein are main­tained by the aut­hors or by other co­py­right hol­ders, not­wi­th­stan­ding that they have of­fe­red their works here elec­tro­ni­cal­ly. It is un­ders­tood that all per­sons co­py­ing this in­for­ma­ti­on will ad­he­re to the terms and cons­traints in­vo­ked by each aut­hor's co­py­right. These works may not be re­pos­ted wi­thout the ex­pli­cit per­mis­si­on of the co­py­right hol­der.

[pdf]

Tags: Pad­ding Ora­cle At­tacks, Web Ser­vices, XML En­cryp­ti­on