From 18678467df93ec32a22289a138dc5f54e28ddbda Mon Sep 17 00:00:00 2001 From: Sam Rueby Date: Mon, 17 Jun 2019 14:00:14 -0400 Subject: [PATCH 1/2] Added link in AesManaged to article warning of timing vulnerabilities with CBC-mode symmetric decryption using padding. --- xml/System.Security.Cryptography/AesManaged.xml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/xml/System.Security.Cryptography/AesManaged.xml b/xml/System.Security.Cryptography/AesManaged.xml index 7a5d6043234..16436bdd6e7 100644 --- a/xml/System.Security.Cryptography/AesManaged.xml +++ b/xml/System.Security.Cryptography/AesManaged.xml @@ -41,7 +41,8 @@ > [!NOTE] > If the Windows security policy setting for Federal Information Processing Standards (FIPS)-compliant algorithms is enabled, using this algorithm throws a . - +> [!NOTE] +> Microsoft believes that it's no longer safe to decrypt data encrypted with the Cipher-Block-Chaining (CBC) mode of symmetric encryption (which is the default Mode for this class) when verifiable padding has been applied without first ensuring the integrity of the ciphertext, except for very specific circumstances. [Read more about timing vulnerabilities with CBC-mode symmetric decryption using padding.](/standard/security/vulnerabilities-cbc-mode) ## Examples The following example demonstrates how to encrypt and decrypt sample data using the class. @@ -747,4 +748,4 @@ - \ No newline at end of file + From d5c2de31bdf76de71aa7b84354b8b6e23d53343f Mon Sep 17 00:00:00 2001 From: Sam Rueby Date: Wed, 19 Jun 2019 17:08:05 -0400 Subject: [PATCH 2/2] Update xml/System.Security.Cryptography/AesManaged.xml Co-Authored-By: Maira Wenzel --- xml/System.Security.Cryptography/AesManaged.xml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xml/System.Security.Cryptography/AesManaged.xml b/xml/System.Security.Cryptography/AesManaged.xml index 16436bdd6e7..0a59466018d 100644 --- a/xml/System.Security.Cryptography/AesManaged.xml +++ b/xml/System.Security.Cryptography/AesManaged.xml @@ -42,7 +42,7 @@ > If the Windows security policy setting for Federal Information Processing Standards (FIPS)-compliant algorithms is enabled, using this algorithm throws a . > [!NOTE] -> Microsoft believes that it's no longer safe to decrypt data encrypted with the Cipher-Block-Chaining (CBC) mode of symmetric encryption (which is the default Mode for this class) when verifiable padding has been applied without first ensuring the integrity of the ciphertext, except for very specific circumstances. [Read more about timing vulnerabilities with CBC-mode symmetric decryption using padding.](/standard/security/vulnerabilities-cbc-mode) +> Microsoft believes that it's no longer safe to decrypt data encrypted with the Cipher-Block-Chaining (CBC) mode of symmetric encryption (which is the default value of the property) when verifiable padding has been applied without first ensuring the integrity of the ciphertext, except for very specific circumstances. For more information, see [Timing vulnerabilities with CBC-mode symmetric decryption using padding](~/docs/standard/security/vulnerabilities-cbc-mode.md). ## Examples The following example demonstrates how to encrypt and decrypt sample data using the class.