Skip to content

Commit 7ba3f11

Browse files
samruebymairaw
andauthored
Added link in AesManaged to article warning of timing vulnerabilities… (#2609)
* Added link in AesManaged to article warning of timing vulnerabilities with CBC-mode symmetric decryption using padding. * Update xml/System.Security.Cryptography/AesManaged.xml Co-Authored-By: Maira Wenzel <[email protected]> Co-authored-by: Maira Wenzel <[email protected]>
1 parent ed28e01 commit 7ba3f11

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

xml/System.Security.Cryptography/AesManaged.xml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,8 @@
4242
> [!NOTE]
4343
> If the Windows security policy setting for Federal Information Processing Standards (FIPS)-compliant algorithms is enabled, using this algorithm throws a <xref:System.Security.Cryptography.CryptographicException>.
4444
45-
45+
> [!NOTE]
46+
> Microsoft believes that it's no longer safe to decrypt data encrypted with the Cipher-Block-Chaining (CBC) mode of symmetric encryption (which is the default value of the <xref:System.Security.Cryptography.AesManaged.Mode> property) when verifiable padding has been applied without first ensuring the integrity of the ciphertext, except for very specific circumstances. For more information, see [Timing vulnerabilities with CBC-mode symmetric decryption using padding](~/docs/standard/security/vulnerabilities-cbc-mode.md).
4647
4748
## Examples
4849
The following example demonstrates how to encrypt and decrypt sample data using the <xref:System.Security.Cryptography.AesManaged> class.

0 commit comments

Comments
 (0)