Crypto misuse study for CCA


CPA analysis paper:

Examples of misuse of CCA implementation:

Importance of the CCA model

Our Approach

For public-key encryption, check whether a proper padding scheme (e.g., OAEP) is applied.

For private-key encryption, check whether authentication encryption (e.g., GCM mode or CBC mode with MAC) is properly implemented.