Systematic Analysis of the POODLE Attack on SSL 3.0 with AES-CBC and Evaluation of Countermeasures

Authors

  • Anja Klančar Univerza v Ljubljani, Fakulteta za računalništvo in informatiko
  • Matevž Pesek Univerza v Ljubljani, Fakulteta za računalništvo in informatiko

DOI:

https://doi.org/10.31449/upinf.266

Keywords:

cryptography, cryptographic attack, POODLE, SSL

Abstract

In this paper, we examine the POODLE (Padding Oracle On Downgraded Legacy Encryption) cryptographic attack, which exploits a vulnerability in the SSL 3.0 protocol when AES encryption in CBC mode is used together with the MAC-then-encrypt approach. We first present the theoretical background of the attack, including the role of padding, block chaining, and the distinction between different types of decryption errors. We then show how an attacker can gradually recover data by observing server responses without knowing the secret key. In the practical part, we describe an implementation of AES-CBC in the Java programming language, the execution of the POODLE attack, and an analysis of the conditions that enable its success. Particular attention is given to two defense strategies: unifying error responses so that the server does not reveal the type of error, and using the encrypt-then-MAC approach, which prevents the attack before any data is decrypted. The results show that POODLE is a consequence of an inappropriate combination of cryptographic mechanisms and that the security of such systems also depends strongly on the correct implementation of countermeasures.

Author Biographies

  • Anja Klančar, Univerza v Ljubljani, Fakulteta za računalništvo in informatiko
    Anja Klančar je študentka na Fakulteti za računalništvo in informatiko Univerze v Ljubljani. Zanimajo jo področja kriptografije, kibernetske varnosti in umetne inteligence.
  • Matevž Pesek, Univerza v Ljubljani, Fakulteta za računalništvo in informatiko
    Matevž Pesek je izredni profesor in raziskovalec na Fakulteti za računalništvo in informatiko Univerze v Ljubljani, kjer je diplomiral (2012) in doktoriral (2018). Od leta 2009 je član Laboratorija za računalniško grafiko in multimedije. Od leta 2024 izvaja predmeta Varnost programov in Varnost sistemov, kjer se raziskovalno ukvarja s poučevanjem konceptov in organizacijo dogodkov s področja računalniške varnosti.

Published

2026-05-15

Issue

Section

Scientific articles

How to Cite

[1]
2026. Systematic Analysis of the POODLE Attack on SSL 3.0 with AES-CBC and Evaluation of Countermeasures. Applied Informatics. 34, 1 (May 2026). DOI:https://doi.org/10.31449/upinf.266.

Most read articles by the same author(s)

1 2 > >>