메뉴 건너뛰기




Volumn , Issue , 2009, Pages 16-26

Plaintext recovery attacks against SSH

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK CIPHERS; CIPHERTEXTS; PLAINTEXT; PROOF OF CONCEPT; PROVABLE SECURITY; RECOVERY ATTACKS;

EID: 70449625225     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.5     Document Type: Conference Paper
Times cited : (77)

References (27)
  • 1
    • 3142623034 scopus 로고    scopus 로고
    • Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
    • M. Bellare, T. Kohno, and C. Namprempre. Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm. ACM Transactions on Information and Systems Security, 7(2):206-241, 2004.
    • (2004) ACM Transactions on Information and Systems Security , vol.7 , Issue.2 , pp. 206-241
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 3
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • T. Okamoto, editor, LNCS 1976, Springer-Verlag
    • M. Bellare and C. Namprempre. Authenticated Encryption: Relations Among Notions and Analysis of the Generic Composition Paradigm. In T. Okamoto, editor, Proccedings of ASIACRYPT 2000, LNCS 1976, pp. 531-545. Springer-Verlag, 2000.
    • (2000) Proccedings of ASIACRYPT 2000 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 5
    • 84957693225 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on RSA encryption standard PKCS #1
    • H. Krawczyk, editor, LNCS 1462, Springer-Verlag
    • D. Bleichenbacher. Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1. In H. Krawczyk, editor, Proccedings of CRYPTO 1998, LNCS 1462, pp. 1-12. Springer-Verlag, 1998.
    • (1998) Proccedings of CRYPTO 1998 , pp. 1-12
    • Bleichenbacher, D.1
  • 7
    • 35248836120 scopus 로고    scopus 로고
    • Password interception in a SSL/TLS channel
    • In D. Boneh, editor, LNCS 2729, Springer-Verlag
    • B. Canvel, A.P. Hiltgen, S. Vaudenay, and M. Vuagnoux. Password Interception in a SSL/TLS Channel. In D. Boneh, editor, Proccedings of CRYPTO 2003, LNCS 2729, pp. 583-599. Springer-Verlag, 2003.
    • (2003) Proccedings of CRYPTO 2003 , pp. 583-599
    • Canvel, B.1    Hiltgen, A.P.2    Vaudenay, S.3    Vuagnoux, M.4
  • 8
    • 70449682305 scopus 로고    scopus 로고
    • 14/11/, revised 17/11/2008
    • CPNI Vulnerability Advisory. Plaintext Recovery Attack Against SSH. http://www.cpni.gov.uk/Docs/Vulnerability-Advisory-SSH.txt, 14/11/2008 (revised 17/11/2008).
    • (2008) Plaintext Recovery Attack Against SSH
  • 9
    • 0037615414 scopus 로고    scopus 로고
    • available from, 6th Feb
    • W. Dai. An Attack Against SSH2 Protocol. Email to the SECSH Working Group available from ftp://ftp.ietf.org/ietf-mail-archive/secsh/2002-2102.mail, 6th Feb. 2002.
    • (2002) An Attack Against SSH2 Protocol
    • Dai, W.1
  • 10
    • 34548805571 scopus 로고    scopus 로고
    • Attacking the IPsec standards in encryption-only configurations
    • IEEE Computer Society
    • J.-P. Degabriele and K.G. Paterson. Attacking the IPsec Standards in Encryption-only Configurations. In IEEE Symposium on Security and Privacy, pp. 335-349, IEEE Computer Society, 2007.
    • (2007) IEEE Symposium on Security and Privacy , pp. 335-349
    • Degabriele, J.-P.1    Paterson, K.G.2
  • 12
    • 38149093714 scopus 로고    scopus 로고
    • Blockwise-adaptive attackers: Revisiting the (in)security of some provably secure encryption models: CBC, GEM, IACBC
    • In Moti Yung, editor, , LNCS 2442, Springer-Verlag
    • A. Joux, G. Martinet and F. Valette. Blockwise-adaptive attackers: Revisiting the (in)security of some provably secure encryption models: CBC, GEM, IACBC. In Moti Yung, editor, CRYPTO, LNCS 2442, pp. 17-30, Springer-Verlag, 2002.
    • (2002) CRYPTO , pp. 17-30
    • Joux, A.1    Martinet, G.2    Valette, F.3
  • 15
    • 70449691901 scopus 로고    scopus 로고
    • OpenSSH Security, http://www.openssh.org/security.html.
    • OpenSSH Security
  • 16
    • 52149124374 scopus 로고    scopus 로고
    • Immunising CBC mode against padding oracle attacks: A formal security treatment
    • In R. Ostrovsky, R. De Prisco and I. Visconti, editors, LNCS 5229, Springer-Verlag
    • K.G. Paterson and G.J. Watson. Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. In R. Ostrovsky, R. De Prisco and I. Visconti, editors, SCN 2008, LNCS 5229, pp. 340-357, Springer-Verlag, 2008.
    • (2008) SCN 2008 , pp. 340-357
    • Paterson, K.G.1    Watson, G.J.2
  • 17
    • 33746067483 scopus 로고    scopus 로고
    • Cryptography in theory and practice: The case of encryption in IPsec
    • In S. Vaudenay, editor, LNCS 4004, Springer-Verlag
    • K.G. Paterson and A.K.L. Yau. Cryptography in Theory and Practice: The Case of Encryption in IPsec. In S. Vaudenay, editor, Eurocrypt 2006, LNCS 4004, pp. 12-29, Springer- Verlag, 2006.
    • (2006) Eurocrypt 2006 , pp. 12-29
    • Paterson, K.G.1    Yau, A.K.L.2
  • 18
    • 70449661487 scopus 로고    scopus 로고
    • Scapy Homepage, http://www.secdev.org/projects/scapy/.
    • Scapy Homepage
  • 19
    • 70449655094 scopus 로고    scopus 로고
    • SSHFS Homepage, http://fuse.sourceforge.net/sshfs.html.
    • SSHFS Homepage
  • 21
    • 85084161110 scopus 로고    scopus 로고
    • Timing analysis of keystrokes and timing attacks on SSH
    • D. Song, D. Wagner and X. Tian. Timing Analysis of Keystrokes and Timing Attacks on SSH. In 10th USENIX Security Symposium, 2001, http://www.usenix.org/ publications/library/proceedings/sec01/song.html.
    • (2001) 10th USENIX Security Symposium
    • Song, D.1    Wagner, D.2    Tian, X.3
  • 22
    • 70449690630 scopus 로고    scopus 로고
    • 24/11/2008, (revised 12/01/), Unites States Computer Emergency Readiness Team (USCERT)
    • Unites States Computer Emergency Readiness Team (USCERT). Vulnerability Note VU#958563 - SSH CBC vulnerability. http://www.kb.cert.org/vuls/id/958563, 24/11/2008 (revised 12/01/2009).
    • (2009) Vulnerability Note VU#958563 - SSH CBC Vulnerability
  • 23
    • 84947212539 scopus 로고    scopus 로고
    • Security flaws induced by CBC padding - Applications to SSL, IPSEC, WTLS
    • In L.R. Knudsen, editor, LNCS 2332, Springer-Verlag
    • S. Vaudenay. Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... In L.R. Knudsen, editor, Proceedings of EUROCRYPT 2002, LNCS 2332, pp. 534-546, Springer-Verlag, 2002.
    • (2002) Proceedings of EUROCRYPT 2002 , pp. 534-546
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.