메뉴 건너뛰기




Volumn 7089 LNCS, Issue , 2011, Pages 356-374

Analysis of the SSH key exchange protocol

Author keywords

key exchange; security proof; SSH

Indexed keywords

A-TRANSFORM; DIFFIE-HELLMAN KEY EXCHANGE; FORMAL ANALYSIS; KEY EXCHANGE; KEY EXCHANGE MECHANISM; KEY EXCHANGE PROTOCOLS; RANDOM ORACLE; SECURITY PROOFS; SHARED SECRETS; SSH; SSH PROTOCOL;

EID: 83755180790     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-25516-8_22     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 1
    • 24144444566 scopus 로고    scopus 로고
    • One-time verifier-based encrypted key exchange
    • Public Key Cryptography - PKC 2005 - 8th International Workshop on Theory and Practice in Public Key Cryptography
    • Abdalla, M., Chevassut, O., Pointcheval, D.: One-Time Verifier-Based Encrypted Key Exchange. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 47-64. Springer, Heidelberg (2005) (Pubitemid 41231325)
    • (2005) Lecture Notes in Computer Science , vol.3386 , pp. 47-64
    • Abdalla, M.1    Chevassut, O.2    Pointcheval, D.3
  • 4
    • 3142623034 scopus 로고    scopus 로고
    • Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
    • Bellare, M., Kohno, T., Namprempre, C.: Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and Systems Security 7(2), 206-241 (2004)
    • (2004) ACM Transactions on Information and Systems Security , vol.7 , Issue.2 , pp. 206-241
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 5
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B. (ed.) EUROCRYPT 2000. Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 6
    • 84945119254 scopus 로고
    • Entity Authentication and Key Distribution
    • Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84949230533 scopus 로고    scopus 로고
    • Key Agreement Protocols and Their Security Analysis
    • Cryptography and Coding
    • Blake-Wilson, S., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30-45. Springer, Heidelberg (1997) (Pubitemid 128005797)
    • (1997) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1355 , pp. 30-45
    • Blake-Wilson, S.1    Johnson, D.2    Menezes, A.3
  • 9
    • 84957001208 scopus 로고    scopus 로고
    • Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques
    • Security Protocols
    • Blake-Wilson, S., Menezes, A.: Entity Authentication and Authenticated Key Transport Protocols Employing Asymmetric Techniques. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 137-158. Springer, Heidelberg (1998) (Pubitemid 128023886)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1361 , pp. 137-158
    • Blake-Wilson, S.1    Menezes, A.2
  • 10
    • 50849127145 scopus 로고    scopus 로고
    • Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
    • Boyd, C. (ed.) ASIACRYPT 2001. Springer, Heidelberg
    • Bresson, E., Chevassut, O., Pointcheval, D.: Provably Authenticated Group Diffie-Hellman Key Exchange - the Dynamic Case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290-309. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 290-309
    • Bresson, E.1    Chevassut, O.2    Pointcheval, D.3
  • 11
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Canetti, R., Krawczyk, H.: Analysis of Key Exchange Protocols and their use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453-474. Springer, Heidelberg (2001) (Pubitemid 33275848)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 12
    • 84947232363 scopus 로고    scopus 로고
    • Universally Composable Notions of Key Exchange and Secure Channels
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Canetti, R., Krawczyk, H.: Universally Composable Notions of Key Exchange and Secure Channels. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 337-351. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 337-351
    • Canetti, R.1    Krawczyk, H.2
  • 18
    • 73849111632 scopus 로고    scopus 로고
    • The TLS handshake protocol: A modular analysis
    • Morrissey, P., Smart, N., Warinschi, B.: The TLS handshake protocol: A modular analysis. Journal of Cryptology 23(2), 187-223 (2010)
    • (2010) Journal of Cryptology , vol.23 , Issue.2 , pp. 187-223
    • Morrissey, P.1    Smart, N.2    Warinschi, B.3
  • 19
    • 78649873528 scopus 로고    scopus 로고
    • One-Time-Password-Authenticated Key Exchange
    • Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. Springer, Heidelberg
    • Paterson, K.G., Stebila, D.: One-Time-Password-Authenticated Key Exchange. In: Steinfeld, R., Hawkes, P. (eds.) ACISP 2010. LNCS, vol. 6168, pp. 264-281. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6168 , pp. 264-281
    • Paterson, K.G.1    Stebila, D.2
  • 20
    • 77954650216 scopus 로고    scopus 로고
    • Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Paterson, K., Watson, G.: Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 345-361. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 345-361
    • Paterson, K.1    Watson, G.2
  • 22
    • 33845272477 scopus 로고    scopus 로고
    • The secure shell (SSH) protocol architecture
    • Ylonen, T., Lonvick, C.: The secure shell (SSH) protocol architecture (2006) RFC 4251
    • (2006) RFC , vol.4251
    • Ylonen, T.1    Lonvick, C.2
  • 23
    • 72049108240 scopus 로고    scopus 로고
    • The secure shell (SSH) authentication protocol
    • Ylonen, T., Lonvick, C.: The secure shell (SSH) authentication protocol (2006) RFC 4252
    • (2006) RFC , vol.4252
    • Ylonen, T.1    Lonvick, C.2
  • 24
    • 51249100696 scopus 로고    scopus 로고
    • The secure shell (SSH) transport layer protocol
    • Ylonen, T., Lonvick, C.: The secure shell (SSH) transport layer protocol (2006) RFC 4253
    • (2006) RFC , vol.4253
    • Ylonen, T.1    Lonvick, C.2
  • 25
    • 33846448045 scopus 로고    scopus 로고
    • The secure shell (SSH) connection protocol
    • Ylonen, T., Lonvick, C.: The secure shell (SSH) connection protocol (2006) RFC 4254
    • (2006) RFC , vol.4254
    • Ylonen, T.1    Lonvick, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.