메뉴 건너뛰기




Volumn , Issue , 2014, Pages 369-381

Multi-ciphersuite security of the secure shell (SSH) protocol

Author keywords

Authenticated and confidential channel establishment; Cross protocol security; Key agility; Multiciphersuite; Secure Shell (SSH)

Indexed keywords

NETWORK SECURITY;

EID: 84910641096     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2660267.2660286     Document Type: Conference Paper
Times cited : (26)

References (40)
  • 3
    • 84957714601 scopus 로고
    • Robustness principles for public key protocols
    • D. Coppersmith, editor 963 of LNCS, Springer, Aug
    • R. J. Anderson and R. M. Needham. Robustness principles for public key protocols. In D. Coppersmith, editor, CRYPTO'95, volume 963 of LNCS, pages 236-247. Springer, Aug. 1995.
    • (1995) CRYPTO'95 , pp. 236-247
    • Anderson, R.J.1    Needham, R.M.2
  • 6
    • 3142623034 scopus 로고    scopus 로고
    • Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm
    • May
    • M. Bellare, T. Kohno, and C. Namprempre. Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the encode-then-encrypt-and-MAC paradigm. ACM Transactions on Information and System Security, 7(2):206-241, May 2004. Extended abstract published in ACM CCS 2002.
    • (2004) ACM Transactions on Information and System Security , vol.7 , Issue.2 , pp. 206-241
    • Bellare, M.1    Kohno, T.2    Namprempre, C.3
  • 7
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • D. R. Stinson, editor 773 of LNCS, Springer, Aug
    • M. Bellare and P. Rogaway. Entity authentication and key distribution. In D. R. Stinson, editor, CRYPTO'93, volume 773 of LNCS, pages 232-249. Springer, Aug. 1993.
    • (1993) CRYPTO'93 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 84905401236 scopus 로고    scopus 로고
    • Proving the tls handshake secure (as it is
    • J. A. Garay and R. Gennaro, editors 8617 of LNCS, Springer
    • K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P.-Y. Strub, and S. Zanella-Béguelin. Proving the TLS handshake secure (as it is). In J. A. Garay and R. Gennaro, editors, CRYPTO 2014, volume 8617 of LNCS, pages 235-255. Springer, 2014.
    • (2014) CRYPTO 2014 , pp. 235-255
    • Bhargavan, K.1    Fournet, C.2    Kohlweiss, M.3    Pironti, A.4    Strub, P.-Y.5    Zanella-Béguelin, S.6
  • 12
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press, Oct
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In 42nd FOCS, pages 136-145. IEEE Computer Society Press, Oct. 2001.
    • (2001) 42nd FOCS , pp. 136-145
    • Canetti, R.1
  • 13
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • B. Pfitzmann, editor 2045 of LNCS, Springer, May 2001
    • R. Canetti and H. Krawczyk. Analysis of key-exchange protocols and their use for building secure channels. In B. Pfitzmann, editor, EUROCRYPT 2001, volume 2045 of LNCS, pages 453-474. Springer, May 2001.
    • (2001) EUROCRYPT , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 17
    • 84888996809 scopus 로고    scopus 로고
    • On the security of TLS renegotiation
    • A.-R. Sadeghi, V. D. Gligor, and M. Yung, editors ACM Press, Nov
    • F. Giesen, F. Kohlar, and D. Stebila. On the security of TLS renegotiation. In A.-R. Sadeghi, V. D. Gligor, and M. Yung, editors, ACM CCS 13, pages 387-398. ACM Press, Nov. 2013.
    • (2013) ACM CCS 13 , pp. 387-398
    • Giesen, F.1    Kohlar, F.2    Stebila, D.3
  • 19
    • 84910631271 scopus 로고    scopus 로고
    • RSA key exchange for the secure shell (ssh) transport layer protocol
    • Mar
    • B. Harris. RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol. RFC 4432 (Proposed Standard), Mar. 2006.
    • (2006) RFC 4432 (Proposed Standard
    • Harris, B.1
  • 20
    • 84865461888 scopus 로고    scopus 로고
    • On the security of TLS-DHE in the standard model
    • R. Safavi-Naini and R. Canetti, editors 7417 of LNCS, Springer, Aug
    • T. Jager, F. Kohlar, S. Schäge, and J. Schwenk. On the security of TLS-DHE in the standard model. In R. Safavi-Naini and R. Canetti, editors, CRYPTO 2012, volume 7417 of LNCS, pages 273-293. Springer, Aug. 2012.
    • (2012) CRYPTO 2012 , pp. 273-293
    • Jager, T.1    Kohlar, F.2    Schäge, S.3    Schwenk, J.4
  • 22
    • 84937433296 scopus 로고    scopus 로고
    • On the security of rsa encryption in tls
    • M. Yung, editor 2442 of LNCS, Springer, Aug. 2002
    • J. Jonsson and B. S. Kaliski Jr. On the security of RSA encryption in TLS. In M. Yung, editor, CRYPTO 2002, volume 2442 of LNCS, pages 127-142. Springer, Aug. 2002.
    • CRYPTO 2002 , pp. 127-142
    • Jonsson, J.1    Kaliski, B.S.2
  • 23
    • 84956985093 scopus 로고    scopus 로고
    • Protocol interactions and the chosen protocol attack
    • B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors 1361 of LNCS, Springer
    • J. Kelsey, B. Schneier, and D. Wagner. Protocol interactions and the chosen protocol attack. In B. Christianson, B. Crispo, M. Lomas, and M. Roe, editors, Proc. 5th International Workshop on Security Protocols, volume 1361 of LNCS, pages 91-104. Springer, 1997.
    • (1997) Proc. 5th International Workshop on Security Protocols , pp. 91-104
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 25
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic extraction and key derivation: The HKDF scheme
    • T. Rabin, editor 6223 of LNCS, Springer, Aug
    • H. Krawczyk. Cryptographic extraction and key derivation: The HKDF scheme. In T. Rabin, editor, CRYPTO 2010, volume 6223 of LNCS, pages 631-648. Springer, Aug. 2010.
    • (2010) CRYPTO 2010 , pp. 631-648
    • Krawczyk, H.1
  • 26
    • 84884484198 scopus 로고    scopus 로고
    • On the security of the tls protocol: A systematic analysis
    • R. Canetti and J. A. Garay, editors 8042 of LNCS, Springer, Aug
    • H. Krawczyk, K. G. Paterson, and H. Wee. On the security of the TLS protocol: A systematic analysis. In R. Canetti and J. A. Garay, editors, CRYPTO 2013, Part I, volume 8042 of LNCS, pages 429-448. Springer, Aug. 2013.
    • (2013) CRYPTO 2013, Part i , pp. 429-448
    • Krawczyk, H.1    Paterson, K.G.2    Wee, H.3
  • 27
    • 38149012093 scopus 로고    scopus 로고
    • Stronger security of authenticated key exchange
    • W. Susilo, J. K. Liu, and Y. Mu, editors 4784 of LNCS, Springer, Nov. 2007
    • B. A. LaMacchia, K. Lauter, and A. Mityagin. Stronger security of authenticated key exchange. In W. Susilo, J. K. Liu, and Y. Mu, editors, ProvSec 2007, volume 4784 of LNCS, pages 1-16. Springer, Nov. 2007.
    • ProvSec 2007 , pp. 1-16
    • Lamacchia, B.A.1    Lauter, K.2    Mityagin, A.3
  • 28
    • 84869409533 scopus 로고    scopus 로고
    • A cross-protocol attack on the TLS protocol
    • T. Yu, G. Danezis, and V. D. Gligor, editors ACM Press, Oct
    • N. Mavrogiannopoulos, F. Vercauteren, V. Velichkov, and B. Preneel. A cross-protocol attack on the TLS protocol. In T. Yu, G. Danezis, and V. D. Gligor, editors, ACM CCS 12, pages 62-72. ACM Press, Oct. 2012.
    • (2012) ACM CCS 12 , pp. 62-72
    • Mavrogiannopoulos, N.1    Vercauteren, F.2    Velichkov, V.3    Preneel, B.4
  • 29
    • 58349099301 scopus 로고    scopus 로고
    • A modular security analysis of the TLS handshake protocol
    • J. Pieprzyk, editor 5350 of LNCS, Springer, Dec. 2008
    • P. Morrissey, N. P. Smart, and B. Warinschi. A modular security analysis of the TLS handshake protocol. In J. Pieprzyk, editor, ASIACRYPT 2008, volume 5350 of LNCS, pages 55-73. Springer, Dec. 2008.
    • ASIACRYPT 2008 , pp. 55-73
    • Morrissey, P.1    Smart, N.P.2    Warinschi, B.3
  • 30
    • 77954650216 scopus 로고    scopus 로고
    • Plaintext-dependent decryption: A formal security treatment of ssh-ctr
    • H. Gilbert, editor 6110 of LNCS, Springer, May 2010
    • K. G. Paterson and G. J. Watson. Plaintext-dependent decryption: A formal security treatment of SSH-CTR. In H. Gilbert, editor, EUROCRYPT 2010, volume 6110 of LNCS, pages 345-361. Springer, May 2010.
    • EUROCRYPT 2010 , pp. 345-361
    • Paterson, K.G.1    Watson, G.J.2
  • 31
    • 38049131119 scopus 로고    scopus 로고
    • Formalizing human ignorance
    • P. Q. Nguyen, editor 4341 of LNCS, Springer, Sept
    • P. Rogaway. Formalizing human ignorance. In P. Q. Nguyen, editor, Progress in Cryptology-VIETCRYPT 06, volume 4341 of LNCS, pages 211-228. Springer, Sept. 2006.
    • (2006) Progress in Cryptology-VIETCRYPT 06 , pp. 211-228
    • Rogaway, P.1
  • 32
    • 85014852507 scopus 로고    scopus 로고
    • Elliptic curve algorithm integration in the secure shell transport layer
    • Dec
    • D. Stebila and J. Green. Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer. RFC 5656 (Proposed Standard), Dec. 2009.
    • (2009) RFC 5656 (Proposed Standard
    • Stebila, D.1    Green, J.2
  • 34
    • 0033605501 scopus 로고    scopus 로고
    • Inter-protocol interleaving attacks on some authentication and key distribution protocols
    • March
    • W.-G. Tzeng and C.-M. Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Information Processing Letters, 69(6):297-302, March 1999.
    • (1999) Information Processing Letters , vol.69 , Issue.6 , pp. 297-302
    • Tzeng, W.-G.1    Hu, C.-M.2
  • 40
    • 33846453163 scopus 로고    scopus 로고
    • The secure shell (ssh) transport layer protocol
    • Jan. Updated by RFC 6668
    • T. Ylonen and C. Lonvick. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253 (Proposed Standard), Jan. 2006. Updated by RFC 6668.
    • (2006) RFC 4253 (Proposed Standard
    • Ylonen, T.1    Lonvick, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.