Loading...
Please wait, while we are loading the content...
Similar Documents
Breaking and provably repairing the ssh authenticated encryption scheme: a case study of the encode-then-encrypt-and-mac paradigm (2003).
| Content Provider | CiteSeerX |
|---|---|
| Author | Namprempre, Chanathip Kohno, Tadayoshi Bellare, Mihir |
| Abstract | The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In this paper, we propose several fixes to the SSH protocol and, using techniques from modern cryptography, we prove that our modified versions of SSH meet strong new chosen-ciphertext privacy and integrity requirements. Furthermore, our proposed fixes will require relatively little modification to the SSH protocol and to SSH implementations. We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest. |
| File Format | |
| Publisher Date | 2003-01-01 |
| Access Restriction | Open |
| Subject Keyword | Stateful Decryption Algorithm Modified Version Current Ssh Ssh Implementation Ssh Protocol Little Modification Popular Cryptographic Protocol Independent Interest New Notion Encode-then-encrypt-and-mac Paradigm Encryption Scheme Modern Cryptography Integrity Requirement Ssh Authenticated Encryption Scheme Several Fix Secure Shell Encryption Mechanism Case Study |
| Content Type | Text |