首页> 外文会议>Cryptography and coding >Analysis of the SSH Key Exchange Protocol
【24h】

Analysis of the SSH Key Exchange Protocol

机译:SSH密钥交换协议分析

获取原文
获取原文并翻译 | 示例

摘要

We provide an analysis of the widely deployed SSH protocol's key exchange mechanism. We exploit the design of the SSH key exchange to perform our analysis in a modular manner. First, a shared secret key is obtained via a Diffie-Hellman key exchange. Next, a transform is applied to obtain the application keys used by later stages of SSH. We define models, following well-established paradigms, that clarify the security provided by each type of key. Previously, there has been no formal analysis of the SSH key exchange protocol. We provide a modular proof of security for the SSH shared secret and application keys. We show that although the shared secret key exchanged by SSH is not indistinguishable, the transformation then applied yields indistinguishable application keys. Our proofs use random oracles to model the hash function used within SSH.
机译:我们对广泛部署的SSH协议的密钥交换机制进行了分析。我们利用SSH密钥交换的设计以模块化方式执行分析。首先,通过Diffie-Hellman密钥交换获得共享密钥。接下来,应用转换以获得SSH后续阶段使用的应用程序密钥。我们按照公认的范例定义模型,以阐明每种密钥类型提供的安全性。以前,还没有对SSH密钥交换协议进行正式分析。我们为SSH共享密钥和应用程序密钥提供了模块化的安全性证明。我们显示,尽管通过SSH交换的共享密钥不是不可区分的,但是随后进行的转换产生了不可区分的应用程序密钥。我们的证明使用随机预言来对SSH中使用的哈希函数建模。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号