Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978364
|View full text |Cite
|
Sign up to set email alerts
|

A Surfeit of SSH Cipher Suites

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(24 citation statements)
references
References 17 publications
0
23
0
Order By: Relevance
“…The idea is that first the message is encrypted using some passively secure encryption scheme, and then the ciphertext is integrity-protected using the MAC, providing INT security and lifting IND-CPA to IND-CCA security. Many real-world protocols such as TLS [Gut14] and SSH [SSH,ADHP16] can be used with such an AEAD construction. Further, many direct AEAD constructions make use of this design principle as well, though rather implicitly.…”
Section: Etm-structured Aeadmentioning
confidence: 99%
“…The idea is that first the message is encrypted using some passively secure encryption scheme, and then the ciphertext is integrity-protected using the MAC, providing INT security and lifting IND-CPA to IND-CCA security. Many real-world protocols such as TLS [Gut14] and SSH [SSH,ADHP16] can be used with such an AEAD construction. Further, many direct AEAD constructions make use of this design principle as well, though rather implicitly.…”
Section: Etm-structured Aeadmentioning
confidence: 99%
“…The path should be acyclic and its length is denoted . The circuit is then represented as a vector of nodes p [1], . .…”
Section: Modelling Onion Routing Networkmentioning
confidence: 99%
“…By convention, we set p[ + 1] = to indicate the end of a circuit, where the symbol is reserved solely for this purpose and cannot be assigned to any node. For any circuit, we use the terms sending node, receiving node and forwarding nodes to refer respectively to the OP, the path's last node p[ ] and intermediate nodes p [1], . .…”
Section: Modelling Onion Routing Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…However, in 2009 Albrecht et al [APW09] presented a plaintext-recovery attack against CBC mode with random IVs in SSH, a case covered by the proof. In 2016 further attacks were found against a patched version of the CBC mode construction used in OpenSSH [ADHP16]. The attacks of [APW09,ADHP16] exploit the fact that ciphertexts can be delivered as a sequence of fragments, with the attacker being able to observe the behaviour of the receiver as each fragment is delivered.…”
Section: Introductionmentioning
confidence: 99%