Title
Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm
Abstract
The secure shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In this paper, we propose several fixes to the SSH protocol and, using techniques from modern cryptography, we prove that our modified versions of SSH meet strong new chosen-ciphertext privacy and integrity requirements. Furthermore, our proposed fixes will require relatively little modification to the SSH protocol and to SSH implementations. We believe that our new notions of privacy and integrity for encryption schemes with stateful decryption algorithms will be of independent interest.
Year
DOI
Venue
2002
10.1145/996943.996945
ACM Transactions on Information and System Security (TISSEC)
Keywords
DocType
Volume
authenticated encryption,strong new chosen-ciphertext privacy,Encode-then-Encrypt-and-MAC paradigm,integrity requirement,new notion,case study,SSH protocol,popular cryptographic protocol,SSH implementation,independent interest,secure shell,current SSH,encryption mechanism,stateful decryption,encryption scheme,security proofs
Journal
7
Issue
Citations 
PageRank 
2
50
2.53
References 
Authors
24
3
Name
Order
Citations
PageRank
Mihir Bellare1164371481.16
Tadayoshi Kohno24540317.26
Chanathip Namprempre360028.88