Analysis of the SSH key exchange protocol

IMACC(2011)

引用 5|浏览0
暂无评分
摘要
We provide an analysis of the widely deployed SSH protocol's key exchange mechanism. We exploit the design of the SSH key exchange to perform our analysis in a modular manner. First, a shared secret key is obtained via a Diffie-Hellman key exchange. Next, a transform is applied to obtain the application keys used by later stages of SSH. We define models, following well-established paradigms, that clarify the security provided by each type of key. Previously, there has been no formal analysis of the SSH key exchange protocol. We provide a modular proof of security for the SSH shared secret and application keys. We show that although the shared secret key exchanged by SSH is not indistinguishable, the transformation then applied yields indistinguishable application keys. Our proofs use random oracles to model the hash function used within SSH.
更多
查看译文
关键词
ssh key exchange,application key,ssh protocol,yields indistinguishable application key,secret key,key exchange mechanism,ssh key exchange protocol,formal analysis,modular manner,diffie-hellman key exchange,ssh,key exchange
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要