The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (1997 vol.23)
pp: 185-186
ABSTRACT
<p><b>Abstract</b>—SSH and AKA are recent, practical protocols for secure connections over an otherwise unprotected network. This paper shows that, despite the use of public-key cryptography, SSH and AKA do not provide authentication as intended. The flaws of SSH and AKA can be viewed as the result of their disregarding a basic principle for the design of sound authentication protocols: the principle that messages should be explicit.</p>
INDEX TERMS
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
CITATION
MartÍn Abadi, "Explicit Communication Revisited: Two New Attacks on Authentication Protocols", IEEE Transactions on Software Engineering, vol.23, no. 3, pp. 185-186, March 1997, doi:10.1109/32.585505
6 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool