The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—SSH and AKA are recent, practical protocols for secure connections over an otherwise unprotected network. This paper shows that, despite the use of public-key cryptography, SSH and AKA do not provide authentication as intended. The flaws of SSH and AKA can be viewed as the result of their disregarding a basic principle for the design of sound authentication protocols: the principle that messages should be explicit.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.

M. Abadi, "Explicit Communication Revisited: Two New Attacks on Authentication Protocols," in IEEE Transactions on Software Engineering, vol. 23, no. , pp. 185-186, 1997.
94 ms
(Ver 3.3 (11022016))