Issue No. 03 - March (1997 vol. 23)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/32.585505
<p><b>Abstract</b>—SSH and AKA are recent, practical protocols for secure connections over an otherwise unprotected network. This paper shows that, despite the use of public-key cryptography, SSH and AKA do not provide authentication as intended. The flaws of SSH and AKA can be viewed as the result of their disregarding a basic principle for the design of sound authentication protocols: the principle that messages should be explicit.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
M. Abadi, "Explicit Communication Revisited: Two New Attacks on Authentication Protocols," in IEEE Transactions on Software Engineering, vol. 23, no. , pp. 185-186, 1997.