The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—SSH and AKA are recent, practical protocols for secure connections over an otherwise unprotected network. This paper shows that, despite the use of public-key cryptography, SSH and AKA do not provide authentication as intended. The flaws of SSH and AKA can be viewed as the result of their disregarding a basic principle for the design of sound authentication protocols: the principle that messages should be explicit.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
MartÍn Abadi, "Explicit Communication Revisited: Two New Attacks on Authentication Protocols", IEEE Transactions on Software Engineering, vol. 23, no. , pp. 185-186, March 1997, doi:10.1109/32.585505
81 ms
(Ver 3.3 (11022016))