Issue No.03 - March (1997 vol.23)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/32.585505
<p><b>Abstract</b>—SSH and AKA are recent, practical protocols for secure connections over an otherwise unprotected network. This paper shows that, despite the use of public-key cryptography, SSH and AKA do not provide authentication as intended. The flaws of SSH and AKA can be viewed as the result of their disregarding a basic principle for the design of sound authentication protocols: the principle that messages should be explicit.</p>
Cryptography, authentication, cryptographic protocols, authentication protocols, security.
MartÍn Abadi, "Explicit Communication Revisited: Two New Attacks on Authentication Protocols", IEEE Transactions on Software Engineering, vol.23, no. 3, pp. 185-186, March 1997, doi:10.1109/32.585505