Multi-ciphersuite security of the Secure Shell (SSH) protocol


Autoria(s): Bergsma, Florian; Dowling, Benjamin; Kohlar, Florian; Schwenk, Jörg; Stebila, Douglas
Data(s)

03/11/2014

Resumo

The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites. While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/78683/

Publicador

ACM

Relação

http://eprints.qut.edu.au/78683/13/78683.pdf

DOI:10.1145/2660267.2660286

Bergsma, Florian, Dowling, Benjamin, Kohlar, Florian, Schwenk, Jörg, & Stebila, Douglas (2014) Multi-ciphersuite security of the Secure Shell (SSH) protocol. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, Scottsdale, Arizona, pp. 369-381.

http://purl.org/au-research/grants/ARC/DP130104304

ATN-DAAD/Joint Research Co-operation Scheme

EUROPEAN COMMUNITY/ICT-2007-216646

Direitos

Copyright 2014 ACM

Fonte

School of Electrical Engineering & Computer Science; Institute for Future Environments; Science & Engineering Faculty

Palavras-Chave #080303 Computer System Security #080402 Data Encryption #Secure Shell (SSH) #key agility #cross-protocol security #multi-ciphersuite #authenticated and confidential channel establishment
Tipo

Conference Paper