搜索结果: 1-8 共查到“军队指挥学 SSH”相关记录8条 . 查询时间(0.109 秒)
Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH
post-quantum cryptography TLS SSH
2019/7/25
Once algorithms for quantum-resistant key exchange and digital signature schemes are selected by standards bodies, adoption of post-quantum cryptography will depend on progress in integrating those al...
Distributed SSH Key Management with Proactive RSA Threshold Signatures
distributed cryptography implementation RSA secret sharing
2018/5/2
SSH is a security network protocol that uses public key cryptography for client authentication. SSH connections are designed to be run between a client and a server and therefore in enterprise network...
Real-world cryptographic protocols, such as the Transport Layer Security (TLS) and Secure Shell (SSH) protocols, support the negotiation of different combinations of cryptographic algorithms, often kn...
Some Fixes To SSH
Authenticated Encryption SSH CBC
2013/4/18
To against some known attacks to Secure Shell (SSH), I propose some fixes to SSH. The fixes include add a key producer function and revise the MAC.
Analysis of the SSH Key Exchange Protocol
cryptographic protocols / SSH key exchange security proof
2012/3/28
We provide an analysis of the widely deployed SSH protocol's key exchange mechanism. We exploit the design of the SSH key exchange to perform our analysis in a modular manner. First, a shared secret k...
Analysis of the SSH Key Exchange Protocol
cryptographic protocols / SSH key exchange security proof
2011/6/9
We provide an analysis of the widely deployed SSH protocol's key exchange mechanism. We exploit the design of the SSH key exchange to perform our analysis in a modular manner. First, a shared secret k...
Plaintext-Dependent Decryption:A Formal Security Treatment of SSH-CTR
SSH counter mode security proof
2010/3/16
This paper presents a formal security analysis of SSH in counter mode in a security model
that accurately captures the capabilities of real-world attackers, as well as security-relevant features
of ...
Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm
Authenticated Encryption Secure Shell SSH
2009/4/14
The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the
Internet. Unfortunately, the current SSH authenticated encryption mechanism is insecure. In
this paper, we p...