Loading web-font TeX/Main/Regular
Plaintext Recovery Attacks against SSH | IEEE Conference Publication | IEEE Xplore

Plaintext Recovery Attacks against SSH


Abstract:

This paper presents a variety of plaintext-recovering attacks against SSH. We implemented a proof of concept of our attacks against OpenSSH, where we can verifiably recov...Show More

Abstract:

This paper presents a variety of plaintext-recovering attacks against SSH. We implemented a proof of concept of our attacks against OpenSSH, where we can verifiably recover 14 bits of plaintext from an arbitrary block of ciphertext with probability 2^{-14} and 32 bits of plaintext from an arbitrary block of ciphertext with probability 2^{-18}. These attacks assume the default configuration of a 128-bit block cipher operating in CBC mode. The paper explains why a combination of flaws in the basic design of SSH leads implementations such as OpenSSH to be open to our attacks, why current provable security results for SSH do not cover our attacks, and how the attacks can be prevented in practice.
Date of Conference: 17-20 May 2009
Date Added to IEEE Xplore: 18 August 2009
Print ISBN:978-0-7695-3633-0

ISSN Information:

Conference Location: Oakland, CA, USA

Contact IEEE to Subscribe

References

References is not available for this document.