Use of RSA Keys with SHA-256 and SHA-512 in the Secure Shell (SSH) Protocol.
Denis BiderPublished in: RFC (2018)
Keyphrases
- hash functions
- provably secure
- authentication protocol
- private key
- session key
- public key cryptography
- key exchange
- public key
- key distribution
- signature scheme
- secret key
- security analysis
- diffie hellman
- key agreement
- cryptographic protocols
- covert channel
- blind signature
- digital signature scheme
- cryptographic algorithms
- elliptic curve
- similarity search
- key agreement protocol
- mutual authentication
- public key cryptosystems
- security properties
- encryption scheme
- group communication
- scalar product
- electronic voting
- lightweight
- authentication scheme
- elliptic curve cryptography
- homomorphic encryption
- security protocols
- multi party
- modular exponentiation
- digital signature
- standard model
- security requirements
- secure routing
- secure communication
- wireless sensor networks
- key exchange protocol
- vertically partitioned data
- ad hoc networks
- data distribution
- sensor networks