Multi-ciphersuite security and the SSH protocol.
Benjamin DowlingFlorian GiesenFlorian KohlarJörg SchwenkDouglas StebilaPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- cryptographic protocols
- security protocols
- authentication protocol
- key agreement protocol
- ban logic
- security model
- key exchange protocol
- information security
- denial of service attacks
- formal analysis
- security analysis
- communication protocols
- security properties
- mobile payment
- rfid systems
- lightweight
- provably secure
- mutual authentication
- intrusion detection
- key distribution
- access control
- secure multiparty computation
- cryptographic algorithms
- factor authentication
- virtual private network
- key agreement
- security requirements
- network security
- messages exchanged
- security policies
- physical layer
- network layer
- public key
- elliptic curve
- key management
- mobile agent system
- trust negotiation
- security issues
- privacy protection
- key establishment
- tcp ip
- protocol specification
- application layer
- sensitive data