Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm.
Mihir BellareTadayoshi KohnoChanathip NampremprePublished in: ACM Trans. Inf. Syst. Secur. (2004)
Keyphrases
- encryption scheme
- key exchange
- ciphertext
- standard model
- diffie hellman
- security analysis
- secret key
- hash functions
- authentication scheme
- public key
- secret sharing scheme
- data sharing
- encryption algorithm
- security model
- key distribution
- lossless compression
- proxy re encryption
- public key encryption
- database
- pseudorandom
- smart card
- lightweight