Presentation | 2011-11-15 A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi HARA, Kenichiro MUTO, Sakae CHIKARA, Yoshiaki SEKI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a secure channel, is more utilized as Cloud services are widely used among general users. On the other hand, in the protocol using a cryptographic algorithm like SSH, the management for compromising cryptosystems is required. Therefore, we have considered the way to encourage general users to change cryptograph setting for avoiding the use of unsafe cryptosystems. In order to search for effective actions that a general user can perform, we examined the determination method of the cryptographic algorithm used at the time of SSH connection, from both specification and implementation aspect. As a result, it turned out that the priority in the cryptographic algorithm setting list of a client determine dominantly cryptographic algorithm used at the time of connection setup. Then, in order to visualize compromising cryptosystems situation in SSH, we investigated the acquisition method of the cryptographic algorithm list of both a client and the destination server. And we also devised the effective messages to be displayed to users for all the cases considered at the time of SSH connection setup, and implemented the proposed method partially. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | SSH / Cryptographic algorithm / Compromising Cryptosystems / Visualization |
Paper # | ISEC2011-52,LOIS2011-46 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2011/11/7(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol |
Sub Title (in English) | |
Keyword(1) | SSH |
Keyword(2) | Cryptographic algorithm |
Keyword(3) | Compromising Cryptosystems |
Keyword(4) | Visualization |
1st Author's Name | Satoshi HARA |
1st Author's Affiliation | University of Electro-Communications() |
2nd Author's Name | Kenichiro MUTO |
2nd Author's Affiliation | Nippon Telegraph and Telephone Corporation |
3rd Author's Name | Sakae CHIKARA |
3rd Author's Affiliation | Nippon Telegraph and Telephone Corporation |
4th Author's Name | Yoshiaki SEKI |
4th Author's Affiliation | Nippon Telegraph and Telephone Corporation |
Date | 2011-11-15 |
Paper # | ISEC2011-52,LOIS2011-46 |
Volume (vol) | vol.111 |
Number (no) | 285 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |