Presentation 2011-11-15
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi HARA, Kenichiro MUTO, Sakae CHIKARA, Yoshiaki SEKI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a secure channel, is more utilized as Cloud services are widely used among general users. On the other hand, in the protocol using a cryptographic algorithm like SSH, the management for compromising cryptosystems is required. Therefore, we have considered the way to encourage general users to change cryptograph setting for avoiding the use of unsafe cryptosystems. In order to search for effective actions that a general user can perform, we examined the determination method of the cryptographic algorithm used at the time of SSH connection, from both specification and implementation aspect. As a result, it turned out that the priority in the cryptographic algorithm setting list of a client determine dominantly cryptographic algorithm used at the time of connection setup. Then, in order to visualize compromising cryptosystems situation in SSH, we investigated the acquisition method of the cryptographic algorithm list of both a client and the destination server. And we also devised the effective messages to be displayed to users for all the cases considered at the time of SSH connection setup, and implemented the proposed method partially.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) SSH / Cryptographic algorithm / Compromising Cryptosystems / Visualization
Paper # ISEC2011-52,LOIS2011-46
Date of Issue

Conference Information
Committee ISEC
Conference Date 2011/11/7(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Sub Title (in English)
Keyword(1) SSH
Keyword(2) Cryptographic algorithm
Keyword(3) Compromising Cryptosystems
Keyword(4) Visualization
1st Author's Name Satoshi HARA
1st Author's Affiliation University of Electro-Communications()
2nd Author's Name Kenichiro MUTO
2nd Author's Affiliation Nippon Telegraph and Telephone Corporation
3rd Author's Name Sakae CHIKARA
3rd Author's Affiliation Nippon Telegraph and Telephone Corporation
4th Author's Name Yoshiaki SEKI
4th Author's Affiliation Nippon Telegraph and Telephone Corporation
Date 2011-11-15
Paper # ISEC2011-52,LOIS2011-46
Volume (vol) vol.111
Number (no) 285
Page pp.pp.-
#Pages 6
Date of Issue