Cryptology ePrint Archive: Report 2013/813
Multi-ciphersuite security of the Secure Shell (SSH) protocol
Florian Bergsma and Benjamin Dowling and Florian Kohlar and Jörg Schwenk and Douglas Stebila
Abstract: The Secure Shell (SSH) protocol is widely used to provide secure remote access to servers, making it among the most important security protocols on the Internet. We show that the signed-Diffie--Hellman SSH ciphersuites of the SSH protocol are secure: each is a secure authenticated and confidential channel establishment (ACCE) protocol, the same security definition now used to describe the security of Transport Layer Security (TLS) ciphersuites.
While the ACCE definition suffices to describe the security of individual ciphersuites, it does not cover the case where parties use the same long-term key with many different ciphersuites: it is common in practice for the server to use the same signing key with both finite field and elliptic curve Diffie--Hellman, for example. While TLS is vulnerable to attack in this case, we show that SSH is secure even when the same signing key is used across multiple ciphersuites. We introduce a new generic multi-ciphersuite composition framework to achieve this result in a black-box way.
Category / Keywords: Secure Shell (SSH); key agility; cross-protocol security; multi-ciphersuite; authenticated and confidential channel establishment
Original Publication (with major differences): ACM CCS 2014
Date: received 3 Dec 2013, last revised 18 Aug 2014
Contact author: stebila at qut edu au
Available format(s): PDF | BibTeX Citation
Note: Minor corrections and revisions. Full version of paper appearing in ACM CCS 2014.
Version: 20140819:055312 (All versions of this report)
Short URL: ia.cr/2013/813
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]