U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Presentation

Practical Privacy-Preserving Authentication for SSH

August 24, 2022

Presenters

Mike Rosulek - Oregon State University

Description

Abstract:

Public-key authentication in SSH reveals more information about the participants' keys than is necessary. (1) The server can learn a client's entire set of public keys, even keys generated for other servers. (2) The server learns exactly which key the client uses to authenticate, and can further prove this fact to a third party. (3) A client can learn whether the server recognizes public keys belonging to other users. Each of these problems lead to tangible privacy violations for SSH users.

In this talk I will describe a new public-key authentication method for SSH that reveals essentially the minimum possible amount of information to both the client and server. It supports existing SSH keypairs of all standard flavors. This is joint work with Lawrence Roy, Stanislav Lyakhov, and Yeongjin Jang, which appeared at USENIX Security 2022.

Suggested reading: ia.cr/2022/740

Presented at

Crypto Reading Club talk on 2022-Aug-24

Parent Project

See: Crypto Reading Club

Related Topics

Security and Privacy: cryptography

Created August 18, 2022, Updated August 25, 2022