Hi Ralph,

CBC mode is indeed a bad choice for SSH, but for other reasons than  
the recent artacks on TLS. The paper you mention was published as:

Albrecht, Paterson, Watson, Plaintext recovery attacks on SSH.  IEEE  
Symposium on Security and Privacy, 2009

and explains why.

CTR mode in SSH seems to be secure and is now preferred to CBC mode in  
SSH - see my Eurocrypt 2010 paper with Gaven Watson for a formal  
security analysis of this (it's also on eprint:   
http://eprint.iacr.org/2010/095 
)

I'm not aware of any other work on SSH's symmetric encryption since.

Cheers

Kenny

Sent from my iPhone

On 11 Feb 2013, at 19:15, "Ralph Holz" <h...@net.in.tum.de> wrote:

> Hi,
>
> From what I can tell from our data, the most common symmetric  
> ciphers in
> SSH are proposed by client/servers to be used in CBC mode. With SSL/ 
> TLS
> and XMLEnc, this mode has had quite some publicity in the recent past.
>
> I was wondering to which degree the attacks that were possible on SSL
> with AES/CBC might also be applicable to SSH? Quickly asking Google
> yielded things like
>
> http://modular.math.washington.edu/home/wstein/www/home/malb/papers/plaintext_recover_attacks_against_ssh.pdf
>
> http://www.kb.cert.org/vuls/id/958563
>
> I was wondering if there have recently been any more insights?  
> Grateful
> for any pointers.
>
> Thanks,
> Ralph
>
> -- 
> Ralph Holz
> Network Architectures and Services
> Technische Universität München
> Phone +49 89 28918043
> http://www.net.in.tum.de/de/mitarbeiter/holz/
> PGP: A805 D19C E23E 6BBB E0C4  86DC 520E 0C83 69B0 03EF
>
> _______________________________________________
> cryptography mailing list
> cryptography@randombit.net
> http://lists.randombit.net/mailman/listinfo/cryptography
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to