Passive SSH key compromise via lattices
We demonstrate that a passive network attacker can opportunistically obtain private RSA host keys from an SSH server that experiences a naturally arising fault during signature computation. In prior work, this was not believed to be possible for the SSH protocol because the signature included inform...
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
ACM|Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
2023
|
Online Access: | https://hdl.handle.net/1721.1/153136 |