Passive SSH key compromise via lattices

We demonstrate that a passive network attacker can opportunistically obtain private RSA host keys from an SSH server that experiences a naturally arising fault during signature computation. In prior work, this was not believed to be possible for the SSH protocol because the signature included inform...

Full description

Bibliographic Details
Main Authors: Ryan, Keegan, He, Kaiwen, Sullivan, George, Heninger, Nadia
Other Authors: Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
Format: Article
Language:English
Published: ACM|Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security 2023
Online Access:https://hdl.handle.net/1721.1/153136