Automatic Analysis on Authentication of SSHV2 Protocol in Computational Model
2015; East China Computer Technology Research Institute; Linguagem: Inglês
ISSN
1000-3428
Autores Tópico(s)Access Control and Trust
ResumoSecure Shell(SSH)protocol can ensure the implementation of network file transfer between the local host and remote host,remote login,executing commands remotely and safe execution of other applications.It plays an important role in the protecting network security.This paper studies the security of the protocol.The main content of this article is the automated analysis of Secure Shell Version2(SSHV2)protocol.This paper introduces the architecture of SSH protocol and gets the message terms by analyzing the authentication message flow of SSHV2 protocol.Based on computational model and application Blanchet calculus to give the formal model of SSHV2 security protocol,and analyzes the protocol's certification by applying the security protocol automatic analysis tool CryptoVerif,shows that SSHV2 security protocol has authentication under the computational model.
Referência(s)