SSH Key Management Challenges and Requirements

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientific

Abstract

SSH (Secure Shell) uses public keys for authenticating servers and users. This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution. Proposals are solicited from the research community to address the issue. The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys.
Original languageEnglish
Title of host publication2019 10th IFIP International Conference on New Technologies, Mobility and Security : Proceedings of NTMS 2019 Conference and Workshop
Number of pages5
PublisherIEEE
Publication date24 Jun 2019
ISBN (Print)978-1-7281-1543-6
ISBN (Electronic)978-1-7281-1542-9 , 978-1-7281-1541-2
DOIs
Publication statusPublished - 24 Jun 2019
MoE publication typeB3 Article in conference proceedings
EventIFIP International Conference on New Technologies, Mobility and Security - Canary Islands, Spain
Duration: 24 Jun 201926 Jun 2019
Conference number: 10

Publication series

Name International Conference on New Technologies Mobility and Security
PublisherIEEE
ISSN (Print)2157-4952

Fields of Science

  • 113 Computer and information sciences
  • cybersecurity
  • SSH
  • SSH key

Cite this

Ylonen, T. (2019). SSH Key Management Challenges and Requirements. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security: Proceedings of NTMS 2019 Conference and Workshop ( International Conference on New Technologies Mobility and Security). IEEE. https://doi.org/10.1109/NTMS.2019.8763773
Ylonen, Tatu. / SSH Key Management Challenges and Requirements. 2019 10th IFIP International Conference on New Technologies, Mobility and Security: Proceedings of NTMS 2019 Conference and Workshop. IEEE, 2019. ( International Conference on New Technologies Mobility and Security).
@inproceedings{b4be2c889ac44b7a98dcfa226c4265ec,
title = "SSH Key Management Challenges and Requirements",
abstract = "SSH (Secure Shell) uses public keys for authenticating servers and users. This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution. Proposals are solicited from the research community to address the issue. The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys.",
keywords = "113 Computer and information sciences, cybersecurity, SSH, SSH key",
author = "Tatu Ylonen",
note = "Invited paper",
year = "2019",
month = "6",
day = "24",
doi = "10.1109/NTMS.2019.8763773",
language = "English",
isbn = "978-1-7281-1543-6",
series = "International Conference on New Technologies Mobility and Security",
publisher = "IEEE",
booktitle = "2019 10th IFIP International Conference on New Technologies, Mobility and Security",
address = "United States",

}

Ylonen, T 2019, SSH Key Management Challenges and Requirements. in 2019 10th IFIP International Conference on New Technologies, Mobility and Security: Proceedings of NTMS 2019 Conference and Workshop. International Conference on New Technologies Mobility and Security, IEEE, IFIP International Conference on New Technologies, Mobility and Security, Canary Islands, Spain, 24/06/2019. https://doi.org/10.1109/NTMS.2019.8763773

SSH Key Management Challenges and Requirements. / Ylonen, Tatu.

2019 10th IFIP International Conference on New Technologies, Mobility and Security: Proceedings of NTMS 2019 Conference and Workshop. IEEE, 2019. ( International Conference on New Technologies Mobility and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientific

TY - GEN

T1 - SSH Key Management Challenges and Requirements

AU - Ylonen, Tatu

N1 - Invited paper

PY - 2019/6/24

Y1 - 2019/6/24

N2 - SSH (Secure Shell) uses public keys for authenticating servers and users. This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution. Proposals are solicited from the research community to address the issue. The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys.

AB - SSH (Secure Shell) uses public keys for authenticating servers and users. This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution. Proposals are solicited from the research community to address the issue. The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys.

KW - 113 Computer and information sciences

KW - cybersecurity

KW - SSH

KW - SSH key

UR - https://www.ylonen.org/papers/ssh-key-challenges.pdf

U2 - 10.1109/NTMS.2019.8763773

DO - 10.1109/NTMS.2019.8763773

M3 - Conference contribution

SN - 978-1-7281-1543-6

T3 - International Conference on New Technologies Mobility and Security

BT - 2019 10th IFIP International Conference on New Technologies, Mobility and Security

PB - IEEE

ER -

Ylonen T. SSH Key Management Challenges and Requirements. In 2019 10th IFIP International Conference on New Technologies, Mobility and Security: Proceedings of NTMS 2019 Conference and Workshop. IEEE. 2019. ( International Conference on New Technologies Mobility and Security). https://doi.org/10.1109/NTMS.2019.8763773