SSH Key Management Challenges and Requirements

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientific

Abstract

SSH (Secure Shell) uses public keys for authenticating servers and users. This paper summarizes progress in SSH key management so far, highlights outstanding problems, and presents requirements for a long-term solution. Proposals are solicited from the research community to address the issue. The problem is of high practical importance, as most of our critical Internet infrastructure, cloud services, and open source software development is protected using these keys.
Original languageEnglish
Title of host publication2019 10th IFIP International Conference on New Technologies, Mobility and Security : Proceedings of NTMS 2019 Conference and Workshop
Number of pages5
PublisherIEEE
Publication date24 Jun 2019
ISBN (Print)978-1-7281-1543-6
ISBN (Electronic)978-1-7281-1542-9 , 978-1-7281-1541-2
DOIs
Publication statusPublished - 24 Jun 2019
MoE publication typeB3 Article in conference proceedings
EventIFIP International Conference on New Technologies, Mobility and Security - Canary Islands, Spain
Duration: 24 Jun 201926 Jun 2019
Conference number: 10

Publication series

Name International Conference on New Technologies Mobility and Security
PublisherIEEE
ISSN (Print)2157-4952

Bibliographical note

Invited paper

Fields of Science

  • 113 Computer and information sciences
  • cybersecurity
  • SSH
  • SSH key

Cite this