[Cryptography] SSH vulnerability when using passwords
lists at notatla.org.uk
lists at notatla.org.uk
Thu Jan 15 17:41:55 EST 2015
> > Where is this attack written up in detail? And how is it best
> > defended against?
> You may be thinking of Dawn Song's 2001 Usenix paper:
> https://www.usenix.org/legacy/events/sec01/full_papers/song/song.pdf
Coincidentally about the same time Solar Designer and Dug Song
(not related to Dawn Song) produced
http://www.openwall.com/articles/SSH-Traffic-Analysis
More information about the cryptography
mailing list