Nov. 6, 2023, 1:54 a.m. |

IACR News www.iacr.org

ePrint Report: Passive SSH Key Compromise via Lattices

Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger


We demonstrate that a passive network attacker can opportunistically obtain private RSA host keys from an SSH server that experiences a naturally arising fault during signature computation. In prior work, this was not believed to be possible for the SSH protocol because the signature included information like the shared Diffie-Hellman secret that would not be available to a passive network observer. We show …

attacker compromise computation eprint report experiences host key keys network private report rsa server signature ssh ssh key sullivan work

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)