usenix conference policies
SSH - Secure Login Connections Over the Internet
Tatu Ylonen, SSH Comunications Security, Ltd., Finland
SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or three-key triple-DES) for encrypting transferred data.
SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals.
The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection.
author = {Tatu Ylonen},
title = {{SSH} - Secure Login Connections Over the Internet},
booktitle = {6th USENIX Security Symposium (USENIX Security 96)},
year = {1996},
address = {San Jose, CA},
url = {https://www.usenix.org/conference/6th-usenix-security-symposium/ssh-secure-login-connections-over-internet},
publisher = {USENIX Association},
month = jul
}
connect with us