Toshiyuki Kito

Learn More
Although some flaws have been found out in the SSH, the Secure Shell, there is not so much discussion about its architecture or design safety. Therefore, in this paper, considering the SSH's architecture, e.g. the key exchange protocol, the user authentication protocols and its total design of the SSH, we not only discuss the SSH's architectural safety but(More)
SSL (secure socket layer) is one of the security protocols to achieve secure communications over a TCP/IP network. SSL has two types of authentication modes, server authentication mode and client authentication mode. The former is popular and facile to utilize, while the latter is secure enough owing to mutual authentication. However, when it was required(More)
  • 1