Conference Publication Details
Mandatory Fields
Plaga S.;Wiedermann N.;Hansch G.;Newe T.
European Conference on Information Warfare and Security, ECCWS
Secure your SSH Keys! Motivation and practical implementation of a HSM-based approach securing private SSH-Keys
2018
January
Published
1
()
Optional Fields
Hardware security module (HSM) Security awareness SSH key Trusted platform module (TPM)
370
379
© 2018 Curran Associates Inc. All rights reserved. Reliable authentication of entities is the baseline for secure communications infrastructures and services. While traditional password authentication is still widely deployed, while alternatives based on asymmetric cryptography are also available and provide an increased level of security. On the client-side, however, secret keys are often unprotected. Although constantly updated workstations are considered to be trusted environments, security breaches such as Spectre or Meltdown raised doubts in platform integrity. The presented work introduces realistic attack vectors which can be employed to extract cryptographic keys from workstations. Consequently, Hardware Security Modules (HSMs) are introduced which provide secure storage as well as secure utilisation of private cryptographic keys. Due to the huge amount of possible application scenarios, the paper focuses on an application scenario based on the widely used Secure Shell (SSH) protocol. Demonstrating that an improved level of security is not necessarily directly linked to costs, a rough summary of interesting Commercial off the Shelf (COTS) devices is provided.
Grant Details