[PDF format] Paper describing research into applying traffic-analysis techniques to interactive SSH connections in order to infer information about the encrypted connection contents. Concludes that the keystroke timing data observable from today's SSH... http://packetstormsecurity.nl/papers/cryptography/ssh-timing.pdf |