3 Bibliography
1. rfc2440 : OpenPGP Message Format
2. rfc4250 : The Secure Shell (SSH) Protocol Assigned Numbers
3. rfc4251 : The Secure Shell (SSH) Protocol Architecture
4. rfc4252 : The Secure Shell (SSH) Authentication Protocol
5. rfc4253 : The Secure Shell (SSH) Transport Layer Protocol
6. rfc4254 : The Secure Shell (SSH) Connection Protocol
7. rfc4255 : Using DNS to Securely Publish Secure Shell (SSH) Key Fingerprints
8. rfc4256 : Generic Message Exchange Authentication for the Secure Shell Protocol (SSH)
9. rfc4344 : The Secure Shell (SSH) Transport Layer Encryption Modes
10. rfc4419 : Diffie-Hellman Group Exchange for the Secure Shell (SSH) Transport Layer Protocol
11. rfc4432 : RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol
12. rfc4716 : The Secure Shell (SSH) Public Key File Format
13. rfc5647 : AES Galois Counter Mode for the Secure Shell Transport Layer Protocol
14. rfc5656 : Elliptic Curve Algorithm Integration in the Secure Shell Transport Layer
15. rfc6668 : SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol
16. rfc3526 : More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE)
17. rfc3766 : Determining Strengths For Public Keys Used For Exchanging Symmetric Key
18. rfc8268 : More Modular Exponentiation (MODP) Diffie-Hellman (DH) Key Exchange (KEX) Groups for Secure Shell (SSH)
19. draft-ladd-safecurves-04.txt : Additional Elliptic Curves for IETF protocols
20. SafeCurves: choosing safe curves for elliptic-curve cryptography
21. FIPS 186.4 : Digital Signature Standard (DSS)
22. draft-rsa-dsa-sha2-256-03.txt : Use of RSA Keys with SHA-2 256 and 512 in Secure Shell (SSH)
23. curve25519-20060209.pdf : Daniel J. Bernstein. Curve25519: new Diffie-Hellman speed records
24. ed25519-20110705.pdf : Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe & Bo-Yin Yang. High-speed high-security signatures
25. S.C. Williams. Analysis of the SSH Key Exchange Protocol. In: Chen L. (eds) Cryptography and Coding. IMACC 2011. Lecture Notes in Computer Science, vol 7089. Springer, Berlin, Heidelberg
26. P. Fiterau-Brostean, Toon Lenaerts, E. Poll, J. de Ruiter, F.W. Vaandrager, and P. Verleg: Model Learning and Model Checking of SSH Implementations. In Proceedings 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software, 13-14 July 2017, Santa Barbara, CA, USA, pages 142-151. ACM, NY, 2017.
27. P. Verleg. Inferring SSH state machines using protocol state fuzzing.
28. M. Tijssen. Automatic modeling of ssh implementations with state machine learning algorithms. Bachelor's thesis, Radboud University Nijmegen (June 2014).
29. E. Poll and A. Schubert. Rigorous specifications of the SSH transport layer.
30. Aris Adamantiadis. Specification of the curve25519-sha256@libssh.org.txt algorithm