Paper Menu >>
Journal Menu >>
Journal of Software Engineering and Applications, 2011, 4, 311-315 doi:10.4236/jsea.2011.45034 Published Online May 2011 (http://www.SciRP.org/journal/jsea) Copyright © 2011 SciRes. JSEA 311 Secure File Multi Transfer Protocol Design Murali Krishna, Pradeep Jamwal, K. S. R. Chaitanya, B. Vinod Kumar Gayatri Vidya Parishad College of Engineering, Visakha p at nam, India. Email: krishna.murali564@gmail.com, pradeep_jamwal@yahoo.co.in, chaitanya_p_v_k@ yoo.co.in, vinukumar5b9@gmail.com Received March 28th, 2011; revised April 22nd, 2011; accepted April 30th, 2011. ABSTRACT As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less so- phisticated user o ver a broad spectrum. Most data tran sfer are mainly text based not secure and vulnerable to various forms of security risks. So the model tha t uses SSH for securing channel like intranet/internet which provid es client au- thentication encryp tion and decryption with high d egree of security by transferring the data in an encrypted format, up on this model enhances the efficiency of data transmission by encrypting or decrypting the data with AES in Counter Mode. AES is a symmetric key encryption standard. Moreover the permutation controlled by data can be performed at high speed in generic cpu. This scheme also expands the key space without costing more to run. And also finally through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the security of communica- tion channel. It also provides various applications like remote user creation, remote user deletion, remote command execution, remote system shutdown, remote file transfer applications in a highly secure manner. Keywords: Remote SSH, AES, Remote Administration 1. Introduction This paper addresses the problem of providing a secure means of client to client or server to server or client to server over an insecure channel like internet. The paper aims to use the SSH and AES in Counter Mode which is the enhanced algorithm for securing the transmission channel between any two remote computers. 1.1. Secure Shell SSH™ (or Secure Shell) is a protocol which facilitates secure communication between two systems using a cli- ent/server architecture and allows users to log into server host systems remotely. Unlike other remote communica- tion protocols, such as FTP or Telnet, SSH encrypts the login session, making it impossible for intruders to col- lect unencrypted passwords. SSH is designed to replace older, less secure terminal applications used to log into remote hosts, such as telnet or rsh. A related program called scp replaces older pro- grams designed to copy files between hosts, such as rcp. Because these older applications do not encrypt pass- words transmitted between the client and the server, avoid them whenever possible. Using secure methods to log into remote systems decreases the risks for both the client system and the remote host. This increasing the remote file transfer solutions and it also increases the popularity has been fueled by the broader availability of commercially developed and supported client and server applications for windows, Unix and other platforms and by the effort of the OPENSSH [1] project to develop an open source im pl ementati on. 1.2. Features of SSH: The SSH protocol provides the following safeguards: After an initial connection, the client can verify that it is connecting to the same server it had connected to pre- viously. The client transmits its authentication information to the server using strong, 128-bit encryption. All data sent and received during a session is trans- ferred using 128-bit encryption, making intercepted transmissions extremely difficult to decrypt and read. The client can forward X11 [2] applications from the server. This technique, called X11 forwarding, provides a secure means to use graphical applications over a net- work. Because the SSH protocol encrypts everything sends and receives, it can be used to secure otherwise insecure protocols. Using a technique called port for- warding, an SSH server can become a conduit to secur- ing otherwise insecure protocols, like POP, and increase- Secure File Multi Transfer Protocol Design 312 ing overall system and data insecurity. According to Shannon [3] claims that SSH has three main capabilities. Secure command shell: such as those available to Linux, UNIX, Windows or the familiar DOS prompt, provide the ability to execute programs and other commands, usually with character input and output. Port forwarding: allows TCP/IP applications data to be se- curely transmitted over insecure ch annels. Secure file transfer: SFTP is an interactive file transfer protocol which performs all operations over the SSH transport layer and is replacement for the original SCP protocol existed in SSH. It is highly recommended that SFTP is used to perform the file transfer in preference to the legacy FTP protocol. As in the latter, authentication details are transmitted in plain text format and such may be compromised through “password sniffing” attacks. The former also uses the same port as the SSH server, eliminating the need to open another port on the firewall of the router. According to the van Shannon [3] the SSH protocol provides four basic security benefits. Which are user au- thentication, data encryption, and data integrity? Authentication: public based and host based authenti- cation .of these, public key authentication is one of the most secure methods to authenticate using SSH. Public key authentication uses a public/private key pair, gener- ated typically by using key generation utility. Data Encryption: when a client establishes a connec- tion with SSH server or independent servers they must agree with cipher they will use to encrypt and decrypt data. The server generally supports the list of ciphers it supports. And the client then selects the first cipher in its list that matches one on the server’s list. Session keys are the “shared keys” described above and are randomly generated. Both the client and server use the same key for both encryption and decryption. Data Integrity: even with SSH encryption, the data being sent over the network could still be vulnerable to someone inserting unwanted data into the data. SSH uses HMAC algorithms to greatly improve up on SSH’s sim- ple 32-bit CRC data integ rity checking method. SSH enabled applications are gaining popularity be- cause of the security they supply for the task carried out over the network. Some of the popular one are putty, SSH client for windows and VNC over SSH [4]. As a security protocols’ has not been as popular as SSL [5]. 1.3. The Realization of AES Algorithm Figure 1 describes AES is a symmetric block cipher having variable key and fixed data length. The key lengths can be independently chosen as 128, 192 or 256 bits, which result in 10, 12 and 14 rounds of operation Figure 1. Rounds in AES algorithm. respectively. The data length is howeve r fixed to 128 bits. The input as well as intermediate data can be considered as a matrix with four rows and four columns called state. Each element of the matrix is composed of eight bits, therefore enabling efficient implementation of AES on 8 bit platforms also. AES is mainly used to ensure secrecy in important communications, such as those of govern- ment covert operations, military leaders, and diplomats SubBytes-a non-linear substitution step where each byte is replaced with another according to a lookup table. ShiftRows-a transposition step where each row of the state is shifted cyclically a certain number of steps. Mix Columns-a mixing operation which operates on the columns of the state, combining the four bytes in each column. AddRou ndK ey- each byte of the state is combined with the round key using bitwise XOR. AES in Counter Mode: CTR mode (CM) is also known as integer counter mode (ICM) and segmented integer counter (SIC) mode. Counter mode turns a block cipher into a stream cipher as shown in Figure 2. It gen- erates the next key stream block by encrypting succes- sive values of a “counter”. The counter can be any func- tion which produces a sequence which is guaranteed not to repeat for a long time, although an actual counter is Copyright © 2011 SciRes. JSEA Secure File Multi Transfer Protocol Design313 Figure 2. Counter mode encry ption. the simplest and most popular. The usage of a simple deterministic input function used to be controversial; critics argued that “deliberately exposing a cryptosystem to a known systematic input represents an unnecessary risk.” By now, CTR mode is widely accepted, and prob- lems resulting from the input function are recognized as a weakness of the underlying block cipher instead of the CTR mode. Nevertheless, there are specialized attacks like a Hardware Fault Attack that is based on the usage of a simple counter function as input. CTR mode has similar characteristics to OFB, but also allows a random access property during decryption. CTR mode is well suited to operation on a multi-pro c- essor machine where blocks can be encrypted in parallel. 2. Contribution The running time that DES took as much as irrational DES. i.e. the confidentiality of the key is enhanced without spending more time, secondly based on the same plain text and key, the cipher text of DES after several simulation is the same, but it is random about the DES with irrational numbers. i.e. the key space is expanded through increasing the randomness of sub- keys and it is combined with secure shell protocol the proposed model provides maximum amount of security to an insecure communication link between remote clients and servers. This model enhances the security of communication channel. In which some of the following aspects are unique. The system offers supreme security due to dou- ble encryption. i.e. once with irrational DES and once with RSA in builtness of SSH protocol. SSH is normally used to secure applications like Telnet, and FTP but in this model it is used very similar to SSL. Like SSL, it runs over TCP/IP and secures the data sent between TCP/IP or client/server applications, retaining all the security benefits of SSH. Not only that SSH also pro- vides various administration applications like remote command execution, remote user creation or deletion or remote shutdown or reboot or file transfer application in an highly secure manner. 3. Desighn and Implementation Figure 1 and Figure 6 showed the arrangement of high level secure communicatio n of clients to server or clients to clients. 3.1. SSH Server Application Implementation The GUI is where the user interact s with the system. It receives data input from user and displays received in- formation in both encrypted format and sent data also. 3.2. SSH Client Application Implementation The process of setting up an SSH secured communica- tion channel is as follows:- configure the encryption al- gorithms for use from client to server and from server to client—configure the hash algorithm used in both direc- tions—use this properties (containing the configurations) object and use this as parameter for establishing a SSH connection and subsequently returning a handle on the connection by means of an object—use the toolkit’s password authentication method s-instantiate the channel class, and use the channel object as a parameter for the open channel method (of SSH connection object). Through SSH connection and with irrational DES the multiple messages also can be passed to the various cli- ent to servers. Automatic login remote host The person under consideration is the system adminis- trator. He has different responsibilities while working in a network. He may have a requirement to login to client systems and do the necessary modifications. For this, if he is coerced to key in the password then there is a high probability for the password to be sniffed and intruders attacking the system? To overcome these hurdles we have provided the feature, automatic login to remote host which shown in Figure 3. Creating users/Deleting users The system administrator has the responsibility of su- pervising the network. In this effort, he might be required users in the system. So, this feature allows him to create users which are shown in Figure 4. Steps: 1) Connect to the remote host through secure shell. 2) Provide proper password through secure shell. 3) Crate the users through command “user add” by sending command in encrypted format using secure shell. Execution of command(eg. ls, cat, finger, find) Unix supports commands like cat, finger, find etc. each command is a file. The commands are executed to ac- complish different functionalities. For example, “ls” command is used to list all the files. So, this feature al- lows administrator to execute the different commands which are shown in Figure 5. And the steps follows for remote command execution are: Steps: 1) Connect to the remote host through secure shell. 2) Provide proper password through secure shell. Copyright © 2011 SciRes. JSEA Secure File Multi Transfer Protocol Design 314 Figure 3. SSH remote acce sing. Figure 4. SSH remote user creation or deletion. Figure 5. SSH remote command execution. Figure 6. Secure file transfer. 3) Execution of any command will be done by passing corresponding executable command. Rebooting/shut down of remote system In some cases, after installing the software the system may be required to reboot. In this regard, the system ad- ministrator can reboot the remote system after the soft- ware has been installed. Steps: 1) Connect to the remote host through secure shell. 2) Provide proper password thorough secure shell. 3) Reboot or shut down of the remote system will be done through the “power off” command. 4. Tests & Results This section provides some of the tests carried out and presents their results. 4.1. Channel Confidentiality Verifying whether the data can be transmitted between client and server is in fact encrypted both with AES with counter mode and SSH protocol which protecting the sys- tem against passive attacks which is shown in: Copyright © 2011 SciRes. JSEA Secure File Multi Transfer Protocol Design Copyright © 2011 SciRes. JSEA 315 Data: Hai how ru This is our project SSH with AES with Counter Mode: Encrypted data: P PDXABF F[FZV FCAXXV > l Encrypted data SSH with AES in C o unt er M ode. 4.2. SSH with AES in Counter Mode Time Comparisons Table 1 describes the comparison of encryption or de- cryption time periods with existing DES and SSH with irrational DES. EAESt—encryption time period for existing AES. EAESCTRt—encryption time period for SSH with AES in Counter Mode. DAESt—decryption time period for existing AES. DAESCTRt—decryption time period for SSH with AES in Counter Mode. 4.3. SSH with AES in Counter Mode Cipher Text Comparisons Table 2 describes about the cipher text generation for Table 1. Time comparisons for AES vs AES with counter mode. Data Size Eaest Eaesctrt Daest Daesctrt 1 KB 411 msec 413 msec 407 ms 409 ms 512 B 298 msec 299 msec 276 ms 277 ms 256 B 159.4 ms 160 msec 147.4 ms 148 ms 128 B 84.7 ms 85 ms 85.7 ms 86 ms Table 2. Cipher text comparisons for AES SSH AESCTR. Paes Caes Paesctr Caesctr Hai how ru This is our project Cbcc883cd0d 3be- aafo66259c76 328078b Hai how r u This is our project PPD XAB FF[ FZ VFCAXX V>l existing AES and SSH with AES with Counter Mode in which the cipher text for the same plain text is always different with existing DES whereas differ in SSH with AES in Counter Mode which causes a high security of protection against the attacks for the message. CAES—cipher text for existing AES. CAESCTR—cipher text for SSH with AES in Counter Mode. PAES—plain text for existing AES. PAESCTR—plain text for SSH with AES in Counter Mode. 5. Conclusions The results presented in Section 4 are extremely good. They clearly showed that: the data being transmitted be- tween client and server is in fact encrypted, protecting the system against passive attacks. And not only that the running time that existing AES took as much as that of SSH with Counter Mode in AES. And the confidentiality of the key is enhanced without spending more time. And the based on the same plain text and the key the cipher text of AES after several simulation is not same but it is random about the SSH with Counter Mode in AES. REFERENCES [1] Open SSH, “The Open SSH Project [Online],” 2002. http://www.openssh.org [2] A. J. Menezes, “Elliptic Curve Public Key Cryptosys- tems,” 1st Edition, Kluwer Academic Publishers, Dordrecht, 1993. [3] C. E. Shannon, “Communication Theory of Secrecy Sys- tems,” Bell Systems Technical Journal, Vol. 28, No. 4, 1949, pp. 656-715. [4] SSH Tools, “Open Source SSH Toolkit for Java [Online],” 2003. http://www.sshtools.com. [5] J. Daemen and V. Rijmen, “AES—the Advanced Encryp- tion Standard,” Springer, Berlin, 2002. |