Share This Article:

Secure File Multi Transfer Protocol Design

Abstract Full-Text HTML Download Download as PDF (Size:563KB) PP. 311-315
DOI: 10.4236/jsea.2011.45034    4,263 Downloads   7,540 Views   Citations

ABSTRACT

As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum. Most data transfer are mainly text based not secure and vulnerable to various forms of security risks. So the model that uses SSH for securing channel like intranet/internet which provides client authentication encryption and decryption with high degree of security by transferring the data in an encrypted format, up on this model enhances the efficiency of data transmission by encrypting or decrypting the data with AES in Counter Mode. AES is a symmetric key encryption standard. Moreover the permutation controlled by data can be performed at high speed in generic cpu. This scheme also expands the key space without costing more to run. And also finally through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the security of communication channel. It also provides various applications like remote user creation, remote user deletion, remote command execution, remote system shutdown, remote file transfer applications in a highly secure manner.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

M. Krishna, P. Jamwal, K. Chaitanya and B. Kumar, "Secure File Multi Transfer Protocol Design," Journal of Software Engineering and Applications, Vol. 4 No. 5, 2011, pp. 311-315. doi: 10.4236/jsea.2011.45034.

References

[1] Open SSH, “The Open SSH Project [Online],” 2002. http://www.openssh.org
[2] A. J. Menezes, “Elliptic Curve Public Key Cryptosystems,” 1st Edition, Kluwer Academic Publishers, Dordrecht, 1993.
[3] C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell Systems Technical Journal, Vol. 28, No. 4, 1949, pp. 656-715.
[4] SSH Tools, “Open Source SSH Toolkit for Java [Online],” 2003. http://www.sshtools.com.
[5] J. Daemen and V. Rijmen, “AES—the Advanced Encryption Standard,” Springer, Berlin, 2002.

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.