JSEA  Vol.4 No.5 , May 2011
Secure File Multi Transfer Protocol Design
ABSTRACT
As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because the technology is more readily available and applications have become more user friendly allowing entry to less sophisticated user over a broad spectrum. Most data transfer are mainly text based not secure and vulnerable to various forms of security risks. So the model that uses SSH for securing channel like intranet/internet which provides client authentication encryption and decryption with high degree of security by transferring the data in an encrypted format, up on this model enhances the efficiency of data transmission by encrypting or decrypting the data with AES in Counter Mode. AES is a symmetric key encryption standard. Moreover the permutation controlled by data can be performed at high speed in generic cpu. This scheme also expands the key space without costing more to run. And also finally through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the security of communication channel. It also provides various applications like remote user creation, remote user deletion, remote command execution, remote system shutdown, remote file transfer applications in a highly secure manner.

Cite this paper
nullM. Krishna, P. Jamwal, K. Chaitanya and B. Kumar, "Secure File Multi Transfer Protocol Design," Journal of Software Engineering and Applications, Vol. 4 No. 5, 2011, pp. 311-315. doi: 10.4236/jsea.2011.45034.
References
[1]   Open SSH, “The Open SSH Project [Online],” 2002. http://www.openssh.org

[2]   A. J. Menezes, “Elliptic Curve Public Key Cryptosystems,” 1st Edition, Kluwer Academic Publishers, Dordrecht, 1993.

[3]   C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell Systems Technical Journal, Vol. 28, No. 4, 1949, pp. 656-715.

[4]   SSH Tools, “Open Source SSH Toolkit for Java [Online],” 2003. http://www.sshtools.com.

[5]   J. Daemen and V. Rijmen, “AES—the Advanced Encryption Standard,” Springer, Berlin, 2002.

 
 
Top