Journal of Software Engineering and Applications, 2011, 4, 311-315
doi:10.4236/jsea.2011.45034 Published Online May 2011 (http://www.SciRP.org/journal/jsea)
Copyright © 2011 SciRes. JSEA
311
Secure File Multi Transfer Protocol Design
Murali Krishna, Pradeep Jamwal, K. S. R. Chaitanya, B. Vinod Kumar
Gayatri Vidya Parishad College of Engineering, Visakhapatnam, India.
Email: krishna.murali564@gmail.com, pradeep_jamwal@yahoo.co.in, chaitanya_p_v_k@yoo.co.in, vinukumar5b9@gmail.com
Received March 28
th
, 2011; revised April 22
nd
, 2011; accepted April 30
th
, 2011.
ABSTRACT
As the internet grows in popularity and therefore also in size more and more transmission takes place mainly because
the technology is more readily available and applications have become more user friendly allowing entry to less so-
phisticated user over a broad spectrum. Most data transfer are mainly text based not secure and vulnerable to various
forms of security risks. So the model that uses SSH for securing channel like intranet/internet which provides client au-
thentication encryption and decryption with high degree of security by transferring the data in an encrypted format, up
on this model enhances the efficiency of data transmission by encrypting or decrypting the data with AES in Counter
Mode. AES is a symmetric key encryption standard. Moreover the permutation controlled by data can be performed at
high speed in generic cpu. This scheme also expands the key space without costing more to run. And also finally
through the combination of secure shell (ssh) and AES (Counter Mode) not only enhances the security of communica-
tion channel. It also provides various applications like remote user creation, remote user deletion, remote command
execution, remote system shutdown, remote file transfer applications in a highly secure manner.
Keywords: Remote SSH, AES, Remote Administration
1. Introduction
This paper addresses the problem of providing a secure
means of client to client or server to server or client to
server over an insecure channel like internet. The paper
aims to use the SSH and AES in Counter Mode which is
the enhanced algorithm for securing the transmission
channel between any two remote computers.
1.1. Secure Shell
SSH™ (or Secure Shell) is a protocol which facilitates
secure communication between two systems using a cli-
ent/server architecture and allows users to log into server
host systems remotely. Unlike other remote communica-
tion protocols, such as FTP or Telnet, SSH encrypts the
login session, making it impossible for intruders to col-
lect unencrypted passwords.
SSH is designed to replace older, less secure terminal
applications used to log into remote hosts, such as telnet
or rsh. A related program called scp replaces older pro-
grams designed to copy files between hosts, such as rcp.
Because these older applications do not encrypt pass-
words transmitted between the client and the server,
avoid them whenever possible. Using secure methods to
log into remote systems decreases the risks for both the
client system and the remote host. This increasing the
remote file transfer solutions and it also increases the
popularity has been fueled by the broader availability of
commercially developed and supported client and server
applications for windows, Unix and other platforms and
by the effort of the OPENSSH [1] project to develop an
open source implementation.
1.2. Features of SSH:
The SSH protocol provides the following safeguards:
After an initial connection, the client can verify that it
is connecting to the same server it had connected to pre-
viously.
The client transmits its authentication information to
the server using strong, 128-bit encryption.
All data sent and received during a session is trans-
ferred using 128-bit encryption, making intercepted
transmissions extremely difficult to decrypt and read.
The client can forward X11 [2] applications from the
server. This technique, called X11 forwarding, provides a
secure means to use graphical applications over a net-
work. Because the SSH protocol encrypts everything
sends and receives, it can be used to secure otherwise
insecure protocols. Using a technique called port for-
warding, an SSH server can become a conduit to secur-
ing otherwise insecure protocols, like POP, and increase-