• DocumentCode
    3239479
  • Title

    Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol

  • Author

    Iyappan, P. ; Arvind, K.S. ; Geetha, N. ; Vanitha, S.

  • Author_Institution
    Rajiv Gandhi Coll. of Eng. & Technol., Puducherry, India
  • fYear
    2009
  • fDate
    16-18 Dec. 2009
  • Firstpage
    808
  • Lastpage
    813
  • Abstract
    System security is a crucial constraint for secure transfer of data. Because of the nature of the SSH protocol, anyone with access to the central server can manipulate files, it is imperative that only authorized users be able to access the central server. Secure transfer has taken steps that will discourage several common attempts to forcefully gain access to the system. These steps include implementing a port knocking protocol, limiting access to only authorized machines and users, and keeping persistent logs. The Secure Shell (SSH) protocol is one of the most popular cryptographic protocols on the Internet. Secure Shell Protocol (SSH) uses the standard algorithms namely DES, AES and the RSA. Any user normally can use these algorithms which is being specified by the SSH protocol. As it is an OpenSSH, it is possible for the hackers to break the security during transmission of data. The idea behind the paper was when we allow the users to specify their own encryption techniques, which is not known to others can improve their security and also from hackers breaking the code. This will helps the user to create their encryption standards in the SSH protocol which provides more security to the users network and known only to the users.
  • Keywords
    cryptographic protocols; AES; DES; Internet; RSA; cryptographic protocols; data transfer security; pluggable encryption algorithm; secure shell protocol; Access protocols; Authentication; Cryptographic protocols; Cryptography; Data security; Educational institutions; File servers; Internet; TCPIP; Tunneling;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Trends in Engineering and Technology (ICETET), 2009 2nd International Conference on
  • Conference_Location
    Nagpur
  • Print_ISBN
    978-1-4244-5250-7
  • Electronic_ISBN
    978-0-7695-3884-6
  • Type

    conf

  • DOI
    10.1109/ICETET.2009.180
  • Filename
    5395032