Font Size: a A A

The Research And Implementation On The Audit System Based-on Efficient SSH Protocol

Posted on:2012-01-20Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhangFull Text:PDF
GTID:2248330395485252Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of the network and information technology, networksecurity has become increasingly prominent. In the network that is not safeenough, in order to ensure security and accuracy of data, therefore, remote login andconfiguration of the network equipment becomes more and more necessary.Current applied to the network remotely login are Telnet, FTP, etc. Although thesemethods all use user name and password to authenticate the user login, but the data istransferred in the way of plaintext. The user’s important information is easy to bestolen by hackers, and network problems such as information leakage,etc.In this paper, in order to ensure the security of the network data transmission,weanalyze the reasons for the network security threats, and focus on the safety remotelogin protocol-SSH,give a systematic introduction, design and implement a SSHprotocol-based operation and maintenance audit system. The system is SSHprotocol-based, and based on the traditional authentication of user name andpassword, Through the RSA encryption algorithm and MD5authenticationalgorithm to ensure data security and accuracy. Second, the system is basedon transparent proxy,can ensure the normal communication of the client remote login.Research shows,in the safety transmission of the SSH protocol-based,70%of theCPU time is taken for processing cryptographic operations,that the efficiency of thecryptographic algorithms is a key factor in affecting the efficiency of the SSHprotocol.This article researches the RSA encryption algorithm implementations basedon the GPU general computing platform, designed and implemented theimplementations of RSA algorithm on the CUDA architecture. The experiment resultsshow: that the GPU implementation can achieve more than40times speedup incomparison with multi-core CPU implementation of RSA.In summary, this paper designed and implemented a operation andmaintenance audit system based on efficient SSH protocol, through the RSAencryption algorithm and MD5authentication algorithm to ensure data security andaccuracy,implemented the RSA algorithm based on the GPU generalcomputing platform, improve the efficiency of secure transmission based on the SSHprotocol, in order to mprove the efficiency of the SSH protocol secure transmission.
Keywords/Search Tags:Secure data transfer, SSH, encryption, RSA algorithm, GPU, CUDA
PDF Full Text Request
Related items