Font Size: a A A

Design And Implementation Of Trusted SSH Protocol

Posted on:2018-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y Q ZhangFull Text:PDF
GTID:2348330512975572Subject:Information security
Abstract/Summary:PDF Full Text Request
With the development of computer network technology,especially Internet technology,network security is gradually concerned by people.The design and analysis of network security protocols has become a hot research topic.Network security protocols such as SSH,IPSec and TLS are very important to ensure the security of data transmission and increasingly importance has been attached to these protocols.As a universal and extensible security protocol,SSH encrypts the data transmitted in the network,which reduces the probability and harm of some network attacks such as eavesdropping.However,as attacks become more sophisticated,computer systems are vulnerable to malicious attacks.Malicious users can use SSH to attack remote servers exploiting the protocol's flaw.Trusted computing technology can improve the security of the network security protocol by improving the security of the platform.The remote attestation technology is able to ensure that the code on the remote untrusted computing platform has not been tampered with.However,high latency,inefficiency and other shortcomings will be brought if the technology is applied to the traditional SSH protocol directly.In order to achieve the purpose of enhancing the security of the protocol communication terminal and minimize the impact on the communication,this paper proposes a SSH protocol based on the third-party platform trusted attestation,which aims at combining the traditional SSH protocol with the remote attestation for trusted computing and enhancing the trust and security features of both sides of the communication without compromising the confidentiality,integrity and availability of the traditional SSH.This paper first studies the development of network security protocol and trusted computing,then discusses the foundation of research on SSH protocol and trusted computing and focuses on the security risks of SSH protocol.In order to achieve the design goal,this paper finishes the trusted attestation of terminal with the third party platform based on the traditional SSH protocol and form a trusted SSH protocol,finally achieve this protocol on the basis of OpenSSH.In order to prove the security features of this trusted protocol,this paper studies the attestation method of the security protocol and formalizes the analysis of the trusted protocol.Besides,this paper makes a theoretical analysis and verification of the precaution ability under different types of attacks.The security and trusted features of this protocol are improved compared with the traditional SSH protocol.This protocol has a positive significance for the development of trusted protocols.
Keywords/Search Tags:SSH Protocol, Trusted Computing, Remote Attestation, Protocol Analysis
PDF Full Text Request
Related items