scholarly journals RSA Key Exchange for the Secure Shell (SSH) Transport Layer Protocol

Author(s):  
B. Harris
2021 ◽  
Vol 1714 ◽  
pp. 012040
Author(s):  
Deepika Singh Kushwah ◽  
Mahesh Kumar ◽  
Lal Pratap Verma

2020 ◽  
Vol 62 (5-6) ◽  
pp. 287-293
Author(s):  
Felix Günther

AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.


2019 ◽  
Vol 16 (2) ◽  
pp. 30
Author(s):  
Fakhrur Razi ◽  
Ipan Suandi ◽  
Fahmi Fahmi

The energy efficiency of mobile devices becomes very important, considering the development of mobile device technology starting to lead to smaller dimensions and with the higher processor speed of these mobile devices. Various studies have been conducted to grow energy-aware in hardware, middleware and application software. The step of optimizing energy consumption can be done at various layers of mobile communication network architecture. This study focuses on examining the energy consumption of mobile devices in the transport layer protocol, where the processor speed of the mobile devices used in this experiment is higher than the processor speed used in similar studies. The mobile device processor in this study has a speed of 1.5 GHz with 1 GHz RAM capacity. While in similar studies that have been carried out, mobile device processors have a speed of 369 MHz with a RAM capacity of less than 0.5 GHz. This study conducted an experiment in transmitting mobile data using TCP and UDP protocols. Because the video requires intensive delivery, so the video is the traffic that is being reviewed. Energy consumption is measured based on the amount of energy per transmission and the amount of energy per package. To complete the analysis, it can be seen the strengths and weaknesses of each protocol in the transport layer protocol, in this case the TCP and UDP protocols, also evaluated the network performance parameters such as delay and packet loss. The results showed that the UDP protocol consumes less energy and transmission delay compared to the TCP protocol. However, only about 22% of data packages can be transmitted. Therefore, the UDP protocol is only effective if the bit rate of data transmitted is close to the network speed. Conversely, despite consuming more energy and delay, the TCP protocol is able to transmit nearly 96% of data packets. On the other hand, when compared to mobile devices that have lower processor speeds, the mobile devices in this study consume more energy to transmit video data. However, transmission delay and packet loss can be suppressed. Thus, mobile devices that have higher processor speeds are able to optimize the energy consumed to improve transmission quality.Key words: energy consumption, processor, delay, packet loss, transport layer protocol


Author(s):  
Atif Sharif ◽  
Vidyasagar Potdar ◽  
A. J. D. Rathnayaka

In WSN transport, layer protocol plays a significant role in maintaining the node’s energy budget. To find out the dependency of Transport layer on MAC/PHY layer, the authors have extensively tested various transport protocols using IEEE 802.11, IEEE 802.15.4 MAC/PHY protocols for WSN. For IEEE802.11 and IEEE802.15.4 with RTS/CTS ON the TCP variants has shown >80% packet delivery ratio and 5-20% packet loss, while for UDP it is around >63% and 19.54-35.18% respectively. On average 1-3% additional energy is consumed for packet retransmissions in IEEE 802.11 with RTS/CTS OFF whereas significant energy efficiency is observed in IEEE802.15.4 case. For IEEE 802.11 with RTS/CTS ON high throughput, low packet drop rate and increased E-2-E delay is observed, while for IEEE 802.15.4 improved power efficiency and jitter behavior is observed. This has led the foundation for the future development of the cross-layered energy efficient transport protocol for WSN.


Sign in / Sign up

Export Citation Format

Share Document