Analysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructure

dc.contributor.advisorRoy, DP (Professor)
dc.contributor.authorHailu, Banchi
dc.date.accessioned2018-06-27T07:45:10Z
dc.date.accessioned2023-11-04T15:14:50Z
dc.date.available2018-06-27T07:45:10Z
dc.date.available2023-11-04T15:14:50Z
dc.date.issued2008-02
dc.description.abstractSSH, Secure Shell, is a protocol that allows user to log into another computer, to execute commands in a remote machine, and to move files from one machine to another securely over an insecure network. It provides cryptographic authentication, encryption and data integrity to secure network communications. Negotiation of the security parameters and authentication of the peers require using public key cryptosystems. Public key operations are generally slow. In order to improve the performance of the protocol and make it applicable in both powerful and resource constrained environments Elliptic Curve Cryptography is used. In addition, since SSH uses plain public keys to authenticate a remote server, always the first time authentication is vulnerable to the Man-in-the-Middle attack. Using a public key certificate as a host key will eliminate the above vulnerability. And it requires a PKI, Public Key Infrastructure to support the certificate approach. PKI may potentially impact the performance of the security protocol. And PKI path validation techniques (certificate revocation status checking) need more storage capacity, more communication cost and more processing time. This seems to have a problem to scale with large communicating nodes. In this thesis, SSH’s key exchange handshake is implemented using java and bouncy castle cryptographic api. Performance with RSA (Rivest-Shamir-Adleman) and ECDH_ECDSA (Elliptic Curve Diffie-Hellman Elliptic Curve Digital Signature Algorithm) key exchange suites have been compared for both PKI and non-PKI authentication. Client waiting time (key exchange latency), server key exchange throughput, and revocation status message size have been measured for each key exchange suite. Simulation results show that ECC has better processing time performance and better throughput than RSA. Response time and revocation status message size are minimum when Authenticated Directories are used as a certificate status responder. Keywords used: SSH, PKI, Elliptic Curve Cryptography, ECDH, ECDSA, certificate, certificate path validation, certificate revocation status checking, key exchange handshake, authentication, Authenticated Dictionaries and RSA.en_US
dc.identifier.urihttp://etd.aau.edu.et/handle/123456789/3949
dc.language.isoenen_US
dc.publisherAddis Ababa Universityen_US
dc.subjectSshen_US
dc.subjectPkien_US
dc.subjectElliptic Curve Cryptographyen_US
dc.subjectEcdhen_US
dc.subjectEcdsaen_US
dc.subjectCertificateen_US
dc.subjectertificate Path Validationen_US
dc.subjectCertificate Revocation Status Checkingen_US
dc.subjectKey Exchange Handshakeen_US
dc.subjectAuthenticationen_US
dc.subjectAuthenticated Dictionaries and Rsaen_US
dc.titleAnalysis of the Key Exchange method of SSH using Elliptic Curve Cryptography and a Public Key Infrastructureen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Banchi Hailu.pdf
Size:
324.12 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Plain Text
Description: