Netinfo Security ›› 2016, Vol. 16 ›› Issue (12): 34-45.doi: 10.3969/j.issn.1671-1122.2016.12.006

• Orginal Article • Previous Articles     Next Articles

A SSH Protocol Based on the Trusted Attestation of a Third Party Platform

Yaqi ZHANG1(), Yongzhong HE1, Aimin YU2   

  1. 1. School of Computer and Information Technology of Beijing Jiaotong University, Beijing 100044, China
    2. Institute of Information Engineering, CAS, Beijing 100090, China
  • Received:2016-09-01 Online:2016-12-20 Published:2020-05-13

Abstract:

TSSH (Shell Secure), as one of the most widely used network security protocols, faces many kinds of security problems. Under the existing conditions, the attacker can use the security vulnerability of SSH to implement the attack. Trusted computing remote attestation technology provides a way for us to prevent such attacks. SSH protocol can be combined with remote attestation to enhance security. There are many deficiencies in the existing research about the trusted security protocol.This paper firstly analyzes the security problems faced by SSH, then proposes aSSH protocolbased on trustedattestationof third party platform, namely TDSSH protocol and gives the main implementation on code level. Finally we conduct the safety analysis and evaluation of the protocol. TDSSH protocol proposed in this paper has positive significance for research about trusted enhancement ofother network security protocols.

Key words: SSH, remote attestation technology, trusted computing, trust enhancement

CLC Number: