Supercharge Your Innovation With Domain-Expert AI Agents!

Method for improving SSH protocol security based on SM2 and SM4 cryptographic algorithms

A protocol security and national secret algorithm technology, which is applied in the field of improving SSH protocol security based on SM2 and SM4 national secret algorithms, can solve problems such as unreliable passwords, and achieve good support, good maintainability and high performance.

Inactive Publication Date: 2021-04-30
北京航天云路有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Telnet and Berkeley rlogin, rsh, rexec and other protocols use clear text transmission, use unreliable passwords, and are vulnerable to monitoring, sniffing and man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for improving SSH protocol security based on SM2 and SM4 cryptographic algorithms
  • Method for improving SSH protocol security based on SM2 and SM4 cryptographic algorithms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The following examples are intended to illustrate the invention, but are not intended to limit the scope of the invention.

[0022]A method of improving SSH protocol security based on SM2, SM4 national algorithm, including the following steps: replacing the algorithm of key authentication with the SM2 national algorithm during the SSH connection, in the client-server communication phase The symmetric encryption algorithm is replaced with the SM4 national algorithm, and the SSH protocol that supports the National Class Algorithm is implemented.

[0023]A method of improving SSH protocol security based on SM2, SM4 national algorithm, the specific steps are as follows:

[0024]S1, use Golang official code (https: / / github.com / golang / crypto) as a project root directory;

[0025]S2, in the project root directory new folder SM2 and SM4, then copy the contents of the SM2 and SM4 folders in the code base (https: / / github.com / tjfoc / gmsm) to the new f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of networks, in particular to a method for improving SSH protocol security based on SM2 and SM4 cryptographic algorithms. Symmetric encryption and asymmetric encryption algorithms in the SSH protocol are replaced by using cryptographic algorithms SM2 and SM4, so that the security of the SSH protocol in the secret-related network is improved, and the security risk of the SSH protocol in the secret-related network is avoided. The method comprises the following steps: in an SSH connection process, replacing a key authentication algorithm with an SM2 national cryptographic algorithm, and in a client server communication stage, replacing a symmetric encryption algorithm with an SM4 national cryptographic algorithm, thereby realizing an SSH protocol supporting the national cryptographic algorithm.

Description

Technical field[0001]The present invention relates to the field of network technologies, and in particular, to a method of improving SSH protocol security based on SM2, SM4 national algorithm.Background technique[0002]Secure Shell (SSH) is an encrypted network transport protocol that provides a secure transport environment for network services in unsafe networks. As shown in FIG. 1, a process diagram of the SSH connection. SSH implements the connection between the SSH client and the server by creating a secure tunnel in the network. SSH's most common use is a remote login system, and people usually use SSH to transmit command line interfaces and remote execution commands. SSH uses the highest frequency to use the class UNIX system, but the Windows operating system can also be limited to SSH. In 2015, Microsoft announced that the original SSH protocol support will be provided in the future operating system, and the Windows 10 1803 has an OpenSSH tool.[0003]SSH is authenticated as an ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L69/02H04L63/20H04L63/0435H04L63/168
Inventor 单酉冀天宇
Owner 北京航天云路有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More