IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 11    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 11,November 2012
Overhead of FTPS and FTP over IPsec in IPv6 networks
Full Text(PDF, )  PP.886-891  
Author(s)
Eng. N Pradeep Ruwan Nawarathne
KEYWORDS
Cryptographic protocols, FTP, FTPS, IPsec, IPv6, SFTP, TCP/IP networks.
ABSTRACT
FTP is client-server architecture based protocol for transferring files over TCP/IP networks. It is used with either user-based password authentication or anonymous user access. FTP has no encryption support. All transmissions are in clear text format. Us
References
[1] J. Postel and J. Reynolds. File transfer protocol (ftp). Internet Draft (RFC 959), 1985.

[2] P. Ford-Hutchinson. Securing FTP with TLS. Internet Draft (RFC 4217), 2005.

[3] R. Atkinson. Security Architecture for the Internet Protocol. Internet Draft (RFC 1825), 1995.

[4] M. Horowitz and S. Lunt. FTP Security Extensions. Internet Draft (RFC 2228), 1997.

[5] M. Allman and S. Ostermann. FTP Security Considerations. Internet Draft (RFC 2577), 1999.

[6] M.P. Clark. Data Networks IP and the Internet. 1st ed. West Sussex, England: John Wiley & Sons Ltd. 2003.

[7] Manual Pages: scp(1). Available at: http://www.openbsd.org/cgibin/man.cgi?query=scp&sektion=1 [Accessed March 30, 2010].

[8] T. Ylonen and C. Lonvick, Ed.The Secure Shell (SSH) Protocol Architecture. Internet Draft (RFC 4251), 2006.

[9] Christof Paar, Jan Pelzl, "The Advanced Encryption Standard", Chapter 4 of "Understanding Cryptography, A Textbook for Students and Practitioners". Springer, 2009.

[10] Triple DES Encryption Available at: http://www.tropsoft.com/strongenc/des3.html [Accessed February 5, 2010].

[11] S. Kelly. Security Implications of Using the Data Encryption Standard (DES). Internet Draft (RFC 4772). 2006.

[12] SECURE HASH STANDARD Available at: http://csrc.nist.gov/publications/fips/fips180-2/fips180- 2withchangenotice.pdf [Accessed January 11, 2010]

[13] R. Rivest. The MD5 Message-Digest Algorithm. Internet Draft (RFC 1321). 1992

[14] FTP Clients - Part 2: Explicit FTPS versus Implicit FTPS : Robert McMurray : The Official Microsoft IIS Site. Available at: http://blogs.iis.net/robert_mcmurray/archive/2008/11/10/ftpclients-part-2-explicit-ftps-versus-implicit-ftps.aspx [Accessed April 28, 2010].

[15] Stephen Kent and Randall Atkinson. Security architecture for the internet protocol. IETF, 1998.

[16] Heiko Niedermayer, Andreas Klenk, and Georg Carle. The Networking Perspective of Security Performance.

[17] Stephen Kent and Randall Atkinson. Ip authentication header. Internet Draft (RFC2402), 1998.

[18] Stephen Kent and Randall Atkinson. Ip encapsulating security payload (esp). Internet Draft (RFC2406), 1998.

[19] Blowfish. Available at: http://www.schneier.com/blowfish.html [Accessed December 28, 2009].

[20] D. Maughan, M. Schertler, M. Schneider and J. Turner. Internet Security Association and Key Management Protocol (ISAKMP). Internet Draft (RFC 2408), November 1998.

[21] P. Ford-Hutchinson. Diffie-Hellman Key Agreement Method. Internet Draft (RFC 2631), 1999.

[22] Pure-FTPd - About. Available at: http://www.pureftpd.org/project/pure-ftpd [Accessed April 3, 2010].

[23] FileZilla - Client Features. Available at: http://filezillaproject.org/client_features.php [Accessed February 20 , 2010].

[24] IPsec Tools Homepage. Available at: http://ipsectools.sourceforge.net/ [Accessed December 11, 2009].

[25] Wireshark. Available at: http://www.wireshark.org/ [Accessed April 18, 2010].

Untitled Page