O
Orclever
Back to Journal
Research Article Open AccessOrclever Native

Cryptographic Enhancement of Named Pipes for Secure Process Communication

Huseyin Karacali1,
Nevzat Donum2,
Efecan Cebel3
1TTTech Auto Turkey
2TTTech Auto Turkey
3TTTech Auto Turkey
Published:May 31, 2024

Abstract

This study aims to enhance cryptographic security within the "named pipe" Inter-Process Communication (IPC) method utilized in Unix and Unix-like systems. Addressing security vulnerabilities inherent in the named pipe structure, this research endeavors to augment IPC security by integrating a cryptographic layer using the Advanced Encryption Standard (AES) encryption algorithm with 128-bit length key. The named pipe structure allows all processes specified by the owner or group to access data within the pipe. This implies the potential for processes generated by malicious software to access this data. By integrating a cryptographic secure communication structure into this bidirectional, readily applicable method, this study seeks to fortify the protocol. Technical objectives of this research involve encrypting messages with the AES-128 algorithm, enabling meaningful decryption of messages written with the same algorithm, and preventing interpretation of messages within the pipe by third-party processes lacking this cryptographic structure. Experimental findings showcase that when monitored by a process lacking this cryptographic structure, encrypted and incomprehensible messages are displayed, indicating the resistance of the encrypted structure against external interventions. In conclusion, this study introduces a new method to enhance security in IPC by adding a cryptographic security layer to the named pipe. This research may have implications for IPC security in Unix systems and could be applicable to other IPC methods facing similar security vulnerabilities.

Keywords
inter-processcommunicationnetworksecuritycryptographyLinuxAES-128

References

  1. 1.baeldung, W. by: (2020, October 20). Anonymous and named pipes in linux. Baeldung on Linux. https://www.baeldung.com/linux/anonymous-named-pipesLink
  2. 2.R. Lemos, T. Heinrich, C. A. Maziero and N. C. Will, "Is It Safe? Identifying Malicious Apps Through the Use of Metadata and Inter-Process Communication", 2022 IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 2022, pp. 1-8, doi: 10.1109/SysCon53536.2022.9773881.DOI
  3. 3.M. Asif, M. M. Iqbal, M. U. Khalid, Y. Saleem, "SECURING THE MESSAGE PASSING IN INTER PROCESSCOMMUNICATION OF A MICROKERNEL", Sci.Int(Lahore),26(5),2103-2106,2014
  4. 4.Zeyu Mi, Dingji Li, Zihan Yang, Xinran Wang, and Haibo Chen. 2019. SkyBridge: Fast and Secure Inter-Process Communication for Microkernels. In Proceedings of the Fourteenth EuroSys Conference 2019 (EuroSys '19). Association for Computing Machinery, New York, NY, USA, Article 9, 1–15. https://doi.org/10.1145/3302424.3303946DOI
  5. 5.K. J. Lin, C. P. Weng and T. K. Hou, "Enhance hardware security using FIFO in pipelines," 2011 7th International Conference on Information Assurance and Security (IAS), Melacca, Malaysia, 2011, pp. 344-349, doi: 10.1109/ISIAS.2011.6122844.DOI
  6. 6.A. E. M. Eljialy, Sultan Ahmad, "A Novel Technique to Secure Inter-Process Communication," IJCSNS International Journal of Computer Science and Network Security, VOL.22 No.9, September 2022
  7. 7.“Ubuntu PC operating system | Ubuntu,” Ubuntu. https://ubuntu.com/desktopLink
  8. 8.Educative, “Educative Answers - trusted answers to developer questions,” Educative. https://www.educative.io/answers/what-is-ubuntu-linuxLink
  9. 9.H. Dinari, “Inter-Process Communication (IPC) in Distributed Environments: An Investigation and Performance Analysis of Some Middleware Technologies,” International Journal of Modern Education and Computer Science, vol. 12, no. 2, pp. 36–52, Apr. 2020, doi: 10.5815/ijmecs.2020.02.05.DOI
  10. 10.“The Interprocess Communication (IPC) overview.” https://www.ibm.com/support/pages/interprocess-communication-ipc-overviewLink
  11. 11.I. Clough and N. Bergmann, "Using Linux FIFOs to allow Flexible Hardware/Software Communications on Reconfigurable Systems-on-Chip," FSP Workshop 2018; Fifth International Workshop on FPGAs for Software Programmers, Dublin, Ireland, 2018, pp. 1-2.
  12. 12.“Introduction to named Pipes | Linux Journal.” https://www.linuxjournal.com/article/2156Link
  13. 13.H. Gaikwad, “What are Named Pipes in Linux? - Scaler Topics,” Scaler Topics, Aug. 17, 2023. https://www.scaler.com/topics/linux-named-pipe/Link
  14. 14.Daemen, J., & Rijmen, V. (2000). The block Cipher Rijndael. In Lecture Notes in Computer Science (pp. 277–284). https://doi.org/10.1007/10721064_26DOI
  15. 15.Dworkin, M. J. (2023). Advanced Encryption Standard. https://doi.org/10.6028/nist.fips.197-upd1DOI
  16. 16.OpenSSL Foundation, Inc. (n.d.). /index.html. https://www.openssl.org/Link
  17. 17.OpenSSL Foundation, Inc. (n.d.-a). /docs/man3.1/man7/crypto.html. https://www.openssl.org/docs/man3.1/man7/crypto.htmlLink
  18. 18.Kekayan. (2018, July 7). Encrypt files using AES with OPENSSL - Kekayan - Medium. Medium. https://kekayan.medium.com/encrypt-files-using-aes-with-openssl-dabb86d5b748Link
  19. 19.H. Karacali, N. Dönüm, and E. Cebel, “Secure and efficient NVM usage for embedded systems using AES-128 and Huffman Compression,” The European Journal of Research and Development, vol. 3, no. 4, pp. 333–356, Dec. 2023, doi: 10.56038/ejrnd.v3i4.281.DOI
Download PDF
Cite This Article
Karacali, H., Donum, N., Cebel, E. (2024). Cryptographic Enhancement of Named Pipes for Secure Process Communication. *The European Journal of Research and Development*, 4(2), 1-18. https://doi.org/10.56038/ejrnd.v4i2.428

Bibliographic Info

JournalThe European Journal of Research and Development
Volume4
Issue2
Pages1–18
PublishedMay 31, 2024
eISSN2822-2296