Content deleted Content added
mNo edit summary |
|||
Line 21:
[[File:FTP vs Aspera Comparison.webm|thumb|A screencast showing downloading the same file from the European Sequence Read Archive via [[wget]]/[[File Transfer Protocol|FTP]] and ascp/Aspera/FASP]]
{{Internet protocol suite|transport=
The '''Fast Adaptive and Secure Protocol''' ('''FASP''') is a [[Proprietary software|proprietary]] data transfer [[Communication protocol|protocol]]. FASP is a network-optimized network protocol created by Michelle C. Munson and Serban Simu, productized by [[Aspera (company)|Aspera]], and now owned by [[IBM]] subsequent to its acquisition of Aspera. The associated client/server software packages are also commonly called Aspera.<ref name="register">{{cite web|url=https://www.theregister.co.uk/2015/10/01/aspera/|title=Aspera high speed file transfer: Let the cloud protocol wars begin|website=[[The Register]]}}</ref><ref name="ena">{{cite web|url=https://www.ebi.ac.uk/ena/browse/read-download#downloading_files_aspera|title=European Nucleotide Archive: Downloading using Aspera}}</ref> The technology is [[patented]] under US Patent #8085781, ''Bulk Data Transfer'', #20090063698, ''Method and system for aggregate bandwidth control''.<ref>{{cite web|url=https://patents.google.com/patent/US20090063698|title=Method and system for aggregate bandwidth control}}</ref> and others.
Line 31:
==Security==
{{Unreferenced section|date=July 2018}}
FASP has built-in security mechanisms that do not affect the transmission speed. The [[encryption]] [[algorithm]]s used are based exclusively on [[open standard]]s. Some product implementation use secure key exchange and authentication such as [[SSH]].
The data is optionally encrypted or decrypted immediately before sending and receiving with the [[Advanced Encryption Standard|AES-128]]. To counteract attacks by monitoring the encrypted information during long transfers, the AES is operated in [[cipher feedback mode]] with a random, public [[initialization vector]] for each block. In addition, an integrity check of each [[Block (data storage)|data block]] takes place, in which case, for example, a [[man-in-the-middle attack]] would be noticed.
|