Transmitting/receiving method for secret communication

A receiving method and technology of sending method, which are applied in the field of sending/receiving of stealth communication, can solve the problems of low security, easy to be attacked, etc., and achieve the effect of good concealment, good security and good secrecy.

Inactive Publication Date: 2008-10-01
JIANGSU UNIV OF SCI & TECH
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is: aiming at the disadvantages of being easily attacked and having low security existing in the existing information hiding technology based on the TCP / IP protocol introduced above, a method for realizing secret communication in a computer network environment is proposed. Send / receive method for better secrecy and attack resistance of secret information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transmitting/receiving method for secret communication
  • Transmitting/receiving method for secret communication
  • Transmitting/receiving method for secret communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The content of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0043] 1. Use the data unit of the TCP protocol as the concealed carrier (see attached figure 1 And attached figure 2 ) method steps are:

[0044] (1) Encrypt the secret message. The key is shared by the sender and the receiver, the cryptographic algorithm uses RC4, and the encrypted information is divided into 8-bit groups, a total of m groups.

[0045] (2) Construct m TCP segments. The source port, destination port, serial number and other header fields and data fields of each TCP segment are filled with corresponding correct values, and a 16-bit checksum is generated. The checksum generation process is to calculate the checksum with the header, data and pseudo-header of the TCP segment. When calculating, first divide the part to be checked into a sequence of 16-bit words, and set the checksum to Zero, after adding all 16-bit words using...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a transmitting/receiving method of covert communication. The method conceals important information waiting convey into a carrier in computer network environment, and important information is unware. When a transmitter transmits network date, a secret information is random embedded into a check field of network protocol date unit (TCP section or UDP) header, and date field is corrected for ensuring check sum right after the secret information is embedded; a receiver extracts the secret information after receiving network protocol date unit from network. The method has better confidentiality and anti-attack by using check and covert information of protocol date unit, and is safely and reliable. The method is especially suitable for convert communication of important information with less date quantity.

Description

technical field [0001] The invention belongs to the technical field of communication and information security, relates to a communication method, and more particularly relates to a sending / receiving method of covert communication. Background technique [0002] Covert communication is an important aspect of communication and information security technology, and information hiding technology is an important method to realize covert communication, that is, to hide important information to be transmitted in the carrier so that it is not easy to be detected. There are many carriers of information hiding technology, such as text, image, audio, video, and TCP / IP headers. After searching, it is found that the existing information hiding methods based on the TCP / IP protocol mainly rely on the following domains to hide: (1) the option domain of the TCP or IP header and the domain that is rarely used when transmitting data; (2) the transmission data Fields that must be filled in to hi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36H04L29/06
Inventor 刘镇钱萍周亮
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products