Secret information transmission method based on bittorrent protocol have message

A technology of secret information and transmission method, applied in the field of secret information transmission based on the BitTorrent protocol Have message, to avoid communication load, improve concealment and robustness

Active Publication Date: 2018-10-23
JIANGSU UNIV OF SCI & TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

No information hiding method based on this message has been found from public information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret information transmission method based on bittorrent protocol have message
  • Secret information transmission method based on bittorrent protocol have message
  • Secret information transmission method based on bittorrent protocol have message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further explained below in conjunction with the accompanying drawings.

[0034] Taking the client software Vuze4.4 as an example, an information hiding method based on BitTorrent protocol Have message sorting of the present invention is further clarified.

[0035] figure 1 It is an overall flowchart of the information hiding method of the present invention. The hidden channel is constructed based on the transmission channel of the BT protocol Have message. The sender undergoes two processes of encryption and encoding, and adjusts the order of the Have messages in the N groups of Have message sequences according to the N groups of secret information ciphertext S, thereby completing the N groups of The embedding of the secret information ciphertext S, the secret information is transmitted together with the Have message. The receiver obtains N groups of secret information plaintext P through reverse decoding and decryption, and submits it to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer network and information security, and mainly discloses a secret information transmission method based on the BitTorrent protocol Have message, constructs a hidden channel based on the transmission channel of the BT protocol Have message, and adjusts the sequence of the Have message according to the code of the secret information The order of the Have message, so as to complete the embedding of the secret information, so that the secret information is transmitted together with the Have message. The present invention introduces the information coding technology in the BT protocol Have message sorting to construct the hidden channel, which makes the transmission of secret information more convenient and efficient, not only avoids the extra communication load brought to the existing Have message channel, but also introduces the circular shift of the information coding position. Bit mechanism and information verification mechanism further improve the concealment and robustness of secret information transmission.

Description

technical field [0001] The invention belongs to the technical field of computer network and information security, in particular to a secret information transmission method based on the BitTorrent protocol Have message. Background technique [0002] With the rapid development of computer network communication technology, the security problem of information transmission is becoming more and more serious. Traditional encryption technology scrambles secret information and turns it into chaotic ciphertext, but it directly exposes the existence of confidential communication and easily attracts the attention of attackers. Information hiding technology is to hide secret information in approximately normal data streams, thereby hiding the existence of secret information transmission channels. Compared with traditional encryption technology, it has an extra layer of means to confuse attackers and is more secure. . [0003] P2P network is a distributed peer-to-peer network environmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/28H04L29/06G06F21/60H04N19/46
CPCG06F21/60G06F21/602G06F21/606H04L9/06H04L63/0428H04N19/46
Inventor 戴跃伟高斌唐雨翟江涛
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products