Confidential information transmission method in P2P network based on BitTorrent protocol

A P2P network and secret information technology, applied in the field of computer network and information security, to achieve the effect of low cost and good concealment

Active Publication Date: 2016-09-21
JIANGSU UNIV OF SCI & TECH
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is a certain amount of redundancy in the BT keyword of this message, and no in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confidential information transmission method in P2P network based on BitTorrent protocol
  • Confidential information transmission method in P2P network based on BitTorrent protocol
  • Confidential information transmission method in P2P network based on BitTorrent protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further explained below in conjunction with the accompanying drawings.

[0027] Taking the client software Vuze4.4 as an example, the secret information transmission method under the P2P network based on the BitTorrent protocol provided by the present invention is further clarified.

[0028] Such as figure 1 As shown, the present invention implements covert communication based on the Handshake message transmission channel in the P2P network. The sender first encrypts the plaintext P of the secret information to generate a ciphertext S, and then uses a channel encoder to embed the ciphertext S into In the BT keyword of the Handshake message to be sent, the secret information is transmitted out together with the Handshake message. The receiver obtains the string information of the current BT keyword by monitoring the Handshake message receiving channel, and performs corresponding operations according to whether it is an abnormal BT keyword; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the computer network and information safety technology field, and discloses a confidential information transmission method in a P2P network based on a BitTorrent protocol. A covert transmission channel is established based on Handshake information transmission in the P2P network, and by adopting the established covert transmission channel, confidential information is embedded in BT key words of Handshake information in an information coding way, which is not sensitive to case, for transmission. The covert transmission is carried out by introducing the information coding way, which is not sensitive to the case, to the BT key words of the handshake information. The confidential information transmission method provided by the invention is simple and effective, is low in realization cost, is safer and more reliable, and is not easy to crack.

Description

technical field [0001] The invention belongs to the technical field of computer network and information security, in particular to a secret information transmission method under the P2P network based on the BitTorrent protocol. Background technique [0002] With the rapid development of computer network communication technology, the security problem of information transmission is becoming more and more serious. Traditional encryption technology scrambles secret information and turns it into chaotic ciphertext, but it directly exposes the existence of confidential communication and easily attracts the attention of attackers. Information hiding technology is to hide secret information in approximately normal data streams, thereby hiding the existence of secret information transmission channels. Compared with traditional encryption technology, it has an extra layer of means to confuse attackers and is more secure. . [0003] P2P network is a distributed peer-to-peer network e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0428H04L67/06H04L67/1078
Inventor 翟江涛高斌王茗倩戴跃伟
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products