Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret information transmission method in p2p network based on bittorrent protocol

A P2P network, secret information technology, applied in the field of computer network and information security, to achieve the effect of low cost and good concealment

Active Publication Date: 2019-03-29
JIANGSU UNIV OF SCI & TECH
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is a certain amount of redundancy in the BT keyword of this message, and no information hiding method based on this message has been found from public information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret information transmission method in p2p network based on bittorrent protocol
  • Secret information transmission method in p2p network based on bittorrent protocol
  • Secret information transmission method in p2p network based on bittorrent protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further explained below in conjunction with the accompanying drawings.

[0027] Taking the client software Vuze4.4 as an example, the secret information transmission method under the P2P network based on the BitTorrent protocol provided by the present invention is further clarified.

[0028] Such as figure 1 As shown, the present invention implements covert communication based on the Handshake message transmission channel in the P2P network. The sender first encrypts the plaintext P of the secret information to generate a ciphertext S, and then uses a channel encoder to embed the ciphertext S into In the BT keyword of the Handshake message to be sent, the secret information is transmitted out together with the Handshake message. The receiver monitors the Handshake message receiving channel to obtain the string information of the current BT keyword, and performs corresponding operations according to whether it is an abnormal BT keyword; if ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer network and information security, and mainly discloses a secret information transmission method under the P2P network based on the BitTorrent protocol. The secret transmission channel is established on the basis of the Handshake message transmission channel in the P2P network, relying on the established secret transmission method. channel, and embed the secret information into the BT keyword of the Handshake message for transmission by means of case-insensitive information encoding. The present invention introduces a case-insensitive information encoding method into the BT keyword of the Handshake message to implement secret communication. The secret information transmission method provided by the present invention is not only simple and efficient, but also has low implementation cost, and is more secure and reliable, and is not easy to be cracked.

Description

technical field [0001] The invention belongs to the technical field of computer network and information security, in particular to a secret information transmission method under the P2P network based on the BitTorrent protocol. Background technique [0002] With the rapid development of computer network communication technology, the security problem of information transmission is becoming more and more serious. Traditional encryption technology scrambles secret information and turns it into chaotic ciphertext, but it directly exposes the existence of confidential communication and easily attracts the attention of attackers. Information hiding technology is to hide secret information in approximately normal data streams, thereby hiding the existence of secret information transmission channels. Compared with traditional encryption technology, it has an extra layer of means to confuse attackers and is more secure. . [0003] P2P network is a distributed peer-to-peer network e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0428H04L67/06H04L67/1078
Inventor 翟江涛高斌王茗倩戴跃伟
Owner JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products