Covert hopping communication method based on DNA encryption

A covert communication and transition technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as powerlessness, and achieve the effects of avoiding congestion, ensuring concealment, improving message transmission efficiency and system security

Active Publication Date: 2017-08-18
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, since the interception of messages in the communication process is difficult to be discovered by both parties in the communication, this makes it difficult to transmit more important messages in port hopping communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert hopping communication method based on DNA encryption
  • Covert hopping communication method based on DNA encryption
  • Covert hopping communication method based on DNA encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0057] Such as image 3 As shown, the jump covert communication method based on DNA encryption of the present invention, the steps are:

[0058] (1) deploy message receiving server and message sending client;

[0059] (2) The client enters the transmission text content, and then encrypts the text content into a text sequence of letters A-P;

[0060] (3) The client performs DNA encryption on the ciphertext as the text sequence of the letters A-P, that is, converts it into a base sequence composed of A (adenine), T (thymine), G (guanine), and C (cytosine);

[0061] (4) The server configures four IP addresses IP={ip 1 , ip 2 , ip 3 , ip 4} respectively correspond to the four bases of DNA, and the client accesses the corresponding IP of the server in turn according to the encrypted DNA sequence to send the DNA encrypted sequence;

[0062] (5) The service p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a covert hopping communication method based on DNA encryption. The method comprises the following steps: a message server and a client are deployed; the client encrypts text contents into a letter A-P text sequence; the client carries out the DNA encryption on the text sequence with letter A-P ciphertext; the server configures four IP addresses which are respectively corresponding to four basic groups of DNA, and the client sequentially accesses the corresponding IPs on the server according to the encrypted DNA sequence for DNA encrypted sequence sending; when accessing the IPs on the server, the client calculates service port numbers based on time stamps, and makes access requests according to the target IPs and ports; the server obtains a letter A-P plaintext encrypted sequence through conversion according to rules; and the server recovers the original contents from the encrypted sequence. The method provided by the invention has the advantage that DOS attacks and eavesdropping attacks during communication can be effectively resisted.

Description

technical field [0001] The invention mainly relates to the field of covert communication of network security, in particular to a communication method based on DNA encryption and port jumping, so as to realize the security of communication in the network system. Background technique [0002] With the rapid development of Internet technology, people gradually acquire, transmit, process and utilize information through network technology. Especially in recent years, with the popularization of wireless networks and portable devices, networks have become closely related to people's lives. However, due to the openness and sharing of the network itself, network security incidents have increased year by year, and network information security is facing severe challenges. [0003] Traditional network threats mainly include Network Sniffing Attack, Denial of Service, replay, and Man-in-the-Middle (MIMT) attacks. In response to the above-mentioned network threats, people have adopted n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0428H04L63/10H04L63/1441H04L61/5007
Inventor 石乐义崔玉文陈鸿龙李剑蓝李阳吕献勇单宝颖郭宏斌
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products