A Jump Covert Communication Method Based on DNA Encryption

A covert communication and transition technology, applied in transmission systems, electrical components, etc., can solve problems such as powerlessness, achieve the effects of avoiding congestion, ensuring concealment, improving message transmission efficiency and system security

Active Publication Date: 2020-12-04
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, since the interception of messages in the communication process is difficult to be discovered by both parties in the communication, this makes it difficult to transmit more important messages in port hopping communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Jump Covert Communication Method Based on DNA Encryption
  • A Jump Covert Communication Method Based on DNA Encryption
  • A Jump Covert Communication Method Based on DNA Encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in further detail below with reference to the accompanying drawings.

[0057] like image 3 As shown, the DNA encryption-based hopping concealment communication method of the present invention, the steps are:

[0058] (1) Deploy the message receiving server and the message sending client;

[0059] (2) The client inputs and transmits the text content, and then encrypts the text content into a text sequence of letters A-P;

[0060] (3) The client performs DNA encryption on the text sequence whose ciphertext is the letters A-P, that is, converts it into a base sequence consisting of A (adenine), T (thymine), G (guanine), and C (cytosine);

[0061] (4) Four IP addresses are configured on the server side IP={ip 1 , ip 2 , ip 3 , ip 4 } Corresponding to the four bases of DNA respectively, the client sequentially accesses the corresponding IP of the server according to the encrypted DNA sequence to send the DNA encrypted sequence; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a DNA encryption-based hopping concealment communication method, comprising the following steps: deploying a message server and a client; the client encrypts the text content into a text sequence of letters A-P; The text sequence of ‑P is encrypted by DNA; the server is configured with four IP addresses corresponding to the four bases of DNA, and the client accesses the corresponding IP of the server according to the encrypted DNA sequence to send the DNA encrypted sequence; When accessing the IP of the server, the service port number is calculated based on the timestamp, and then the access request is made through the destination IP and port; the server side converts it into a plaintext encrypted sequence of letters A-P according to the rules; the server restores the encrypted sequence to the original content. The invention can effectively defend against DOS attacks and eavesdropping attacks in the communication process.

Description

technical field [0001] The invention mainly relates to the hidden communication field of network security, in particular to a communication method based on DNA encryption and port hopping, which realizes the security of communication in a network system. Background technique [0002] With the rapid development of Internet technology, people gradually acquire, transmit, process and utilize information through network technology. Especially with the popularity of wireless networks and portable devices in recent years, the network has been closely related to people's lives. However, due to the openness and sharing of the network itself, network security incidents are increasing year by year, and network information security is facing severe challenges. [0003] Traditional network threats mainly include network sniffing attacks, denial of service (Denial of Service), replay and man-in-the-middle (MIMT) attacks. In response to the above-mentioned network threats, people have a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0428H04L63/10H04L63/1441H04L61/5007
Inventor 石乐义崔玉文陈鸿龙李剑蓝李阳吕献勇单宝颖郭宏斌
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products