Covert data transmission synchronization method based on protocol field redundancy in p2p network
A P2P network and data transmission technology, applied in the field of concealed data transmission synchronization, can solve the problems of lack of effective data encryption, transmission and reception confirmation mechanism, error handling mechanism, lack, etc., to achieve the effect of high security, low implementation cost, and guaranteed correctness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0032] This embodiment implements the covert information transmission protocol based on the Handshake message in the P2P network, which specifically includes the following three processes: covert channel establishment and key negotiation between communication parties, data transmission and confirmation, and covert channel connection release.
[0033] Here, this embodiment defines the control information in the protocol process and its corresponding code values. See Table 1 for their definitions, which are mainly used for identity authentication of the concealed client, response during concealed transmission, and connection release, including DATA_ACk, ERR, FIN, FIN_ACK, CC.
[0034] Control information and its codes defined in Table 1
[0035] code value symbol specific description 1 DATA_ACK Confirmation that the secret data was received correctly 2 EXIST data already exists 3 ERR An error occurred 4 FIN release connection request ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


