Ethereum covert communication method based on whisper protocol

A covert communication and Ethereum technology, applied in the field of information hiding, can solve the problems of heavy workload, low information embedding rate, cumbersome implementation, etc., and achieve good anti-detection, good anti-interference, good embedding efficiency and transmission efficiency Effect

Active Publication Date: 2020-09-11
YANGZHOU UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above method has two deficiencies. First, increasing the number of single transaction address embedding and the number of transaction submissions in a single block does not change the information embedding method of 1bit per address, and does not fundamentally solve the defect of low information embedding rate; The second is that the screening of transactions requires the use of Kleptography technology to try to extract each blockchain transaction until the transaction that can successfully extract the key is found and screened out. The workload is relatively large and the implementation is relatively cumbersome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ethereum covert communication method based on whisper protocol
  • Ethereum covert communication method based on whisper protocol
  • Ethereum covert communication method based on whisper protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0028] In one embodiment, combined with figure 1 , provide a kind of ethernet concealed communication method based on whisper protocol, described method comprises the following steps:

[0029] Step 1, covert interaction topic-key pair, fundamentally guarantee the security of subsequent covert communication;

[0030] Step 2, encrypt and encode the ciphertext information T to be transmitted to obtain new ciphertext information T' to ensure its unreadability; here, it is to make the information have higher security and better integrate with the carrier information Combine. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an Ethereum covert communication method based on a whisper protocol. The method comprises the steps: coverting and interacting a subject-key pair; encrypting and encoding the message T to be transmitted to obtain T '; randomly generating a statement as an effective carrier payload of a message body in a whisper protocol; carrying out character matching on the T' and a carrier, and recording index information of matched characters; encrypting the index information, and expanding the index information to enable the total length of the message to be a multiple of 256 bytesand serve as an expanded part padding of a message body in a whipper protocol; setting structure information of the whisper letter, setting a theme of the letter as an interactive theme, and encrypting the interactive theme; broadcasting letters to achieve information transmission; enabling the receiver to screen letters through the theme, and decrypt the letters by using the corresponding secretkeys to obtain payload and padding; and decrypting the padding to obtain decrypted information, namely an index, and performing information restoration in combination with the effective carrier. Themethod provided by the invention is high in security, has good anti-interference performance, tamper resistance and detection resistance, and avoids unnecessary consumption when a receiver screens data packets in combination with a theme mechanism of the whisper.

Description

technical field [0001] The invention belongs to the field of information hiding, in particular to an ethernet concealed communication method based on whisper protocol. Background technique [0002] Traditional covert communication still uses a centralized single channel, which makes the communication process susceptible to interference from factors such as the network environment and thus affects the effect of covert communication. In addition, centralized nodes and devices are vulnerable to attacks, which may even cause the communication system to be paralyzed. With its characteristics of decentralization and anti-interference, blockchain has been developed rapidly and widely promoted in recent years. Its characteristics can effectively alleviate the defects of traditional covert communication, and at the same time make the effect of covert communication better. How to effectively apply covert communication to the blockchain has become the focus of researchers. As a wide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428
Inventor 张乐君张智杰薛霄陈慧灵
Owner YANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products