Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ethereum covert communication method based on whisper protocol

A covert communication and Ethereum technology, applied in the field of information hiding, can solve the problems of heavy workload, low information embedding rate, cumbersome implementation, etc., and achieve good anti-detection, good anti-interference, good embedding efficiency and transmission efficiency Effect

Active Publication Date: 2022-02-15
YANGZHOU UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above method has two deficiencies. First, increasing the number of single transaction address embedding and the number of transaction submissions in a single block does not change the information embedding method of 1bit per address, and does not fundamentally solve the defect of low information embedding rate; The second is that the screening of transactions requires the use of Kleptography technology to try to extract each blockchain transaction until the transaction that can successfully extract the key is found and screened out. The workload is relatively large and the implementation is relatively cumbersome.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ethereum covert communication method based on whisper protocol
  • Ethereum covert communication method based on whisper protocol
  • Ethereum covert communication method based on whisper protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0028] In one embodiment, combined with figure 1 , provide a kind of ethernet concealed communication method based on whisper protocol, described method comprises the following steps:

[0029] Step 1, covert interaction topic-key pair, fundamentally guarantee the security of subsequent covert communication;

[0030] Step 2, encrypt and encode the ciphertext information T to be transmitted to obtain new ciphertext information T' to ensure its unreadability; here, it is to make the information have higher security and better integrate with the carrier information Combine. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a concealed communication method of Ethereum based on the whisper protocol, comprising: concealed interaction topic-key pair; encrypting and encoding the message T to be transmitted to obtain T'; randomly generating sentences as an effective message body in the whisper protocol Carrier payload; match T' with the carrier, record the index information of the matched character; encrypt the index information, and expand it so that the total length of the message is a multiple of 256 bytes, and use padding as the extended part of the message body in the whisper protocol; set the whisper letter The structural information of the letter, set the subject of the letter as the interactive topic, and encrypt it; broadcast the letter to realize information transmission; the receiver screens the letter through the subject, decrypts the letter with the corresponding key to obtain the payload and padding; decrypts the padding to obtain the decrypted information, that is, the index, Combined with an effective carrier for information restoration. The method of the present invention has high security, good anti-interference, anti-tampering and anti-detection properties, and combines the theme mechanism of whisper to avoid unnecessary consumption when the receiver screens data packets.

Description

technical field [0001] The invention belongs to the field of information hiding, in particular to an ethernet concealed communication method based on whisper protocol. Background technique [0002] Traditional covert communication still uses a centralized single channel, which makes the communication process susceptible to interference from factors such as the network environment and thus affects the effect of covert communication. In addition, centralized nodes and devices are vulnerable to attacks, which may even cause the communication system to be paralyzed. With its characteristics of decentralization and anti-interference, blockchain has been developed rapidly and widely promoted in recent years. Its characteristics can effectively alleviate the defects of traditional covert communication, and at the same time make the effect of covert communication better. How to effectively apply covert communication to the blockchain has become the focus of researchers. As a wide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0428
Inventor 张乐君张智杰薛霄陈慧灵
Owner YANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products