Hidden communication message security coding method and system based on block chain, and medium

A covert communication and secure coding technology, applied in the field of secure coding of covert communication messages based on blockchain, can solve problems such as errors, explicit reception, and easy exposure

Active Publication Date: 2020-10-23
郑州信大先进技术研究院
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (3) Anonymous communication based on flooding algorithm is a new research hotspot in the field of anonymous communication transmission recently. It is mainly based on flooding, epidemic and other flooding algorithms to realize anonymous communication. It is still in the laboratory research stage, and there is no mature anonymous communication that is actually deployed. Communication Systems
However, the main challenge faced by the anonymous communication system based on the flooding algorithm is that the system will generate a large amount of network transmission traffic, which requires a large network bandwidth; at the same time, in the current state, the stability and reliability of the system algorithm are not enough
[0010] To su

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hidden communication message security coding method and system based on block chain, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] as attached figure 1 As shown, a block chain-based covert communication message security encoding method, which includes the following steps:

[0035] The sending end performs the first covert processing on the covert data to be transmitted to obtain a covert message group;

[0036] Generate a first smart contract on the initial blockchain node based on the transaction event that the sender transmits the covert message group to the initial blockchain node;

[0037]The initial block chain node broadcasts the covert message group and the first smart contract to the main neighbor block chain node of the block chain, and the main neighbor block chain node broadcasts the covert message group and the The first smart contract is broadcast to the second neighbor blockchain node;

[0038] The receiving end obtains the required covert message group according to the identification code of the covert message group; the second smart contract is generated based on the transaction e...

Embodiment 2

[0079] The difference between this embodiment and Embodiment 1 is that the first concealment process may also include the following steps: perform digest operation on the concealed data to be transmitted to obtain digest information, use the first encryption algorithm to encrypt the digest information, and obtain the verification field; after dividing the concealed data to be transmitted into several sub-concealed data blocks, several identification fields are generated based on the sequence number of each sub-concealed data block and the total number of sub-concealed data blocks; the identification field and the sub-concealed data blocks are spliced ​​to generate a concealed Data grouping: performing random out-of-sequence processing on the concealed data group to obtain a out-of-order message group, adding the verification field before the out-of-order message group, and performing encryption processing to obtain a new concealed message group.

[0080] It should be noted that...

Embodiment 3

[0082] The difference between this embodiment and Embodiment 1 lies in that: the general transaction information broadcast in the blockchain network is obtained, and the general transaction information is used as the carrier of the concealed message group.

[0083] It is understandable that due to the permanent public storage of transaction data, the adversary has enough time to analyze all historical transaction data, so it is necessary to reduce the particularity of transactions carrying concealed data and increase the difficulty for the adversary to distinguish special transactions from ordinary transactions. Through statistical analysis of ordinary transaction data, the characteristics of ordinary transactions are sorted out, and the characteristics of ordinary transactions are simulated when constructing special transactions, so that opponents cannot easily identify special transactions.

[0084] It should be noted that, the initial block chain node extracts the characteri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hidden communication message security coding method and system based on a block chain, and a medium, and the method comprises the following steps: a transmitting end carries out the first hidden processing of to-be-transmitted hidden data, and obtains a hidden message group; a first smart contract is generated on the initial block chain node based on a transaction event that the sending end transmits the hidden message group to the initial block chain node; the receiving end gains the required hidden message group according to the identification code; a transaction event of the hidden message group is acquired from a corresponding node in a block chain based on a receiving end to generate a second smart contract; the supervision terminal obtains the first intelligent contract and the second intelligent contract, performs validity check on the first intelligent contract and the second intelligent contract, and sends a sending terminal secret key corresponding tothe hidden message group to a receiving terminal; and the transaction event is stored in a block chain account book. According to the invention, safe and reliable communication with high efficiency,expandability, large transmission quantity and good concealment can be realized.

Description

technical field [0001] The present invention relates to the technical field of covert communication, in particular, to a block chain-based covert communication message security coding method, system and medium. Background technique [0002] In traditional covert communication, there are problems such as covert channels are easy to be detected, covert participants are easy to be exposed, covert transmission is poor in robustness, and it is difficult to realize group covert transmission. Outstanding advantages include: 1) stable decentralized self-organizing network; 2) non-directional information transmission mechanism; 3) anonymous account mechanism. Blockchain uses transactions to build covert channels and transmit covert data information, which has important application value for the development of covert communication technology in the communication field. [0003] At present, people have made a series of achievements in the research direction of anonymous communication ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L29/08G06Q40/04G06Q20/38G06F21/64
CPCH04L63/0421H04L63/0428H04L9/3218H04L67/10G06Q40/04G06Q20/3829G06F21/64
Inventor 焦少波汪淼柯德营唐智强易凡
Owner 郑州信大先进技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products