CN108566379A - P2p网络下基于协议字段冗余的隐蔽数据传输同步方法 - Google Patents
P2p网络下基于协议字段冗余的隐蔽数据传输同步方法 Download PDFInfo
- Publication number
- CN108566379A CN108566379A CN201810212292.3A CN201810212292A CN108566379A CN 108566379 A CN108566379 A CN 108566379A CN 201810212292 A CN201810212292 A CN 201810212292A CN 108566379 A CN108566379 A CN 108566379A
- Authority
- CN
- China
- Prior art keywords
- data
- handshake
- fields
- key
- peer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/12—Arrangements for detecting or preventing errors in the information received by using return channel
- H04L1/16—Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
- H04L1/1607—Details of the supervisory signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Abstract
Description
代码值 | 符号 | 具体描述 |
1 | DATA_ACK | 已正确接收秘密数据确认 |
2 | EXIST | 数据已存在 |
3 | ERR | 出现错误 |
4 | FIN | 释放连接请求 |
5 | FIN_ACK | 确认释放 |
6 | CC | 隐蔽客户端 |
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810212292.3A CN108566379B (zh) | 2018-03-15 | 2018-03-15 | P2p网络下基于协议字段冗余的隐蔽数据传输同步方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810212292.3A CN108566379B (zh) | 2018-03-15 | 2018-03-15 | P2p网络下基于协议字段冗余的隐蔽数据传输同步方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108566379A true CN108566379A (zh) | 2018-09-21 |
CN108566379B CN108566379B (zh) | 2020-02-21 |
Family
ID=63532670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810212292.3A Active CN108566379B (zh) | 2018-03-15 | 2018-03-15 | P2p网络下基于协议字段冗余的隐蔽数据传输同步方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108566379B (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547119A (zh) * | 2018-12-15 | 2019-03-29 | 华南理工大学 | 基于非可听音频隐蔽信道的抗干扰信息传输方法 |
CN110933671A (zh) * | 2019-11-29 | 2020-03-27 | 深圳市国电科技通信有限公司 | 数据传输方法和系统 |
CN111654484A (zh) * | 2020-05-26 | 2020-09-11 | 扬州大学 | 基于whisper协议的以太坊隐蔽通信方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103281164A (zh) * | 2013-05-15 | 2013-09-04 | 江苏科技大学 | 一种高安全性的组合式隐信道同步方法 |
US20130304927A1 (en) * | 2012-05-14 | 2013-11-14 | King Abdulaziz City For Science And Technology | Network address translation-based method of bypassing internet access denial |
CN103475706A (zh) * | 2013-09-09 | 2013-12-25 | 中国科学技术大学苏州研究院 | 基于syn-ack双服务器反弹模式的伪tcp隐蔽通信方法 |
CN103581168A (zh) * | 2013-08-02 | 2014-02-12 | 中国科学技术大学苏州研究院 | 基于ip分片伪装技术的隐蔽信息通信方法 |
CN105959355A (zh) * | 2016-04-25 | 2016-09-21 | 江苏科技大学 | 基于BitTorrent协议的P2P网络下的秘密信息传输方法 |
-
2018
- 2018-03-15 CN CN201810212292.3A patent/CN108566379B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130304927A1 (en) * | 2012-05-14 | 2013-11-14 | King Abdulaziz City For Science And Technology | Network address translation-based method of bypassing internet access denial |
CN103281164A (zh) * | 2013-05-15 | 2013-09-04 | 江苏科技大学 | 一种高安全性的组合式隐信道同步方法 |
CN103581168A (zh) * | 2013-08-02 | 2014-02-12 | 中国科学技术大学苏州研究院 | 基于ip分片伪装技术的隐蔽信息通信方法 |
CN103475706A (zh) * | 2013-09-09 | 2013-12-25 | 中国科学技术大学苏州研究院 | 基于syn-ack双服务器反弹模式的伪tcp隐蔽通信方法 |
CN105959355A (zh) * | 2016-04-25 | 2016-09-21 | 江苏科技大学 | 基于BitTorrent协议的P2P网络下的秘密信息传输方法 |
Non-Patent Citations (3)
Title |
---|
GUANGJIE LIU ; YUEWEI DAI ; ZHIQUAN WANG ; JINGYU YANG: "《Optimal quantization-based steganography for adaptive hiding》", 《THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA》 * |
戴跃伟: "信息隐藏技术的理论及应用研究", 《中国博士学位论文全文数据库》 * |
翟江涛: "《网络通信的信息隐藏技术研究》", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547119A (zh) * | 2018-12-15 | 2019-03-29 | 华南理工大学 | 基于非可听音频隐蔽信道的抗干扰信息传输方法 |
CN110933671A (zh) * | 2019-11-29 | 2020-03-27 | 深圳市国电科技通信有限公司 | 数据传输方法和系统 |
CN110933671B (zh) * | 2019-11-29 | 2023-09-26 | 深圳市国电科技通信有限公司 | 数据传输方法和系统 |
CN111654484A (zh) * | 2020-05-26 | 2020-09-11 | 扬州大学 | 基于whisper协议的以太坊隐蔽通信方法 |
CN111654484B (zh) * | 2020-05-26 | 2022-02-15 | 扬州大学 | 基于whisper协议的以太坊隐蔽通信方法 |
Also Published As
Publication number | Publication date |
---|---|
CN108566379B (zh) | 2020-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10491575B2 (en) | Secure dynamic communication network and protocol | |
Xue et al. | A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture | |
US7325133B2 (en) | Mass subscriber management | |
EP2634956B1 (en) | Communicating an identity to a server | |
US20140355757A1 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
CN105610783B (zh) | 一种数据传输方法及物联网系统 | |
CN110225016A (zh) | 一种基于区块链网络的数据隐蔽传输方法 | |
Soni et al. | Security analysis on remote user authentication methods | |
Nashwan | AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment | |
CN106164922A (zh) | 使用在线音频指纹的远程设备的自组织一次性配对 | |
CN107508847A (zh) | 一种连接建立方法、装置和设备 | |
CN109413201A (zh) | Ssl通信方法、装置及存储介质 | |
CN110932854B (zh) | 一种面向物联网的区块链密钥分发系统及其方法 | |
CN108259164A (zh) | 一种物联网设备的身份认证方法及设备 | |
CN108566379A (zh) | P2p网络下基于协议字段冗余的隐蔽数据传输同步方法 | |
CN105262737B (zh) | 一种基于跳通道模式的抵御ddos攻击的方法 | |
CN105959355B (zh) | 基于BitTorrent协议的P2P网络下的秘密信息传输方法 | |
CN110191052A (zh) | 一种跨协议网络传输方法及系统 | |
US10630479B2 (en) | Network communication method having function of recovering terminal session | |
CN106230840B (zh) | 一种高安全性的口令认证方法 | |
CN107835168A (zh) | 一种基于端信息扩展序列矩阵转置相乘的认证方法 | |
US20070266251A1 (en) | Circuit Arrangement And Method For Securing Communication Within Communication Networks | |
CN111212017A (zh) | 一种面向智能终端的安全传输方法及系统 | |
CN115865508A (zh) | 一种边缘计算双向认证方法 | |
CN112688948B (zh) | 一种对象处理方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180921 Assignee: Center for technology transfer Jiangsu University of Science and Technology Assignor: JIANGSU University OF SCIENCE AND TECHNOLOGY Contract record no.: X2021980006173 Denomination of invention: Covert data transmission synchronization method based on protocol field redundancy in P2P network Granted publication date: 20200221 License type: Common License Record date: 20210714 |
|
EC01 | Cancellation of recordation of patent licensing contract | ||
EC01 | Cancellation of recordation of patent licensing contract |
Assignee: Center for technology transfer Jiangsu University of Science and Technology Assignor: JIANGSU University OF SCIENCE AND TECHNOLOGY Contract record no.: X2021980006173 Date of cancellation: 20210826 |