CN116566597A - Controllable security level covert communication method based on bit coin address confusion ciphertext - Google Patents

Controllable security level covert communication method based on bit coin address confusion ciphertext Download PDF

Info

Publication number
CN116566597A
CN116566597A CN202310329451.9A CN202310329451A CN116566597A CN 116566597 A CN116566597 A CN 116566597A CN 202310329451 A CN202310329451 A CN 202310329451A CN 116566597 A CN116566597 A CN 116566597A
Authority
CN
China
Prior art keywords
ciphertext
address
security level
index
confusion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310329451.9A
Other languages
Chinese (zh)
Inventor
张博
张乐君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yangzhou University
Original Assignee
Yangzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yangzhou University filed Critical Yangzhou University
Priority to CN202310329451.9A priority Critical patent/CN116566597A/en
Publication of CN116566597A publication Critical patent/CN116566597A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a controllable security level hidden communication method based on a bit coin address confusion ciphertext, which comprises the following steps: the sender sets the security level controllable coefficient of the information (M) transmission as s; pre-sharing a secret key under a chain of a sender and a receiver and generating an address set; AES encrypting and encoding the information (M) into ciphertext (M'); the s+1 round ciphertext is obfuscated to obtain an address, a ciphertext index set, and an obfuscated ciphertext (M s ') and integrating encryption and conversion into character strings to be filled in a storage field of the transaction, and submitting the character strings to a blockchain network; the receiver extracts the storage fields of all transactions in order and integrates and decrypts them to obtain the address index set, ciphertext index set and mixed ciphertext (M) s ') and sequentially combined with the corresponding address index to restore into ciphertext (M'). The invention flexibly controls the security level of information transmission,the information transmission efficiency is improved, and the problems of block chain hidden communication such as low information transmission efficiency and uncontrollable security level are solved.

Description

Controllable security level covert communication method based on bit coin address confusion ciphertext
Technical Field
The invention relates to the technical field of blockchain security, in particular to a controllable security level covert communication method based on bit coin address confusion ciphertext.
Background
Traditional covert communication relies on a centralized channel for information exchange to achieve communication. Although the transmission efficiency is high, there are problems that the communication process is easy to be monitored and attacked, even the communication content may be leaked, and the like. The blockchain technology has the characteristics of decentralization, detectability, anonymity, non-falsification, attack resistance and the like. Therefore, the blockchain technology is introduced into the hidden communication, so that the problems faced by the traditional hidden communication can be effectively relieved, and the quality of the hidden communication is improved.
With the development of blockchain technology, research on hidden communication by taking blockchain as a carrier is increasing. In the study of blockchain covert communications, a part is to utilize the storage field of blockchain transactions for covert communications, such as the op_return field in bitcoin, the Value field and the Input field in ethernet, etc. The information can be filled in the storage field for hidden transmission, and the method has the advantages of high transmission efficiency and the like, but has the problems that the security level is uncontrollable, the relationship between the two communication parties is easy to find, and the like. Another part is to use the unique attributes of the blockchain transaction for covert communication, such as transaction address, amount, etc. The method has good safety concealment, but has the problems of low transmission efficiency and the like.
The prior researches show that a block chain hidden channel method (block) is proposed, information is encrypted and binary coded, the information is transmitted by embedding Least Significant Bits (LSBs) of a transaction address, and the method is subjected to security certification. But has the problems of low embedding rate, uncontrollable communication security level and the like. And a transmission method (CCBRSN) for carrying out hidden information under the chain upper chain is also researched, wherein in a self-built bitcoin test network, information is firstly embedded into a transaction address, index information and transaction address ID are transmitted through a file under the chain, the embedding rate is improved, and the safety is improved to a certain extent. Although the overall embedding rate is high, only the channel transmitted on the chain is not fully utilized, and the security level of communication is uncontrollable.
Therefore, the method combines the storage field and the transaction address to design a controllable security level covert communication method based on the bit coin address confusion ciphertext. The scheme not only has controllable safety, but also improves the transmission efficiency to a great extent.
Disclosure of Invention
This section is intended to outline some aspects of embodiments of the invention and to briefly introduce some preferred embodiments. Some simplifications or omissions may be made in this section as well as in the description summary and in the title of the application, to avoid obscuring the purpose of this section, the description summary and the title of the invention, which should not be used to limit the scope of the invention.
The present invention has been made in view of the above-described problems occurring in the prior art.
Therefore, the invention aims to provide a controllable security level covert communication method based on bit coin address confusion ciphertext, which solves the problem that the security concealment and the transmission efficiency cannot be achieved in block chain covert communication.
In order to solve the technical problems, the invention provides the following technical scheme:
in a first aspect, an embodiment of the present invention provides a controllable security level covert communication method based on a bitcoin address confusion ciphertext, including: the sender sets the security level controllable coefficient of information transmission as s;
the sender and the receiver share a secret key PreKey in advance under the chain and generate an address set;
performing AES encryption and encoding on the information into an original ciphertext, so that the original ciphertext is identical to the encoding form of the address set;
mixing the ciphertext of the s+1 round to obtain an address index set, a ciphertext index set and mixed ciphertext;
the obtained address index set, ciphertext index set and mixed ciphertext (M s ') integrating the encrypted and converted character strings into a 16-system form, filling the character strings into a storage field of the transaction, and submitting each transaction to a blockchain network;
the receiver extracts all the storage fields of the transaction according to the sequence and integrates the storage fields;
and decrypting the integrated storage fields to obtain an address index set, a ciphertext index set and the confused ciphertext, and sequentially combining the corresponding address indexes to restore the original ciphertext.
The controllable security level covert communication method based on the bit coin address confusion ciphertext comprises the following steps: sender and receiver under-chain pre-sharingThe step of sharing the key PreKey and generating the address set comprises the step of generating the sender Input address set of the transaction in a chained manner through the pre-sharing of the key PreKey, wherein the derivative relationship is Input 0 →Input 1 →…→Input n
The controllable security level covert communication method based on the bit coin address confusion ciphertext comprises the following steps: the method also comprises the step of generating a receiver Output address set of the transaction in a chained manner through a preshared key PreKey, wherein the chained relationship is Output 0 →Output 1 →…→Output s
The controllable security level covert communication method based on the bit coin address confusion ciphertext comprises the following steps: the confusion of the s +1 round of ciphertext includes,
traversing original ciphertext to find address set Output addr(0) And record the corresponding address Index A0 And ciphertext Index M0
Randomly replacing characters at the same position in the original ciphertext with random characters of the coding table to obtain a corresponding ciphertext;
repeating the steps until the confused ciphertext is obtained.
The controllable security level covert communication method based on the bit coin address confusion ciphertext comprises the following steps: the address index information, ciphertext index information, and the obfuscated ciphertext are separated by an "|" symbol.
The controllable security level covert communication method based on the bit coin address confusion ciphertext comprises the following steps: sequentially combining the corresponding address indexes to restore the original ciphertext comprises,
sequentially generating an Input address set and an Output address Output according to the PreKey addr(0) ……Output addr(s-1)
According to Output addr(s-1) Index of ciphertext M(s-1) Corresponding ciphertext (M) s ' character is replaced with address Index A(s-1) Corresponding address Output addr(s-1) Obtaining a corresponding ciphertext;
repeating the steps until a final pre-replacement ciphertext is obtained;
index based on ciphertext M(0) The corresponding final pre-substitution ciphertext character is replaced by an address Index A(0) Corresponding address Output addr(0) To obtain the original ciphertext.
The controllable security level covert communication method based on the bit coin address confusion ciphertext comprises the following steps: and performing Base58 decoding and AES decryption on the original ciphertext, and acquiring a message by a receiver.
In a third aspect, embodiments of the present invention provide a computing device comprising:
a memory and a processor;
the memory is configured to store computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to implement a method for controlled security level covert communication based on bit coin address obfuscation ciphertext according to any of the embodiments of the present invention.
In a fourth aspect, embodiments of the present invention provide a computer-readable storage medium storing computer-executable instructions that, when executed by a processor, implement the method for controllable security level covert communication based on bitcoin address confusion ciphertext.
The invention has the beneficial effects that: the invention relieves the problems of hidden communication of the block chain such as low information transmission efficiency, uncontrollable security level and the like. The sender controls the cipher text confusion degree by setting the security level coefficient to control the number of Output addresses in the transaction, and flexibly controls the security level of information transmission. And integrating and encrypting the confused ciphertext and the corresponding index set, and filling the encrypted ciphertext and the corresponding index set into a storage field of the transaction for transmission, so that the information transmission efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. Wherein:
FIG. 1 is a flow chart of a controllable security level covert communication method based on bit coin address confusion ciphertext.
Fig. 2 is a diagram of transaction chain address generation according to the controllable security level covert communication method based on bit coin address confusion ciphertext.
Fig. 3 is a diagram of a ciphertext confusion example according to the controllable security level covert communication method based on the bit coin address confusion ciphertext of the present invention.
Fig. 4 is a diagram illustrating ciphertext extraction according to the controllable security level covert communication method based on bit coin address confusion ciphertext of the present invention.
Fig. 5 is a matching rate diagram of ciphertext information according to the controllable security level covert communication method based on the bit coin address confusion ciphertext.
Fig. 6 is a diagram of the size of the message with different lengths required to be stored under different security levels according to the controllable security level covert communication method based on the bit coin address confusion ciphertext.
Fig. 7 is a diagram of the number of transactions required for messages of different lengths under different security levels according to the controllable security level covert communication method based on bit coin address confusion ciphertext of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways other than those described herein, and persons skilled in the art will readily appreciate that the present invention is not limited to the specific embodiments disclosed below.
Further, reference herein to "one embodiment" or "an embodiment" means that a particular feature, structure, or characteristic can be included in at least one implementation of the invention. The appearances of the phrase "in one embodiment" in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
Further, in describing the embodiments of the present invention in detail, the cross-sectional view of the device structure is not partially enlarged to a general scale for convenience of description, and the schematic is only an example, which should not limit the scope of protection of the present invention. In addition, the three-dimensional dimensions of length, width and depth should be included in actual fabrication.
Example 1
Referring to fig. 1, a controllable security level covert communication method based on bit coin address confusion ciphertext is provided, comprising:
taking the example in the bitcoin transaction network as an example, it is assumed that Alice sets the security coefficient level s=2 of this communication and the processed ciphertext M' to "5D3AWa5QxZ" according to the flow of the present invention provided in fig. 1.
Specifically, the ciphertext obfuscation process, as shown in figure 3,
further, traversing ciphertext M' to find address Output addr(0) The same characters '5', 'D', 'a', '5', 'Q' in = "1A1zP1eP5QGefi2DMPT fTL5SLmv7DivfNa", and the corresponding position Index (address Index is recorded A0 =[0,1,3,5,6,7]And ciphertext Index M0 =[8,15,1,33,8,9]). Randomly replacing characters at the same position in the ciphertext M' with a character of a Base58 coding table to obtain the ciphertext M 1 '=“mA3nWdnqxZ”。
Preferably, the ciphertext M is traversed 1 ' find address Output addr(1) Identical characters'm', 'W','d', 'q', 'x' in = "1Nf7Pq62xtmx6mgNwBBhm6dwsgbs7WtXLz", and the corresponding position Index (address Index) is recorded A1 =[0,4,5,7,8]And ciphertext Index M1 =[10,29,22,5,8]). Ciphertext M 1 Random substitution of co-located characters inChanging the character of the Base58 coding table to obtain a ciphertext M 2 '=“SA3nmPnGFZ”。
Preferably, the resulting Index set (Index A0 、Index A1 、Index M0 、Index M1 ) And M 2 The string' integrally encrypted and converted to 16-ary form is filled into the op_return field of the transaction.
Ciphertext extraction and recovery process as shown in fig. 4, the recipient Bob obtains Index from the extraction and decryption of the op_return stored field of the transaction A ,Index M ,M 2 ', index A Comprises Index A0 And Index A1 ,Index M Comprises Index M0 And Index M1 ,M 2 'SA 3 nmPnGFZ'.
Further, an Output address Output is generated according to the PreKey addr(0) And Output addr(1)
Specifically, according to Output addr(1) = "1Nf7Pq62xtmx6mgNwBBhm6dwsgbs7WtXLz", ciphertext Index M1 =[0,4,5,7,8]Corresponding position ciphertext M 2 The ' characters ' S, m, P, n, G, F ' are replaced with address Index A1 =[10,29,22,5,8]Corresponding address Output addr(1) The character "M, W, d, q, x" gives M 1 '=“mA3nWdnqxZ”。
And then Index according to ciphertext M0 =[0,1,3,5,6,7]Corresponding position ciphertext M 1 The ' character'm, A, n, d, n, q ' is replaced with an address Index A0 =[8,15,1,33,8,9]Corresponding address Output addr(0) The characters "5, D, A, a, 5, Q" of = "1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa" result in M' = "5D3AWa5QxZ".
Preferably, base58 decoding and decryption results in Alice sending message M.
The embodiment also provides a controllable security level covert communication system based on the bit coin address confusion ciphertext, which comprises:
the setting module is used for setting the security level controllable coefficient of the information M transmission as s by a sender;
the generation module is used for sharing a key PreKey in advance under the chain of the sender and the receiver and generating an address set;
the encryption module carries out AES encryption and codes the information M into ciphertext M 'so that the ciphertext M' is identical to the coding form of the address set, and the s+1 round of ciphertext is mixed to obtain an address index set, a ciphertext index set and a mixed ciphertext M s ' mixing the obtained address index set, ciphertext index set and mixed ciphertext M s ' integrating the encrypted and converted string into 16-ary form to populate the memory field of the transaction and submit each transaction onto the blockchain network;
the decryption module is used for extracting all the storage fields of the transaction in sequence by a receiver, integrating the storage fields, and decrypting the integrated storage fields to obtain an address index set, a ciphertext index set and a mixed ciphertext M s 'and sequentially combining the corresponding address indexes to restore into ciphertext M'.
The embodiment also provides a computing device, which is suitable for the situation of the controllable security level covert communication method based on the bit coin address confusion ciphertext, and comprises the following steps:
a memory and a processor; the memory is used for storing computer executable instructions, and the processor is used for executing the computer executable instructions to realize the controllable security level covert communication method based on the bit coin address confusion ciphertext according to the embodiment.
The computer device may be a terminal comprising a processor, a memory, a communication interface, a display screen and input means connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
The present embodiment also provides a storage medium having stored thereon a computer program which, when executed by a processor, implements a controllable security level covert communication method based on bitcoin address confusion ciphertext as proposed by the above embodiments.
The storage medium according to the present embodiment belongs to the same inventive concept as the data storage method according to the above embodiment, and technical details not described in detail in the present embodiment can be seen in the above embodiment, and the present embodiment has the same advantageous effects as the above embodiment.
Example 2
Referring to fig. 5 to 7, in another embodiment of the present invention, unlike the first embodiment, a verification test of a controllable security level covert communication method based on a bit coin address confusion ciphertext is provided, and a technical effect adopted in the method is verified and explained.
The performance of the 4 methods was compared and analyzed in four ways in this example, and the results are shown in Table 1.
First, in terms of embedding rate, block is the amount of information that each address carries in 1bit binary. The V-BLOCCE method adopts a special address generation method, the information quantity carried by the generated address can be controlled, but in the experiment of the V-BLOCCE, the address is optimally generated by comprehensively considering that 3 characters are selected from the information, and each address carries at least the information quantity coded by the 3byte Base58 and is higher than the information quantity carried by the randomly generated address. The Hash-based MBE method embeds ciphertext information and confusion information into Value fields, and the average embedding rate is 28.12bit/t through experimental calculation. In the method (csccb), information is converted into information encoded by Base58 and then randomly embedded in a chain-generated address set, as shown in fig. 5, R is the matching rate of ciphertext information, and it is known that the average ciphertext matching rate is 45%, the embedding rate is (r×el) byte/address, and EL is the length of ciphertext encoded by Base 58. Experiments prove that the embedding rate (R) byte/address increases with the increase of the ciphertext length (EL).
Second, in terms of information transmission efficiency, the information transmission efficiency is related to the embedding rate. In the block method, the information needs to be encrypted and binary coded, and each bit can be embedded into one address, so that the transmission efficiency is low. The CCBRSN method embeds the information into the randomly generated address, the index set is transmitted through the files under the chain, the embedment rate is improved, and the transmission efficiency is further improved. The V-block method uses Base58 to encode embedded information and transmits index information through a storage field, thereby greatly improving transmission efficiency compared with the block method. As shown in FIG. 6, the CSLCCB method embeds and confuses ciphertext through an address, and the index and the confused ciphertext are directly filled into a storage field for transmission, thereby greatly improving transmission efficiency. Assuming that 100 bytes of information is transmitted, the block method requires 1600 to 1800 transactions, the V-block method requires 20 to 25 transactions, and as shown in fig. 7, the CSLCCB method requires 4 transactions when s=0 and requires 11 transactions when s=4.
Third, the security of the BLOCCE, V-BLOCCE, CCBRSN and Hash-based MBE methods is not controllable in terms of whether the security is controllable. The security of the csccb method is related to the security level set by the sender. Thus, only the security of the csccb method is controllable.
Finally, in terms of whether the address number is controllable, in the BLOCCE, V-BLOCCE and CCBRSN methods, the address is continuously generated through carrying ciphertext information by the address until all information on the ciphertext is embedded by the address, and the address number cannot be effectively controlled. In the CSLCCB method, the number of transaction Input address sets is controlled according to the controllable security level.
Table 1: performance comparison of the present invention with other methods
It should be noted that the above embodiments are only for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that the technical solution of the present invention may be modified or substituted without departing from the spirit and scope of the technical solution of the present invention, which is intended to be covered in the scope of the claims of the present invention.

Claims (10)

1. The controllable security level covert communication method based on the bit coin address confusion ciphertext is characterized by comprising the following steps of: comprising the steps of (a) a step of,
the sender sets the security level controllable coefficient of the information (M) transmission as s;
the sender and the receiver share a secret key PreKey in advance under the chain and generate an address set;
performing AES encryption and encoding of the information (M) into an original ciphertext (M ') such that the original ciphertext (M') is identical to the encoded version of the address set;
the s+1 round ciphertext is mixed to obtain an address index set, a ciphertext index set and mixed ciphertext (M s ');
The obtained address index set, ciphertext index set and mixed ciphertext (M s ') integrating the encrypted and converted character strings into a 16-system form, filling the character strings into a storage field of the transaction, and submitting each transaction to a blockchain network;
the receiver extracts all the storage fields of the transaction according to the sequence and integrates the storage fields;
decrypting the integrated storage field to obtain an address index set, a ciphertext index set and a confusing ciphertext (M s ') and sequentially combined with the corresponding address index to restore the original ciphertext (M').
2. The controllable security level covert communication method based on bit coin address confusion ciphertext of claim 1, wherein the method comprises the following steps of: the pre-sharing of the key PreKey and the generation of the address set under the chain of the sender and the receiver comprise the chained generation of the sender Input address set of the transaction through the pre-sharing of the key PreKey, and the derivative relationship is Input 0 →Input 1 →…→Input n
3. The controllable security level covert communication method based on bit coin address confusion ciphertext of claim 2, wherein the method comprises the following steps of: the method also comprises the step of generating a receiver Output address set of the transaction in a chained manner through a preshared key PreKey, wherein the chained relationship is Output 0 →Output 1 →…→Output s
4. The controllable security level covert communication method based on bit coin address confusion ciphertext of claim 1, wherein the method comprises the following steps of: the confusion of the s +1 round of ciphertext includes,
traversing the original ciphertext (M') to find an address set Output addr(0) And record the corresponding address Index A0 And ciphertext Index M0
Randomly replacing characters at the same position in the original ciphertext (M') with random characters of the coding table to obtain a corresponding ciphertext (M) 1 ');
Repeating the above steps until obtaining a mixed ciphertext (M s ')。
5. The controllable security level covert communication method based on bit coin address confusion ciphertext of claim 1, wherein the method comprises the following steps of: address index information, ciphertext index information, and obfuscated ciphertext (M s ') are spaced apart by a "|" symbol.
6. The controllable security level covert communication method based on bit coin address confusion ciphertext of claim 1, wherein the method comprises the following steps of: the restoration to the original ciphertext (M') in turn in combination with the corresponding address index comprises,
sequentially generating an Input address set and an Output address Output according to the PreKey addr(0) ……Output addr(s-1)
According to Output addr(s-1) Index of ciphertext M(s-1) Corresponding ciphertext (M) s ' character is replaced with address Index A(s-1) Corresponding address Output addr(s-1) Is a character of (2)Obtain the corresponding ciphertext (M s-1 ');
Repeating the above steps until the final replacement ciphertext (M 1 ');
Index based on ciphertext M(0) Corresponding final replacement front ciphertext (M 1 ' character is replaced with address Index A(0) Corresponding address Output addr(0) To obtain the original ciphertext (M').
7. The controllable security level covert communication method based on bit coin address confusion ciphertext of claim 1 or 6, wherein the method comprises the following steps of: the original ciphertext (M') is Base58 decoded and AES decrypted and the recipient retrieves the message (M).
8. A controllable security level covert communication system based on bit coin address confusion ciphertext is characterized by comprising,
the setting module is used for setting the security level controllable coefficient of the information (M) transmission as s by a sender;
the generation module is used for sharing a key PreKey in advance under the chain of the sender and the receiver and generating an address set;
the encryption module carries out AES encryption and codes the information (M) into an original ciphertext (M '), so that the original ciphertext (M') is identical to the coding form of the address set, and the s+1 round of ciphertext is mixed to obtain an address index set, a ciphertext index set and a mixed ciphertext (M) s ') and mixing the obtained address index set, ciphertext index set and mixed ciphertext (M) s ') integrating the encrypted and converted character strings into a 16-system form, filling the character strings into a storage field of the transaction, and submitting each transaction to a blockchain network;
the decryption module, the receiving party extracts all the storage fields of the transaction according to the sequence, integrates the storage fields, decrypts the integrated storage fields to obtain an address index set, a ciphertext index set and a mixed ciphertext (M s ') and sequentially combined with the corresponding address index to restore the original ciphertext (M').
9. A computing device, comprising:
a memory and a processor;
the memory is configured to store computer-executable instructions that, when executed by the processor, implement the steps of the method for controlled security level covert communication based on bit coin address obfuscation ciphertext of any one of claims 1 to 7.
10. A computer readable storage medium storing computer executable instructions which when executed by a processor implement the steps of the controlled security level covert communication method based on bit coin address obfuscation ciphertext of any one of claims 1 to 7.
CN202310329451.9A 2023-03-30 2023-03-30 Controllable security level covert communication method based on bit coin address confusion ciphertext Pending CN116566597A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310329451.9A CN116566597A (en) 2023-03-30 2023-03-30 Controllable security level covert communication method based on bit coin address confusion ciphertext

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310329451.9A CN116566597A (en) 2023-03-30 2023-03-30 Controllable security level covert communication method based on bit coin address confusion ciphertext

Publications (1)

Publication Number Publication Date
CN116566597A true CN116566597A (en) 2023-08-08

Family

ID=87500853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310329451.9A Pending CN116566597A (en) 2023-03-30 2023-03-30 Controllable security level covert communication method based on bit coin address confusion ciphertext

Country Status (1)

Country Link
CN (1) CN116566597A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116781433A (en) * 2023-08-25 2023-09-19 深圳市图麟科技有限公司 Hidden communication method and system for intelligent equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116781433A (en) * 2023-08-25 2023-09-19 深圳市图麟科技有限公司 Hidden communication method and system for intelligent equipment
CN116781433B (en) * 2023-08-25 2023-10-20 深圳市图麟科技有限公司 Hidden communication method and system for intelligent equipment

Similar Documents

Publication Publication Date Title
US8254570B2 (en) Method and system for encryption of data
EP3178190B1 (en) Encoder, decoder and method
US20100202606A1 (en) Two strings private key (symmetric) encryption and decryption method
Alsaidi et al. Compression multi-level crypto stego security of texts utilizing colored email forwarding
CN111431716B (en) Data transmission method and device, computer equipment and storage medium
CN109194461A (en) Single-track link table ordered encryption decryption method based on dual key stream cipher
CN115834060B (en) Electronic document security import and export method and system based on cryptography
CN109547663B (en) Improved LSB image steganography method combined with cryptography
CN116566597A (en) Controllable security level covert communication method based on bit coin address confusion ciphertext
Malalla et al. Improving hiding security of Arabic text steganography by hybrid AES cryptography and text steganography
Choubey et al. Cryptographic techniques in information security
Sermeno et al. Modified Vigenere cryptosystem: An integrated data encryption module for learning management system
CN100555937C (en) A kind of E-mail encryption transmitting-receiving system
CN108777611A (en) Doubly linked list ordered encryption decryption method based on dual key stream cipher
CN105704499B (en) A kind of selective satellite image compression encryption method based on ChaCha20 and CCSDS
CN111314270A (en) Data encryption and decryption method based on validity period uniform distribution symmetric algorithm
Yong-Xia The technology of database encryption
Vinodkumar et al. A Novel Data Embedding Technique for Hiding Text in Video File using Steganography
KR101076747B1 (en) Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module
CN111314052A (en) Data encryption and decryption method based on uniformly distributed symmetric compression algorithm
CN110581759A (en) UOEC-HEX symmetric encryption algorithm
CN103746793A (en) Number form text encryption and decryption methods
CN111314053A (en) Data encryption and decryption method based on uniform distribution symmetric algorithm
Sermeno et al. Modified vigenere cryptosystem using matrix manipulation and base94 encoding scheme
CN109409143B (en) Safety keyboard system and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination