US20130251148A1 - Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel - Google Patents
Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel Download PDFInfo
- Publication number
- US20130251148A1 US20130251148A1 US13/897,812 US201313897812A US2013251148A1 US 20130251148 A1 US20130251148 A1 US 20130251148A1 US 201313897812 A US201313897812 A US 201313897812A US 2013251148 A1 US2013251148 A1 US 2013251148A1
- Authority
- US
- United States
- Prior art keywords
- storage medium
- encrypted
- readable storage
- data stream
- transitory processor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/30—Compression, e.g. Merkle-Damgard construction
Definitions
- the present invention relates generally to a method and system for encrypting data and more specifically to a method and system for obscuring the existence of data encryption in a communication channel while efficiently allocating bandwidth.
- Traffic flows in a modern large-scale network may often be subjected to ill-considered policy-based mechanisms intended to “shape” that traffic. Often, such policy-driven traffic shaping is detrimental to encrypted flows, even when such flows would ordinarily not get “shaped” if not for the encryption.
- QOS Quality of Service
- Encrypted traffic with the exception of fixed headers, has the peculiar statistical property of being indistinguishable from a strong pseudo-random sequence of the same length. However, if encrypted traffic observed is over a sufficiently long time interval, a very uniform distribution of bits, or octets, occurs which can generally render this traffic distinguishable from non-encrypted traffic. It is precisely this property that allows traffic-shaping hardware to identify encrypted flows, and execute “policy” on those flows. Flows that are not encrypted have a very different statistical distribution of bits (octets) than those flows that are encrypted.
- a common test suite for randomness can usually indicate whether that traffic is encrypted or not.
- a suite such as that described in Federal Information Processing Standards (“FIPS”) 140-2 can reliably distinguish random-looking flows from those that do not appear random, usually with as little as 4 Kbytes of traffic from the flow.
- FIPS Federal Information Processing Standards
- attempting to compress the contents of the flow using any one of a number of compression functions can be used to distinguish random-type flows from those flows that are not random. For example, attempting to compress a purely-random flow results in no compression, or even size inflation, depending on the compression algorithm used. Flows that are non-random will tend to be moderately-to-strongly compressible.
- a key concept in reducing detectability of encrypted flows is to reduce the information density of the encrypted flow.
- An encrypted data flow appears to be a strong pseudo-random sequence, which means that it has maximal information density, or minimal redundancy. Any technique that reduces the amount of information carried per transmitted bit consequently reduces the probability of detection of the resulting flow as a strong pseudo-random, and therefore, probably an encrypted flow.
- Standard encodings such as Base64 reduce the information carried per transmitted bit. But, because Base64 is easily recognized, it may be decoded and the resulting bit sequence analyzed for randomness. Therefore, what is needed is a system and method of coding that simultaneously reduces the information density of a traffic flow and reduces the probability of detecting the coding scheme so that the traffic is not detected as being encrypted and so that the traffic is not analyzed based on the detection of the coding scheme.
- the present invention advantageously provides a method and system for obscuring the existence of data encrypted traffic in a communication network so that the traffic is not detected as being encrypted and so that the traffic is not analyzed based on the detection of the coding scheme.
- encrypted data is further encoded according to a Base64 coding scheme using an alphabet set pseudo-randomly generated based on a set of encryption keys.
- the members of the encoding alphabet are not actually known.
- a method for obscuring the existence of data encryption in a communication network.
- a set of characters is generated by using a set of encryption keys as an input to a pseudo-random function. Each character corresponds to an index value.
- Encrypted data is divided into a plurality of parts. Each part is sectioned into a plurality of groups and encoded by mapping each group to a character in the set of characters according to its corresponding index value. The mapped characters are transmitted through the communication network.
- a network interface for obscuring the existence of data encryption includes a controller and a communication interface.
- the communication interface is communicatively coupled to the controller.
- the controller operates to generate a set of characters by using a set of encryption keys as an input to a pseudo-random function, each character corresponding to an index value.
- the controller further operates to divide encrypted data into a plurality of parts, section each part of the plurality of parts into a plurality of groups, and encode each part by mapping each group of the plurality of groups to a character in the set of characters according to its corresponding index value.
- the communication interface operates to transmit the mapped characters through the communication network.
- a system for obscuring the existence of data encryption in a communication network includes a first network interface and a second network interface.
- the first network interface operates to generate a set of alphabet characters by using a set of encryption keys as an input to a pseudo-random function, each alphabet character corresponding to an index value.
- the first network interface further operates to divide encrypted data into a plurality of parts, section each part into a plurality of groups and encode each part by mapping each of the plurality of groups to a character in the set of characters according to its corresponding index value.
- the first network interface transmits the mapped characters through the communication network.
- the second network interface operates receive an encoded data message.
- the encoded data message includes the mapped characters.
- the second network interface operates to divide the encoded data message into a plurality of groups of characters, map each character to its corresponding index value to recreate the plurality of parts, and decrypt each part of the plurality of parts.
- FIG. 1 is a block diagram of an exemplary data encryption obscuring system constructed in accordance with the principles of the present invention
- FIG. 2 is a block diagram of an exemplary data encoder constructed in accordance with the principles of the present invention
- FIG. 3 is a flowchart of an exemplary data encryption obscuring process according to the principles of the present invention.
- FIG. 4 is a flowchart of an exemplary decoding process in the presence of data encryption obscuring according to the principles of the present invention.
- relational terms such as “first” and “second,” “top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements.
- the term “Zigbee” relates to a suite of high-level wireless communication protocols as defined by the IEEE standard 802.15.4.
- Wi-Fi refers to the communications standard defined by IEEE 802.11.
- WiMAX means the communication protocols defined under IEEE 802.16.
- BLUETOOTH refers to the industrial specification for wireless personal area network (“PAN”) communication developed by the Bluetooth Special Interest Group.
- One embodiment of the present invention advantageously provides a method and system for encoding encrypted flows in such a way as to avoid automated detection by various types of randomness tests, including the FIPS 140-2 randomness tests.
- An embodiment is hardened against some known attacks against the scheme, including using variable ambiguous encoding mechanisms.
- System 10 includes a first client computer 12 communicating with a second client computer 14 over a wide area network (“WAN”) 16 .
- the wide area network 16 may include the Internet, intranet, or other communication network.
- Client computers 12 , 14 may include personal computers, laptops, personal data assistants (“PDAs”), servers, mobile telephones, etc.
- PDAs personal data assistants
- Each client computer 12 , 14 transmits data through a WAN 16 via a WAN interface 18 a , 18 b , referred to collectively as WAN interface 18 .
- WAN interface 18 a WAN interface 18 a , 18 b
- FIG. 1 shows two client computers, this configuration is for exemplary purposes only.
- the system 10 may include multiple WAN interfaces 18 .
- the WAN interface 18 can be in communication with various types of client devices, such as routers, switches, etc.
- the WAN interface 18 may be a stand-alone device or may be embedded as part of another resource, such as the client computer 12 , 14 .
- Each WAN interface 18 encrypts data from the client computer 12 , 14 according to one or more known encryption schemes.
- the WAN interface 18 includes an encryption concealer, discussed below, to obscure the fact that the data has been encrypted by encoding the encrypted data using a Base64 coding scheme with a randomly generated alphabet, in contrast to standard Base64 coding which typically involves the use of a single, known alphabet.
- Each WAN interface 18 also performs the reverse functions whereby the WAN interface 18 receives Base64 encoded and encrypted data frames over the WAN 16 , which are then decoded and decrypted, using the randomly generated alphabet, to match the data originally transmitted from the client computer 12 , 14 .
- each WAN interface 18 in FIG. 1 is shown as being connected to a single client computer 12 , 14 , an exemplary WAN interface 18 constructed in accordance with the principles of the present invention, may support multiple computers 12 , 14 without departing from the scope of the present invention.
- an exemplary WAN interface 18 includes a communication interface 20 communicatively coupled to a controller 22 .
- the communication interface 20 may be wired, wireless, or any combination thereof.
- the communication interface 20 transfers data packets between the WAN interface 18 and other resources of the wide area network 16 using known communication protocols, e.g., Ethernet, Wi-Fi, WiMAX, BLUETOOTH, etc.
- the communication interface may include any number of communication ports.
- the controller 22 controls the processing of information and the operation of the WAN interface 18 to implement the functions described herein.
- the controller 22 is also coupled to a non-volatile memory 24 .
- the non-volatile memory 24 includes a data memory 26 and a program memory 28 .
- the program memory 28 contains an encryption concealer 30 which obscures the fact that data has been encrypted from automatic detection by other entities connected to the WAN 16 , the operation of which is discussed in more detail below.
- the encryption concealer 30 includes an alphabet generator 32 for randomly generating a sixty-four (64) character Base64 alphabet set from the standard two hundred fifty-six (256) possible ASCII characters and a Base64 encoder 34 which encodes encrypted data according to a Base64 coding scheme using the Base64 alphabet.
- the data memory 26 stores data files such as a lookup table 36 correlating the Base64 alphabet set with corresponding ASCII characters and a set of encryption keys 38 which are passed between the WAN interface 18 and a destination resource, such as client computer 14 , prior to transferring any user data.
- data files such as a lookup table 36 correlating the Base64 alphabet set with corresponding ASCII characters and a set of encryption keys 38 which are passed between the WAN interface 18 and a destination resource, such as client computer 14 , prior to transferring any user data.
- each WAN interface 18 may include additional, optional structures (not shown) which may be needed to perform other functions of the interface 18 .
- a single, standardized, alphabet is generally used to transform input octet triplets into output octet quads, effectively reducing the information density as a fortuitous side-effect.
- Such codings are designed to get arbitrary binary data through “channels” that may not be transparent to such data.
- RFC-822 email is one example of such a channel.
- Equation (1) gives the total number of possible alphabets where 64 characters are chosen from a field of 256 characters (8-bit ASCII or UTF-8):
- K is the total number of possible octets, e.g., 256
- n is the size of the subset, e.g., 64.
- embodiments of the present invention in which an alphabet 34 is chosen dynamically, for example, during the creation of a long-term encrypted flow, have superior detection properties to flows that use static alphabets.
- most encrypted communications sessions establish keying material, e.g., encryption keys 38 , early in the creation of the session in order to provide shared encryption and integrity keys to the underlying cryptographic “packaging.” Some of this keying material may be used to help select dynamic encoding alphabets 34 , since such keys 38 are shared by both sides of a communication as a result of establishing an encrypted channel.
- an exemplary operational flowchart is provided that describes exemplary steps performed by the encryption concealer 30 for obscuring the existence of data encryption.
- the process begins when the WAN interface 18 determines that encrypted data is available to be transmitted (step S 102 ).
- the encrypted data may be received from a client computer 12 in an encrypted form or without encryption. In the latter case, the WAN interface 18 may encrypt the data according to known encryption methods.
- the WAN interface 18 initiates a secure communication session with a destination device through the communication interface 20 (step S 104 ).
- the WAN interface 18 and the destination device exchange keying material (step S 106 ), e.g., encryption keys 38 .
- the encryption keys 38 are used to generate a single pseudo-randomly chosen alphabet of 64 elements selected from a wider field of 256 elements, e.g., the full set of ASCII characters (step S 108 ).
- Any strong random number generator may be used to generate the shared coding alphabet, but for purposes of improving interoperability, a standardized cryptographically-strong pseudo-random function is used, so that both sides of a communication derive the same coding alphabet.
- a suitable algorithm is described in Internet Request For Comments (“RFC”) 4615 , with the output of the pseudo-random function (“PRF”) being the chaining variable for the next call to the PRF, and the required key, K, taken from the shared keying material from session initialization.
- RRC Internet Request For Comments
- PRF pseudo-random function
- K the required key
- the encrypted data is sectioned into parts such as octet triplets, i.e., 3 parts of 8 bits, (step S 110 ).
- An input octet triplet part of data is divided into groups of 6 bits (step S 112 ), with those 6 bits used as an index into a table 36 of the sixty-four chosen alphabet elements (step S 114 ).
- the data is encoded by mapping each group of 6 bits to a corresponding alphabet character using the 6 bits as an index to the lookup table 36 (step S 116 ).
- the encoded data i.e., 4 alphabet characters per original octet triplet part, is transmitted through the WAN 16 to the destination device (step S 118 ).
- FIG. 4 An exemplary operational flowchart is provided in FIG. 4 which describes steps performed by a destination device, such as a receiving WAN interface 18 or client computer 14 , upon receiving a data message having its encryption concealed in accordance with the principles of the present invention.
- the process outlined in FIG. 4 is in large part the method of FIG. 3 , performed in reverse.
- the destination device establishes a secure communication session with the originating device (step S 118 ) and exchanges encryption keys 38 (step S 120 ).
- the encryption keys 38 are used to pseudo-randomly generate the same Base64 alphabet set that was used to encode the encrypted data (step S 122 ).
- a so-called “inverse” table can be calculated using, for example, pseudo-code shown in Table 2.
- the destination device receives the encoded data which consists of a series of alphabet characters contained in the pseudo-randomly generated Base64 alphabet set (step S 124 ). On decoding, the alphabet character is used as an index into the inverse table, producing a 6-bit result (step S 126 ). The series of 6 bit results are arranged in groups of 4 to recreate the originally encrypted octet triplet (step S 128 ). The raw data is obtained by decrypting the octet triplet using a known encryption scheme (step S 130 ).
- the redundancy can be increased further by incorporating a subtle bias in the generated alphabet.
- the generated alphabet can be arranged so that ASCII control characters are less-likely to be chosen as alphabet members, and that the ASCII group “E T A O I N S” and “e t a o i n s” are slightly-more likely to be chosen as alphabet members. This reduces the number of possible alphabets slightly, while decreasing the information density at the same time.
- a further improvement in the combinatoric-complexity of “attacks” against the coding scheme may be realized by incorporating multiple randomly-chosen alphabets for the output octet quad. Generating three different alphabets and using different alphabets for the output octet quad work to frustrate any mechanisms that may be used to reliably identify traffic encoded under this scheme.
- the assignment of alphabets to output quads can either be fixed, such as 1-2-3-1, or can be chosen pseudo-randomly using the same PRF as was used to generate the alphabets. While doing so does not improve the information-theoretic aspects of this system, it helps to increase the combinatoric-complexity of any “attacks” against the system.
- An attack against this scheme is considered successful if a third party is able to reliably identify encrypted traffic that is encoded under this scheme. It is useful to consider only those attacks which can be efficiently automated, since those “attacks” are the ones that this scheme is designed to protect against.
- an “attacker” would need to test traffic flows with sufficient depth to guarantee that only characters from a Base64 encoding are being used in the flow, and then to decode the resulting flow, and test the resulting bit-stream for randomness. Note that since Base64 is used to protect many different types of data, not just encrypted data, many of the Base64 trial decodings will result in a “not random” verdict on the part of an automated attacker.
- a hypothetical “attack” scenario is that an adversary is in possession of some significant number of all possible coding alphabets produced by this scheme.
- the “attacker” would need to test a sufficient depth of traffic flow against all the alphabets in his possession before concluding that the traffic was indeed encoded under one of those alphabets.
- the attacker cannot determine in advance which alphabet(s) will be used to encode any given flow, it remains a daunting task to reliably distinguish traffic that is encoded under this scheme to any other, non-encrypted, traffic in a typical Internet scenario.
- the total number of possible alphabets is, as previously stated, roughly 10 61 possible alphabets.
- the suggested PRF produces approximately 10 38 states before repeating. So the upper-bound on the number of possible alphabets produced by this scheme, is approximately 10 38 . Since each alphabet is 64 bytes in length, storing all 10 38 alphabets requires an impractically-large amount of storage.
- a more devastating attack is one that can reliably detect traffic that is encoded with this scheme, but it cannot reliably infer the presence of encrypted data. If an attacker starts with a hypothesis that data under examination has been encoded with this scheme, then they can maintain frequency tables for each octet in an output quad, and after a suitable amount of data has been examined, look for frequency tables in which only 64 of the entries have non-zero counts, across all 4 of the output octets. Maintaining the frequency tables would necessarily be done on a per-flow basis since alphabets are created at the start of a flow.
- a problem, from the “attack” perspective is that Base64 and other 24-to-32-bit encoding schemes would also trigger a necessarily-false positive.
- each octet is limited to 64 values—which is clearly not a “smoking gun,” but rather just a modest hint that the underlying data that is encoded under this scheme may be encrypted data.
- the “attack” discussed above in which a Base64-like coding scheme can be reliably detected, even in the presence of random alphabet selection, can be circumvented by using an ambiguous coding scheme in which some of the input 6-bit sequences can be represented by more than 1 output octet.
- the degree of “ambiguous” coding can be selected randomly at start of communications, just as the alphabet maps are selected randomly at the start of communications. For each of the 3 alphabets and corresponding reverse maps, some number of extra, e.g., up to 23, code points are generated in the alphabet table, corresponding to up to 23 entries in the alphabet.
- the alphabet can be anywhere between 64 and 87 elements in length.
- the decision as to which entries are to have “ambiguous” codings in the alphabet may also be set dynamically, using the random sequence generator to select an offset within the primary alphabet.
- the present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computing system, or other apparatus adapted for carrying out the methods described herein, is suited to perform the functions described herein.
- a typical combination of hardware and software could be a specialized or general purpose computer system having one or more processing elements and a computer program stored on a storage medium that, when loaded and executed, controls the computer system such that it carries out the methods described herein.
- the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which, when loaded in a computing system is able to carry out these methods.
- Storage medium refers to any volatile or non-volatile storage device.
- Computer program or application in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
- Facsimile Transmission Control (AREA)
Abstract
A system, method, and network interface obscures the existence of data encryption in a communication network is provided. A set of characters is generated by using a set of encryption keys as an input to a pseudo-random function. Each character corresponds to an index value. The encrypted data is divided into a plurality of parts. Each part is sectioned into a plurality of groups. Each group of the plurality of groups is encoded by mapping the group to a character in the set of characters according to its corresponding index value. The mapped characters are transmitted through the communication network.
Description
- This application is a continuation of U.S. patent application Ser. No. 13/269,674, filed Oct. 10, 2011, entitled “BANDWIDTH EFFICIENT METHOD AND SYSTEM FOR OBSCURING THE EXISTENCE OF ENCRYPTION IN A COMMUNICATIONS CHANNEL”, which is a continuation of and claims priority to Ser. No. 12/345,186, filed Dec. 29, 2008, entitled “BANDWIDTH EFFICIENT METHOD AND SYSTEM FOR OBSCURING THE EXISTENCE OF ENCRYPTION IN A COMMUNICATIONS CHANNEL”, the entirety of all of which are incorporated herein by reference.
- n/a
- The present invention relates generally to a method and system for encrypting data and more specifically to a method and system for obscuring the existence of data encryption in a communication channel while efficiently allocating bandwidth.
- Traffic flows in a modern large-scale network may often be subjected to ill-considered policy-based mechanisms intended to “shape” that traffic. Often, such policy-driven traffic shaping is detrimental to encrypted flows, even when such flows would ordinarily not get “shaped” if not for the encryption.
- Furthermore, in some global regions, traffic that is encrypted is often subjected to more scrutiny by invasive surveillance techniques than would be the case if the traffic wasn't encrypted. In effect, the encrypted traffic, even if it is “innocuous,” can attract undue attention merely because of the encryption.
- At many places in the modern Internet, particularly near the network edge, traffic-shaping technology has been designed to automatically detect encrypted flows and treat these flows differently according to local policy. Such treatment may actually include dropping the traffic or placing this traffic in a Quality of Service (“QOS”) queue that has a very low priority.
- Encrypted traffic, with the exception of fixed headers, has the peculiar statistical property of being indistinguishable from a strong pseudo-random sequence of the same length. However, if encrypted traffic observed is over a sufficiently long time interval, a very uniform distribution of bits, or octets, occurs which can generally render this traffic distinguishable from non-encrypted traffic. It is precisely this property that allows traffic-shaping hardware to identify encrypted flows, and execute “policy” on those flows. Flows that are not encrypted have a very different statistical distribution of bits (octets) than those flows that are encrypted.
- Several tests may be performed on traffic to determine if that traffic has the statistical properties of encrypted traffic. All encrypted traffic will pass those tests, although passing those tests does not necessarily indicate the presence of encryption. For example, traffic flows that have been compressed have long-term statistical properties that are nearly indistinguishable from those of random or encrypted flows.
- A common test suite for randomness can usually indicate whether that traffic is encrypted or not. A suite such as that described in Federal Information Processing Standards (“FIPS”) 140-2 can reliably distinguish random-looking flows from those that do not appear random, usually with as little as 4 Kbytes of traffic from the flow.
- Similarly, over the longer term, attempting to compress the contents of the flow using any one of a number of compression functions can be used to distinguish random-type flows from those flows that are not random. For example, attempting to compress a purely-random flow results in no compression, or even size inflation, depending on the compression algorithm used. Flows that are non-random will tend to be moderately-to-strongly compressible.
- There is historical support for the use of steganography to hide secret communications, in such a way that only the sender and the intended recipient even realize there is a hidden message. Thus, it seems natural and tempting to use steganographic techniques to hide the random-looking bits of an encrypted flow inside something that looks statistically non-encrypted.
- It has been suggested that some groups hide encrypted messages inside such innocuous objects as digital image files on the Internet, using them as a low-bandwidth communications technique. There are various tools extant that assist in the creation of steganographic materials, using audio, video, and image files as the “carriers” for steganographically-hidden information.
- However, the bandwidth efficiency of “traditional” steganography techniques is typically very low, with the “carrier” information dominating the bandwidth used in communicating steganographic objects. Ratios of the carrier information to hidden information on the order of 100:1 or worse are not uncommon using this technique. Nevertheless, an advantage of steganographic techniques is that the resulting data flows have distinctly non-uniform statistical distributions of octets, which means that they are unlikely to be identified as encrypted traffic by automated mechanisms within the Internet.
- It is also possible to encode encrypted bit-streams so that they look like, for example, ordinary English text. Techniques such as using a dictionary of common English words to represent groupings of cipher text bits have historically been used to hide the existence of an underlying encrypted message. For example, if groups of four bits are considered at one time, they may be used as an “index” into a short array of English (or German, Spanish, French, etc.) words. Those words are substituted for the bit-sequence, and the receiver simply looks up the corresponding bit-sequence when they encounter one of the dictionary items. The technique is quite effective at fooling automated tests for randomness, particularly if those tests are unaware of the existence of the bits-to-English substitution mapping, and if that mapping is sufficiently large.
- Problems arise when communication bandwidth efficiency is a strong consideration in the development of a coding system to hide encrypted flows. The system described above, for example, requires substantial overhead to represent 4 bits of “real” information. Typically, between 40 and 50 bits are transmitted in order to represent those 4 bits of actual information.
- Many encoding techniques exist that are used to translate binary data into codings that are suitable for highly-constrained channels, such as e-mail ASCII transfer, etc. These codings are relatively bandwidth-efficient, producing a 30% increase in occupied bandwidth. Many protocols in use on the Internet today use some variant of the Base64 coding which translates 24 bits of input data into 32 bits of output data with strong constraints on the output alphabet. However, codings that are based on Base64 can be readily identified in an automated fashion, which means that the encoding can be removed, with the resulting bit-stream further analyzed for randomness.
- A key concept in reducing detectability of encrypted flows is to reduce the information density of the encrypted flow. An encrypted data flow appears to be a strong pseudo-random sequence, which means that it has maximal information density, or minimal redundancy. Any technique that reduces the amount of information carried per transmitted bit consequently reduces the probability of detection of the resulting flow as a strong pseudo-random, and therefore, probably an encrypted flow.
- Standard encodings, such as Base64 reduce the information carried per transmitted bit. But, because Base64 is easily recognized, it may be decoded and the resulting bit sequence analyzed for randomness. Therefore, what is needed is a system and method of coding that simultaneously reduces the information density of a traffic flow and reduces the probability of detecting the coding scheme so that the traffic is not detected as being encrypted and so that the traffic is not analyzed based on the detection of the coding scheme.
- The present invention advantageously provides a method and system for obscuring the existence of data encrypted traffic in a communication network so that the traffic is not detected as being encrypted and so that the traffic is not analyzed based on the detection of the coding scheme. Generally, encrypted data is further encoded according to a Base64 coding scheme using an alphabet set pseudo-randomly generated based on a set of encryption keys. Advantageously, the members of the encoding alphabet are not actually known.
- In accordance with one aspect of the present invention, a method is provided for obscuring the existence of data encryption in a communication network. A set of characters is generated by using a set of encryption keys as an input to a pseudo-random function. Each character corresponds to an index value. Encrypted data is divided into a plurality of parts. Each part is sectioned into a plurality of groups and encoded by mapping each group to a character in the set of characters according to its corresponding index value. The mapped characters are transmitted through the communication network.
- In accordance with another aspect of the present invention, a network interface for obscuring the existence of data encryption includes a controller and a communication interface. The communication interface is communicatively coupled to the controller. The controller operates to generate a set of characters by using a set of encryption keys as an input to a pseudo-random function, each character corresponding to an index value. The controller further operates to divide encrypted data into a plurality of parts, section each part of the plurality of parts into a plurality of groups, and encode each part by mapping each group of the plurality of groups to a character in the set of characters according to its corresponding index value. The communication interface operates to transmit the mapped characters through the communication network.
- In accordance with yet another aspect of the present invention, a system for obscuring the existence of data encryption in a communication network includes a first network interface and a second network interface. The first network interface operates to generate a set of alphabet characters by using a set of encryption keys as an input to a pseudo-random function, each alphabet character corresponding to an index value. The first network interface further operates to divide encrypted data into a plurality of parts, section each part into a plurality of groups and encode each part by mapping each of the plurality of groups to a character in the set of characters according to its corresponding index value. The first network interface transmits the mapped characters through the communication network. The second network interface operates receive an encoded data message. The encoded data message includes the mapped characters. The second network interface operates to divide the encoded data message into a plurality of groups of characters, map each character to its corresponding index value to recreate the plurality of parts, and decrypt each part of the plurality of parts.
- A more complete understanding of the present invention, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings wherein:
-
FIG. 1 is a block diagram of an exemplary data encryption obscuring system constructed in accordance with the principles of the present invention; -
FIG. 2 is a block diagram of an exemplary data encoder constructed in accordance with the principles of the present invention; -
FIG. 3 is a flowchart of an exemplary data encryption obscuring process according to the principles of the present invention; and -
FIG. 4 is a flowchart of an exemplary decoding process in the presence of data encryption obscuring according to the principles of the present invention. - Before describing in detail exemplary embodiments that are in accordance with the present invention, it is noted that the embodiments reside primarily in combinations of apparatus components and processing steps related to implementing a system and method for obscuring the existence of data encryption in a communication channel while efficiently utilizing the channel bandwidth. Accordingly, the system and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
- As used herein, relational terms, such as “first” and “second,” “top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements. Additionally, as used herein and in the appended claims, the term “Zigbee” relates to a suite of high-level wireless communication protocols as defined by the IEEE standard 802.15.4. Further, “Wi-Fi” refers to the communications standard defined by IEEE 802.11. The term “WiMAX” means the communication protocols defined under IEEE 802.16. “BLUETOOTH” refers to the industrial specification for wireless personal area network (“PAN”) communication developed by the Bluetooth Special Interest Group.
- One embodiment of the present invention advantageously provides a method and system for encoding encrypted flows in such a way as to avoid automated detection by various types of randomness tests, including the FIPS 140-2 randomness tests. An embodiment is hardened against some known attacks against the scheme, including using variable ambiguous encoding mechanisms.
- Referring now to the drawing figures in which like reference designators refer to like elements, there is shown in
FIG. 1 an exemplary dataencryption obscuring system 10.System 10 includes afirst client computer 12 communicating with asecond client computer 14 over a wide area network (“WAN”) 16. Thewide area network 16 may include the Internet, intranet, or other communication network.Client computers client computer WAN 16 via aWAN interface WAN interface 18. Although the communication network is pictured inFIG. 1 as being a WAN, the principles of the present invention may also apply to other forms of communication networks, such as personal area networks (“PANs”), local area networks (“LANs”), campus area networks (“CANs”), metropolitan area networks (“MANs”), etc. Additionally, althoughFIG. 1 shows two client computers, this configuration is for exemplary purposes only. For example, thesystem 10 may include multiple WAN interfaces 18. TheWAN interface 18 can be in communication with various types of client devices, such as routers, switches, etc. Additionally, theWAN interface 18 may be a stand-alone device or may be embedded as part of another resource, such as theclient computer - Each
WAN interface 18 encrypts data from theclient computer WAN interface 18 includes an encryption concealer, discussed below, to obscure the fact that the data has been encrypted by encoding the encrypted data using a Base64 coding scheme with a randomly generated alphabet, in contrast to standard Base64 coding which typically involves the use of a single, known alphabet. EachWAN interface 18 also performs the reverse functions whereby theWAN interface 18 receives Base64 encoded and encrypted data frames over theWAN 16, which are then decoded and decrypted, using the randomly generated alphabet, to match the data originally transmitted from theclient computer WAN interface 18 inFIG. 1 is shown as being connected to asingle client computer exemplary WAN interface 18 constructed in accordance with the principles of the present invention, may supportmultiple computers - Referring now to
FIG. 2 , anexemplary WAN interface 18 includes acommunication interface 20 communicatively coupled to acontroller 22. Thecommunication interface 20 may be wired, wireless, or any combination thereof. Thecommunication interface 20 transfers data packets between theWAN interface 18 and other resources of thewide area network 16 using known communication protocols, e.g., Ethernet, Wi-Fi, WiMAX, BLUETOOTH, etc. The communication interface may include any number of communication ports. - The
controller 22 controls the processing of information and the operation of theWAN interface 18 to implement the functions described herein. Thecontroller 22 is also coupled to anon-volatile memory 24. Thenon-volatile memory 24 includes adata memory 26 and aprogram memory 28. Theprogram memory 28 contains anencryption concealer 30 which obscures the fact that data has been encrypted from automatic detection by other entities connected to theWAN 16, the operation of which is discussed in more detail below. Theencryption concealer 30 includes analphabet generator 32 for randomly generating a sixty-four (64) character Base64 alphabet set from the standard two hundred fifty-six (256) possible ASCII characters and aBase64 encoder 34 which encodes encrypted data according to a Base64 coding scheme using the Base64 alphabet. Thedata memory 26 stores data files such as a lookup table 36 correlating the Base64 alphabet set with corresponding ASCII characters and a set ofencryption keys 38 which are passed between theWAN interface 18 and a destination resource, such asclient computer 14, prior to transferring any user data. - In addition to the above noted structures, each
WAN interface 18 may include additional, optional structures (not shown) which may be needed to perform other functions of theinterface 18. - When using a Base64 coding scheme, a single, standardized, alphabet is generally used to transform input octet triplets into output octet quads, effectively reducing the information density as a fortuitous side-effect. Such codings are designed to get arbitrary binary data through “channels” that may not be transparent to such data. RFC-822 email is one example of such a channel.
- In a Base64 scheme, a set of 64 printable characters is chosen from all possible ASCII characters to use as the “coding alphabet.” There are a few variants on this alphabet, but only one or two are commonly used. It is important to consider the combinatorics associated with selecting a suitable alphabet for coding binary (and encrypted or random) data. Equation (1) gives the total number of possible alphabets where 64 characters are chosen from a field of 256 characters (8-bit ASCII or UTF-8):
-
- where K is the total number of possible octets, e.g., 256, and n is the size of the subset, e.g., 64.
- Given the above parameters, there are roughly 1061 64-character alphabets when chosen from a field of 256 possible octet values. When considering the information-theoretic aspects of a coding scheme, the ability of the resulting coding to produce purely-printable-ASCII characters is completely unimportant. What is important is that the resulting coding reduces the information density of the resulting flow. Any coding that expands a 24-bit triplet to a 32-bit quad is sufficient to reduce the information density of the resulting flow.
- When implementing the present invention, it may be tempting to create a small number of alphabets, or perhaps only one, that are not one of the Base64 alphabets and use these alphabets for coding encrypted flows. But a problem becomes clear immediately with any such scheme: a single, fixed, alphabet is just as susceptible to decoding by “adversaries” as a Base64 scheme. One has to assume that the “adversaries” will become aware of the alphabet(s) used in such a scheme, and treat them exactly the same way as with Base64, described above.
- Thus, embodiments of the present invention, in which an
alphabet 34 is chosen dynamically, for example, during the creation of a long-term encrypted flow, have superior detection properties to flows that use static alphabets. Additionally, most encrypted communications sessions establish keying material, e.g.,encryption keys 38, early in the creation of the session in order to provide shared encryption and integrity keys to the underlying cryptographic “packaging.” Some of this keying material may be used to help selectdynamic encoding alphabets 34, sincesuch keys 38 are shared by both sides of a communication as a result of establishing an encrypted channel. - Referring now to
FIG. 3 , an exemplary operational flowchart is provided that describes exemplary steps performed by theencryption concealer 30 for obscuring the existence of data encryption. The process begins when theWAN interface 18 determines that encrypted data is available to be transmitted (step S102). The encrypted data may be received from aclient computer 12 in an encrypted form or without encryption. In the latter case, theWAN interface 18 may encrypt the data according to known encryption methods. - The
WAN interface 18 initiates a secure communication session with a destination device through the communication interface 20 (step S104). As part of the secure communication session initialization, theWAN interface 18 and the destination device exchange keying material (step S106), e.g.,encryption keys 38. Theencryption keys 38 are used to generate a single pseudo-randomly chosen alphabet of 64 elements selected from a wider field of 256 elements, e.g., the full set of ASCII characters (step S108). - Any strong random number generator may be used to generate the shared coding alphabet, but for purposes of improving interoperability, a standardized cryptographically-strong pseudo-random function is used, so that both sides of a communication derive the same coding alphabet. A suitable algorithm is described in Internet Request For Comments (“RFC”) 4615, with the output of the pseudo-random function (“PRF”) being the chaining variable for the next call to the PRF, and the required key, K, taken from the shared keying material from session initialization. Example pseudo-code is given in Table 1.
-
TABLE 1 char alphabet[64] chain_variable = PRF(K, block-of-16-zeros) for x in 1 to 64 do do chain_variable = PRF(K, chain_variable) c = chain_variable[0] while c is_already_used alphabet[x] = c done - To begin encoding, in accordance with the present invention, the encrypted data is sectioned into parts such as octet triplets, i.e., 3 parts of 8 bits, (step S110). An input octet triplet part of data is divided into groups of 6 bits (step S112), with those 6 bits used as an index into a table 36 of the sixty-four chosen alphabet elements (step S114). The data is encoded by mapping each group of 6 bits to a corresponding alphabet character using the 6 bits as an index to the lookup table 36 (step S116). The encoded data, i.e., 4 alphabet characters per original octet triplet part, is transmitted through the
WAN 16 to the destination device (step S118). - An exemplary operational flowchart is provided in
FIG. 4 which describes steps performed by a destination device, such as a receivingWAN interface 18 orclient computer 14, upon receiving a data message having its encryption concealed in accordance with the principles of the present invention. The process outlined inFIG. 4 is in large part the method ofFIG. 3 , performed in reverse. As above, the destination device establishes a secure communication session with the originating device (step S118) and exchanges encryption keys 38 (step S120). Theencryption keys 38 are used to pseudo-randomly generate the same Base64 alphabet set that was used to encode the encrypted data (step S122). A so-called “inverse” table can be calculated using, for example, pseudo-code shown in Table 2. -
TABLE 2 char table[256] for x in 1 to 64 do table[alphabet[x]] = x; done - The destination device receives the encoded data which consists of a series of alphabet characters contained in the pseudo-randomly generated Base64 alphabet set (step S124). On decoding, the alphabet character is used as an index into the inverse table, producing a 6-bit result (step S126). The series of 6 bit results are arranged in groups of 4 to recreate the originally encrypted octet triplet (step S128). The raw data is obtained by decrypting the octet triplet using a known encryption scheme (step S130).
- An effect of the above technique is that the input data are effectively encrypted under a mono-alphabetic substitution cipher given by the (secret) alphabet, producing an extra layer of encryption. This technique reliably produces coding schemes that produce data that consistently fail the FIPS 140-2 randomness test.
- The redundancy can be increased further by incorporating a subtle bias in the generated alphabet. For example, the generated alphabet can be arranged so that ASCII control characters are less-likely to be chosen as alphabet members, and that the ASCII group “E T A O I N S” and “e t a o i n s” are slightly-more likely to be chosen as alphabet members. This reduces the number of possible alphabets slightly, while decreasing the information density at the same time.
- A further improvement in the combinatoric-complexity of “attacks” against the coding scheme may be realized by incorporating multiple randomly-chosen alphabets for the output octet quad. Generating three different alphabets and using different alphabets for the output octet quad work to frustrate any mechanisms that may be used to reliably identify traffic encoded under this scheme. The assignment of alphabets to output quads can either be fixed, such as 1-2-3-1, or can be chosen pseudo-randomly using the same PRF as was used to generate the alphabets. While doing so does not improve the information-theoretic aspects of this system, it helps to increase the combinatoric-complexity of any “attacks” against the system.
- An attack against this scheme is considered successful if a third party is able to reliably identify encrypted traffic that is encoded under this scheme. It is useful to consider only those attacks which can be efficiently automated, since those “attacks” are the ones that this scheme is designed to protect against. Considering the example of a Base64 coding scheme, an “attacker” would need to test traffic flows with sufficient depth to guarantee that only characters from a Base64 encoding are being used in the flow, and then to decode the resulting flow, and test the resulting bit-stream for randomness. Note that since Base64 is used to protect many different types of data, not just encrypted data, many of the Base64 trial decodings will result in a “not random” verdict on the part of an automated attacker.
- A hypothetical “attack” scenario is that an adversary is in possession of some significant number of all possible coding alphabets produced by this scheme. The “attacker” would need to test a sufficient depth of traffic flow against all the alphabets in his possession before concluding that the traffic was indeed encoded under one of those alphabets. Advantageously, since the attacker cannot determine in advance which alphabet(s) will be used to encode any given flow, it remains a formidable task to reliably distinguish traffic that is encoded under this scheme to any other, non-encrypted, traffic in a typical Internet scenario.
- The total number of possible alphabets is, as previously stated, roughly 1061 possible alphabets. The suggested PRF produces approximately 1038 states before repeating. So the upper-bound on the number of possible alphabets produced by this scheme, is approximately 1038. Since each alphabet is 64 bytes in length, storing all 1038 alphabets requires an impractically-large amount of storage.
- A more devastating attack is one that can reliably detect traffic that is encoded with this scheme, but it cannot reliably infer the presence of encrypted data. If an attacker starts with a hypothesis that data under examination has been encoded with this scheme, then they can maintain frequency tables for each octet in an output quad, and after a suitable amount of data has been examined, look for frequency tables in which only 64 of the entries have non-zero counts, across all 4 of the output octets. Maintaining the frequency tables would necessarily be done on a per-flow basis since alphabets are created at the start of a flow. A problem, from the “attack” perspective, is that Base64 and other 24-to-32-bit encoding schemes would also trigger a necessarily-false positive. Since the attacker has only the frequency tables to work with and not the mapping back into 6-bits, he would be unable to unambiguously identify such traffic as having been encrypted, since the traffic cannot be decoded. The only knowledge the attacker has is that each octet is limited to 64 values—which is clearly not a “smoking gun,” but rather just a modest hint that the underlying data that is encoded under this scheme may be encrypted data.
- The “attack” discussed above in which a Base64-like coding scheme can be reliably detected, even in the presence of random alphabet selection, can be circumvented by using an ambiguous coding scheme in which some of the input 6-bit sequences can be represented by more than 1 output octet. In one such scheme, the degree of “ambiguous” coding can be selected randomly at start of communications, just as the alphabet maps are selected randomly at the start of communications. For each of the 3 alphabets and corresponding reverse maps, some number of extra, e.g., up to 23, code points are generated in the alphabet table, corresponding to up to 23 entries in the alphabet. Thus, the alphabet can be anywhere between 64 and 87 elements in length. When encoding, a random decision is made when coding a 6-bit as to which of two possible encodings to use. The probability of that decision being made could be anything, but in an implemented example, a probability of 50% is used.
- The decision as to which entries are to have “ambiguous” codings in the alphabet may also be set dynamically, using the random sequence generator to select an offset within the primary alphabet. Using an ambiguous coding scheme, in which nearly 30% of the 6-bit sequences have ambiguous codings, can strengthen the resulting encrypted flow against detection using the frequency-table analysis described previously.
- The present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computing system, or other apparatus adapted for carrying out the methods described herein, is suited to perform the functions described herein.
- A typical combination of hardware and software could be a specialized or general purpose computer system having one or more processing elements and a computer program stored on a storage medium that, when loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which, when loaded in a computing system is able to carry out these methods. Storage medium refers to any volatile or non-volatile storage device.
- Computer program or application in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.
- In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. Significantly, this invention can be embodied in other specific forms without departing from the spirit or essential attributes thereof, and accordingly, reference should be had to the following claims, rather than to the foregoing specification, as indicating the scope of the invention.
Claims (15)
1. A non-transitory processor-readable storage medium storing instructions for execution by a processor to encode an encrypted input data stream for transmission in a communications network, the instructions comprising:
instructions executable by a processor to encode the encrypted input data stream using a substitution cipher to produce an encoded data stream, the encoded data stream having a lower information density than the encrypted input data stream.
2. The non-transitory processor-readable storage medium of claim 1 , wherein the instructions executable to encode the encrypted data using a substitution cipher comprise instructions executable to expand triplets of a first number of bits to quads of a second number of bits.
3. The non-transitory processor-readable storage medium of claim 1 , wherein the substitution cipher is a monoalphabetic substitution based on a secret alphabet.
4. The non-transitory processor-readable medium of storage claim 1 , wherein the substitution cipher is a polyalphabetic substitution based on multiple secret alphabets.
5. The non-transitory processor-readable storage medium of claim 1 , wherein the substitution cipher uses an ambiguous coding scheme in which at least some of the input data is representable by more than one output character.
6. The non-transitory processor-readable storage medium of claim 1 , wherein the encoded data would fail a FIPS 140-2 randomness test.
7. The non-transitory processor-readable storage medium of claim 1 , wherein the instructions executable to encode the encrypted input data stream using the substitution cipher comprise instructions executable to:
divide the encrypted input data stream into a plurality of groups; and
map each group to a character in a set of characters.
8. The non-transitory processor-readable storage medium of claim 7 , wherein the set of characters is derivable from a set of encryption keys using a pseudorandom function.
9. A non-transitory processor-readable storage medium storing instructions for execution by a processor to decode an encoded encrypted data stream received over a communications network, the instructions comprising:
instructions executable to use a substitution cipher to decode the encoded encrypted data stream to produce a decoded encrypted data stream, the decoded encrypted data stream having a higher information density than the encoded encrypted data stream.
10. The non-transitory processor-readable storage medium of claim 9 , wherein the encoded encrypted data stream comprises characters in a set of characters, the instructions comprising instructions executable to map each character to a group of bits of the decoded encrypted data stream.
11. The non-transitory processor-readable storage medium of claim 10 , wherein the substitution cipher is an alphabetic substitution based on at least one secret alphabet.
12. The non-transitory processor-readable storage medium of claim 10 , wherein the substitution cipher is a monoalphabetic substitution based on a secret alphabet.
13. The non-transitory processor-readable storage medium of claim 10 , wherein the substitution cipher is a polyalphabetic substitution based on multiple secret alphabets.
14. The non-transitory processor-readable storage medium of claim 10 , wherein the substitution cipher uses an ambiguous coding scheme in which at least some of the input data is representable by more than one output character.
15. The non-transitory processor-readable storage medium of claim 10 , wherein the set of characters is derivable from a set of encryption keys using a pseudorandom function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/897,812 US20130251148A1 (en) | 2008-12-29 | 2013-05-20 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/345,186 US8050404B2 (en) | 2008-12-29 | 2008-12-29 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
US13/269,674 US8462943B2 (en) | 2008-12-29 | 2011-10-10 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
US13/897,812 US20130251148A1 (en) | 2008-12-29 | 2013-05-20 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/269,674 Continuation US8462943B2 (en) | 2008-12-29 | 2011-10-10 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130251148A1 true US20130251148A1 (en) | 2013-09-26 |
Family
ID=42285001
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/345,186 Expired - Fee Related US8050404B2 (en) | 2008-12-29 | 2008-12-29 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
US13/269,674 Expired - Fee Related US8462943B2 (en) | 2008-12-29 | 2011-10-10 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
US13/897,812 Abandoned US20130251148A1 (en) | 2008-12-29 | 2013-05-20 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/345,186 Expired - Fee Related US8050404B2 (en) | 2008-12-29 | 2008-12-29 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
US13/269,674 Expired - Fee Related US8462943B2 (en) | 2008-12-29 | 2011-10-10 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
Country Status (9)
Country | Link |
---|---|
US (3) | US8050404B2 (en) |
EP (1) | EP2382733A4 (en) |
JP (2) | JP5630913B2 (en) |
KR (1) | KR101255023B1 (en) |
CN (2) | CN102282798B (en) |
BR (1) | BRPI0923460A2 (en) |
CA (1) | CA2745516A1 (en) |
RU (1) | RU2497289C2 (en) |
WO (1) | WO2010075626A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714743A (en) * | 2019-02-21 | 2019-05-03 | 广州技象科技有限公司 | A kind of Bluetooth encryption communication means and Bluetooth encryption communication system |
CN113343269A (en) * | 2021-06-28 | 2021-09-03 | 迈普通信技术股份有限公司 | Encryption method and device |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8345876B1 (en) | 2012-03-06 | 2013-01-01 | Robert Samuel Sinn | Encryption/decryption system and method |
US20130251147A1 (en) * | 2012-03-24 | 2013-09-26 | Rick Peter Bonatto | Lexicon Cryptogram Generation System For Electronic Messaging |
US8744078B2 (en) * | 2012-06-05 | 2014-06-03 | Secure Channels Sa | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths |
US20140270165A1 (en) * | 2013-03-15 | 2014-09-18 | Alexandre Andre DURAND | Cryptographic system based on reproducible random sequences |
KR101584220B1 (en) * | 2014-05-30 | 2016-01-11 | 이니텍(주) | Encoding Method for Maintaining Sorting Order of Encrypted Data |
US9537833B2 (en) * | 2014-12-31 | 2017-01-03 | Google Inc. | Secure host communications |
CN104699661B (en) * | 2015-01-29 | 2018-04-10 | 中国科学院信息工程研究所 | Towards the privacy codeword selection method and system of Unicode coded documents |
CN104917747B (en) * | 2015-03-27 | 2018-07-10 | 中国科学技术大学苏州研究院 | A kind of secret communication method |
RU2643502C2 (en) * | 2015-12-08 | 2018-02-01 | Вадим Львович Стефанюк | Method of encryption by splitting method |
TWI578187B (en) * | 2016-03-30 | 2017-04-11 | 新唐科技股份有限公司 | Data protection method |
JP7143973B2 (en) * | 2017-08-15 | 2022-09-29 | 公立大学法人会津大学 | Secret data concealment method, program for implementing same, and secret data communication system |
CN110933063B (en) * | 2019-11-25 | 2022-02-18 | 中国联合网络通信集团有限公司 | Data encryption method, data decryption method and equipment |
CZ202220A3 (en) * | 2022-01-17 | 2023-07-26 | Miroslav Tyrpa | A method of encoding and decoding text and multimedia messages and a device for this |
CN116132079B (en) * | 2022-08-09 | 2024-09-27 | 马上消费金融股份有限公司 | Data processing method and device |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090138710A1 (en) * | 2005-11-04 | 2009-05-28 | Nec Corporation | Message Authentication Device, Message Authentication Method, Message Authentication Program and Storage Medium therefor |
Family Cites Families (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4979832A (en) * | 1989-11-01 | 1990-12-25 | Ritter Terry F | Dynamic substitution combiner and extractor |
US6192129B1 (en) * | 1998-02-04 | 2001-02-20 | International Business Machines Corporation | Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block |
JP3622046B2 (en) * | 1998-02-20 | 2005-02-23 | 村田機械株式会社 | Communication terminal device and program recording medium |
JP2000068999A (en) * | 1998-08-19 | 2000-03-03 | Toppan Printing Co Ltd | Secrecy data distribution system and method |
US6445797B1 (en) * | 1998-12-16 | 2002-09-03 | Secure Choice Llc | Method and system for performing secure electronic digital streaming |
JP4595170B2 (en) * | 2000-07-03 | 2010-12-08 | 沖電気工業株式会社 | Data encryption method, image transmission device, and image reception device |
JP4470135B2 (en) * | 2001-01-17 | 2010-06-02 | ネッツエスアイ東洋株式会社 | Pseudo random number generation system |
US20020095604A1 (en) * | 2001-01-18 | 2002-07-18 | Hausler Jean-Philippe D. | Encryption system and method |
US7657487B2 (en) * | 2002-04-05 | 2010-02-02 | Hewlett-Packard Development Company, L.P. | Apparatus and method for providing data storage device security |
US7209952B2 (en) * | 2002-05-13 | 2007-04-24 | Ricoh Co., Ltd. | Verification of scheme used for email message containing information about remotely monitored devices |
JP2004038385A (en) * | 2002-07-01 | 2004-02-05 | Ricoh Co Ltd | Information processing apparatus, method, and program, and printer |
JP2004260556A (en) * | 2003-02-26 | 2004-09-16 | Mitsubishi Electric Corp | Station-side apparatus, subscriber-side apparatus, communication system, and encryption key notifying method |
AR045904A1 (en) * | 2003-07-08 | 2005-11-16 | Qualcomm Inc | METHOD, APPLIANCE AND LEGIBLE ENVIRONMENT BY MACHINE FOR SECURITY IN A DATA PROCESSING SYSTEM |
KR100440037B1 (en) * | 2003-08-08 | 2004-07-14 | 주식회사 마크애니 | Document security system |
JP2005141282A (en) * | 2003-11-04 | 2005-06-02 | Fujitsu Ltd | Program for encrypting character data |
CN1599405A (en) * | 2004-07-26 | 2005-03-23 | 刘�东 | Text digital watermark technology of carried hidden information by symbolic redundancy encoding |
US20060072464A1 (en) * | 2004-09-17 | 2006-04-06 | Aaron Jeffrey A | Detection of encrypted packet streams |
JP4774509B2 (en) * | 2005-05-13 | 2011-09-14 | 国立大学法人お茶の水女子大学 | Pseudo random number generation system |
SG128507A1 (en) * | 2005-06-25 | 2007-01-30 | Krypt Technologies | Encryption system for confidential data transmission |
JP4546339B2 (en) * | 2005-06-29 | 2010-09-15 | キヤノン株式会社 | Random number generation apparatus and random number generation method |
JP4989055B2 (en) * | 2005-08-31 | 2012-08-01 | 株式会社富士通ビー・エス・シー | Character code encryption processing program and character code encryption processing method |
GB0521333D0 (en) * | 2005-10-20 | 2005-11-30 | Mitchell Alan J | Method and apparatus for encrypting, obfuscating and reconstructing datasets or objects |
CN100546239C (en) * | 2006-01-24 | 2009-09-30 | 马恒利 | The application cryptogram diagram technology carries out method of encrypting to data |
JP2009258141A (en) * | 2006-06-30 | 2009-11-05 | Kiyoto Yui | Infinite encryption/decryption device using infinite random number generation device and infinite encryption device |
JP4453688B2 (en) * | 2006-08-21 | 2010-04-21 | 村田機械株式会社 | Decryption / verification device, Internet facsimile machine, and network system |
JP5060119B2 (en) * | 2006-12-19 | 2012-10-31 | 株式会社富士通ビー・エス・シー | Cryptographic processing program, cryptographic processing method, and cryptographic processing apparatus |
JP4997982B2 (en) * | 2007-01-16 | 2012-08-15 | ソニー株式会社 | Data processing apparatus, data processing method, and computer program |
JP4875526B2 (en) * | 2007-03-28 | 2012-02-15 | 株式会社ディ・アイ・システム | Security program and server |
US20090254794A1 (en) * | 2008-04-04 | 2009-10-08 | Nxp B.V. | Method for efficient packet framing in a communication network |
US8077868B2 (en) * | 2008-05-30 | 2011-12-13 | Red Hat, Inc. | Mechanism for transport-safe codings for cryptographic use |
EP2189925A3 (en) * | 2008-11-25 | 2015-10-14 | SafeNet, Inc. | Database obfuscation system and method |
-
2008
- 2008-12-29 US US12/345,186 patent/US8050404B2/en not_active Expired - Fee Related
-
2009
- 2009-12-03 KR KR1020117014949A patent/KR101255023B1/en not_active IP Right Cessation
- 2009-12-03 CA CA2745516A patent/CA2745516A1/en not_active Abandoned
- 2009-12-03 JP JP2011542636A patent/JP5630913B2/en not_active Expired - Fee Related
- 2009-12-03 RU RU2011122728/08A patent/RU2497289C2/en not_active IP Right Cessation
- 2009-12-03 EP EP09835930.0A patent/EP2382733A4/en not_active Withdrawn
- 2009-12-03 CN CN200980154699.4A patent/CN102282798B/en not_active Expired - Fee Related
- 2009-12-03 WO PCT/CA2009/001763 patent/WO2010075626A1/en active Application Filing
- 2009-12-03 CN CN201410226510.0A patent/CN104052594A/en active Pending
- 2009-12-03 BR BRPI0923460A patent/BRPI0923460A2/en not_active IP Right Cessation
-
2011
- 2011-10-10 US US13/269,674 patent/US8462943B2/en not_active Expired - Fee Related
-
2013
- 2013-05-20 US US13/897,812 patent/US20130251148A1/en not_active Abandoned
-
2014
- 2014-07-03 JP JP2014137785A patent/JP2014209263A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090138710A1 (en) * | 2005-11-04 | 2009-05-28 | Nec Corporation | Message Authentication Device, Message Authentication Method, Message Authentication Program and Storage Medium therefor |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109714743A (en) * | 2019-02-21 | 2019-05-03 | 广州技象科技有限公司 | A kind of Bluetooth encryption communication means and Bluetooth encryption communication system |
CN113343269A (en) * | 2021-06-28 | 2021-09-03 | 迈普通信技术股份有限公司 | Encryption method and device |
Also Published As
Publication number | Publication date |
---|---|
JP5630913B2 (en) | 2014-11-26 |
CN104052594A (en) | 2014-09-17 |
CN102282798A (en) | 2011-12-14 |
US8462943B2 (en) | 2013-06-11 |
US20100166181A1 (en) | 2010-07-01 |
US20120027204A1 (en) | 2012-02-02 |
EP2382733A1 (en) | 2011-11-02 |
BRPI0923460A2 (en) | 2016-01-12 |
EP2382733A4 (en) | 2015-08-05 |
RU2011122728A (en) | 2013-02-10 |
RU2497289C2 (en) | 2013-10-27 |
KR20110102892A (en) | 2011-09-19 |
KR101255023B1 (en) | 2013-04-16 |
JP2014209263A (en) | 2014-11-06 |
US8050404B2 (en) | 2011-11-01 |
WO2010075626A1 (en) | 2010-07-08 |
CN102282798B (en) | 2014-07-02 |
JP2012514353A (en) | 2012-06-21 |
CA2745516A1 (en) | 2010-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8462943B2 (en) | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel | |
US8249255B2 (en) | System and method for securing communications between devices | |
US8275997B2 (en) | Method of encrypting and transmitting data and system for transmitting encrypted data | |
JP2005341593A (en) | Method for real-time transfer protocol (rtp) packet authentication | |
JP2009531728A (en) | Encryption methods for highest security applications | |
Lacharité et al. | Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data | |
CN1574737A (en) | Wireless network and methods for communicating in a wireless network | |
US8024574B2 (en) | Unidirectional message masking and validation system and method | |
Al-Batah et al. | Enhancing image cryptography performance with block left rotation operations | |
WO2015166701A1 (en) | Encryption method, program, and system | |
Shirole et al. | Review paper on data security in cloud computing environment | |
Ooi et al. | Cryptanalysis of s-des | |
Zhou et al. | On the security of multiple Huffman table based encryption | |
US7526643B2 (en) | System for transmitting encrypted data | |
Raza et al. | Routine of encryption in cognitive radio network | |
Kumar et al. | Invo-substitute: Three layer encryption for enhanced e-commerce website security using substitution cipher and involution function | |
Omrani et al. | Towards a real-time image/video cryptosystem: problems, analysis and recommendations | |
Najjar | Using Improved d-HMAC for Password Storage. | |
CN111698679A (en) | Data searching method and device based on block chain as service platform | |
Chandramathi et al. | Fuzzy based dynamic WEP keymanagement for WLAN security enhancement | |
EP3285429A1 (en) | Method for securely transmitting digital data | |
Sriborrirux et al. | Unequal Security Protection: A Unified Framework, Implementation, and Performance Evaluation of Theoretical and Practical Security | |
Chandramathi et al. | Modified WEP key management for enhancing WLAN security | |
Abusilmiyeh | Enhancing of CryptoBI Algorithm for Data Security in Local Area Network | |
Nandini et al. | An enhanced approach for secret key algorithm based on data encryption standard |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROCKSTAR CONSORTIUM US LP;ROCKSTAR CONSORTIUM LLC;BOCKSTAR TECHNOLOGIES LLC;AND OTHERS;REEL/FRAME:034924/0779 Effective date: 20150128 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |