Font Size: a A A

Network Communication Of Information Hiding Technology

Posted on:2009-11-19Degree:MasterType:Thesis
Country:ChinaCandidate:J T DiFull Text:PDF
GTID:2208360245979041Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet technology, information can be transmitted faster and more conveniently. Meanwhile, the security in information transmission are more concerned, especially the security information referring to the national security, business secret and personal privacy.In the past, encryption was used in the transmission ,but, it rose the decode interestings and the decoding speed were faster with the development of hardware. Information hiding technology car solve the problem well. Information hiding technology is to hide information to some information carriers, which is the technology for protecting the secret information. It is a branch of information security technology. The large information flow in network supplies the large redundancy in the network communication data as the carrier to performing secret communication, which can make the attacker difficult to check all the communication data in the network. So, hiding in network data is an ideal method. This paper studies the information hiding technology in network communication, including the following results:1) Achieve an information hiding algorithm based on the protocols in the TCP / IP protocol family.2) Design and develop a set of protocols corresponding to WinPcap. Develop a set of controlling protocols and guarantees the safety of the control channel by utilizing the RSA public key system and the Diffie-Hellman key exchange algorithm.3) Take the relations between packets as secret channels, which is different from the past information hiding means based on the TCP protocol field. Information hiding is based on the relationship of the data packets such as: port jumping and packet length change.4) Use the signaling statement of application layer protocol (telnet ftp, smtp, pop3, http, ssh) to hide information and the tra(?)smission of the hidden information, can be realized by the transmission of the application layer signaling statements.5) Analyse the indexes, characters of network information hiding and the control channel, giving improving ideas on two algorithms which used in this article.
Keywords/Search Tags:information hiding, TCP/IP protocol, safety controlling channel, relations of patterns between packets, signaling statement
PDF Full Text Request
Related items