ISSN 1000-1239 CN 11-1777/TP

计算机研究与发展 ›› 2020, Vol. 57 ›› Issue (11): 2283-2293.doi: 10.7544/issn1000-1239.2020.20200420

所属专题: 2020密码学与数据隐私保护研究专题

• 信息安全 • 上一篇    下一篇

基于端信息跳扩混合的文件隐蔽传输策略

侯博文,郭宏彬,石乐义   

  1. (中国石油大学(华东)计算机科学与技术学院 山东青岛 266580) (78149170@qq.com)
  • 出版日期: 2020-11-01
  • 基金资助: 
    国家自然科学基金项目(61772551);山东省自然科学基金项目(ZR2019MF034)

File Covert Transfer Strategy Based on End Hopping and Spreading

Hou Bowen, Guo Hongbin, Shi Leyi   

  1. (College of Computer Science and Technology, China University of Petroleum, Qingdao, Shandong 266580)
  • Online: 2020-11-01
  • Supported by: 
    This work was supported by the National Natural Science Foundation of China (61772551) and the Natural Science Foundation of Shandong Province of China (ZR2019MF034).

摘要: 端信息跳扩混合技术是一种在端到端的网络数据传输中伪随机改变端信息,并利用端信息扩展序列实现高速同步认证的主动防御技术.将端信息跳扩混合技术引入文件隐蔽传输,研究了端信息跳扩混合网络环境下的文件隐蔽传输策略,提出组播时间校正方案,解决了通信过程中的同步问题;提出基于时间传输和基于传输大小传输的2种适用于端信息跳扩混合网络环境文件传输方案,并在文件传输过程中增加数据迁移技术,实现文件的隐蔽传输和完整性传输;设计实现端信息跳扩混合文件隐蔽传输原型系统并进行了有效性、安全性测试,实验结果表明:该文件隐蔽传输策略能够有效满足文件传输完整性和隐蔽性要求.

关键词: 隐蔽通信, 端信息跳扩混合, 文件传输, 组播时间校正, 数据迁移

Abstract: The end hopping and spreading technology is an active defense technology that pseudorandom changes the end information in the end to end data transmission and uses the end spreading sequence to realize high-speed synchronous authentication. In this paper, the end hopping and spreading technology is introduced into file covert transfer, the file covert transmission strategy under the end hopping and spreading network is studied, the multicast time correction scheme is proposed, and the synchronization problem in communication process is solved. Two kinds of file transfer schemes based on time transfer and transmission size transfer are proposed for the end hopping and spreading network, and the data migration is added into the file transfer process to realize the covert transmission and integrity transmission of files. A prototype system is designed and implemented for the file covert transfer of end hopping and spreading, and the usability and security are tested. The experimental results show that the file covert transfer strategy can effectively meet the requirements for the integrity and concealment of file transfer.

Key words: covert communication, end hopping and spreading, file transfer, multicast time correction, data migration

中图分类号: