ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2020, Vol. 57 ›› Issue (11): 2283-2293.doi: 10.7544/issn1000-1239.2020.20200420

Special Issue: 2020密码学与数据隐私保护研究专题

Previous Articles     Next Articles

File Covert Transfer Strategy Based on End Hopping and Spreading

Hou Bowen, Guo Hongbin, Shi Leyi   

  1. (College of Computer Science and Technology, China University of Petroleum, Qingdao, Shandong 266580)
  • Online:2020-11-01
  • Supported by: 
    This work was supported by the National Natural Science Foundation of China (61772551) and the Natural Science Foundation of Shandong Province of China (ZR2019MF034).

Abstract: The end hopping and spreading technology is an active defense technology that pseudorandom changes the end information in the end to end data transmission and uses the end spreading sequence to realize high-speed synchronous authentication. In this paper, the end hopping and spreading technology is introduced into file covert transfer, the file covert transmission strategy under the end hopping and spreading network is studied, the multicast time correction scheme is proposed, and the synchronization problem in communication process is solved. Two kinds of file transfer schemes based on time transfer and transmission size transfer are proposed for the end hopping and spreading network, and the data migration is added into the file transfer process to realize the covert transmission and integrity transmission of files. A prototype system is designed and implemented for the file covert transfer of end hopping and spreading, and the usability and security are tested. The experimental results show that the file covert transfer strategy can effectively meet the requirements for the integrity and concealment of file transfer.

Key words: covert communication, end hopping and spreading, file transfer, multicast time correction, data migration

CLC Number: