A symmetric key distribution protocol utilizing network steganography
This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to s...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2022
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etdb_comtech/5 https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |