A symmetric key distribution protocol utilizing network steganography

This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to s...

Full description

Saved in:
Bibliographic Details
Main Authors: De La Cerna, Methuselah Galagar, Valera, Luis Angelo De La Cruz, Betito, Bernice Marie Martinez
Format: text
Language:English
Published: Animo Repository 2022
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etdb_comtech/5
https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
id oai:animorepository.dlsu.edu.ph:etdb_comtech-1006
record_format eprints
spelling oai:animorepository.dlsu.edu.ph:etdb_comtech-10062022-09-15T00:40:02Z A symmetric key distribution protocol utilizing network steganography De La Cerna, Methuselah Galagar Valera, Luis Angelo De La Cruz Betito, Bernice Marie Martinez This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to simulate the transmission of the symmetric key based on the protocol designed. Several observations were made based on the conducted test results. First, the implementation can transmit an AES-256 symmetric key in a virtual environment. Second, the implementation was able to secretly transmit the symmetric key, with Wireshark not flagging any packets for errors or misuse. Third, it was also proven to handle potential packet loss using a built-in measure to resend the missing packets and deal with packet delays. Additionally, the implementation was proven to have a degree of accuracy when transmitting the symmetric key. Finally, by comparing the implemented programs' performance against an RSA program, it was observed that both programs have similar CPU consumption. However, the implementation was notably faster than the RSA program regarding their computational time and end-to-end latency. 2022-07-07T07:00:00Z text application/pdf https://animorepository.dlsu.edu.ph/etdb_comtech/5 https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech Computer Technology Bachelor's Theses English Animo Repository Cryptography Data encryption (Computer science) Information Security
institution De La Salle University
building De La Salle University Library
continent Asia
country Philippines
Philippines
content_provider De La Salle University Library
collection DLSU Institutional Repository
language English
topic Cryptography
Data encryption (Computer science)
Information Security
spellingShingle Cryptography
Data encryption (Computer science)
Information Security
De La Cerna, Methuselah Galagar
Valera, Luis Angelo De La Cruz
Betito, Bernice Marie Martinez
A symmetric key distribution protocol utilizing network steganography
description This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to simulate the transmission of the symmetric key based on the protocol designed. Several observations were made based on the conducted test results. First, the implementation can transmit an AES-256 symmetric key in a virtual environment. Second, the implementation was able to secretly transmit the symmetric key, with Wireshark not flagging any packets for errors or misuse. Third, it was also proven to handle potential packet loss using a built-in measure to resend the missing packets and deal with packet delays. Additionally, the implementation was proven to have a degree of accuracy when transmitting the symmetric key. Finally, by comparing the implemented programs' performance against an RSA program, it was observed that both programs have similar CPU consumption. However, the implementation was notably faster than the RSA program regarding their computational time and end-to-end latency.
format text
author De La Cerna, Methuselah Galagar
Valera, Luis Angelo De La Cruz
Betito, Bernice Marie Martinez
author_facet De La Cerna, Methuselah Galagar
Valera, Luis Angelo De La Cruz
Betito, Bernice Marie Martinez
author_sort De La Cerna, Methuselah Galagar
title A symmetric key distribution protocol utilizing network steganography
title_short A symmetric key distribution protocol utilizing network steganography
title_full A symmetric key distribution protocol utilizing network steganography
title_fullStr A symmetric key distribution protocol utilizing network steganography
title_full_unstemmed A symmetric key distribution protocol utilizing network steganography
title_sort symmetric key distribution protocol utilizing network steganography
publisher Animo Repository
publishDate 2022
url https://animorepository.dlsu.edu.ph/etdb_comtech/5
https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech
_version_ 1744376653798178816