A symmetric key distribution protocol utilizing network steganography
This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to s...
Saved in:
Main Authors: | De La Cerna, Methuselah Galagar, Valera, Luis Angelo De La Cruz, Betito, Bernice Marie Martinez |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2022
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etdb_comtech/5 https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Similar Items
-
PC-based data steganography for FM radio
by: Chu, Helvin Khen G.C., et al.
Published: (2008) -
Classical and physical security of symmetric key cryptographic algorithms
by: Baksi, Anubhab
Published: (2021) -
Certificateless public key encryption: A new generic construction and two pairing-free schemes
by: Yang, G., et al.
Published: (2014) -
The invisible truth: Secrets behind steganography
by: Quinto, Amando Jose, et al.
Published: (2008) -
Certificateless public key encryption: A new generic construction and two pairing-free schemes
by: YANG, Guomin, et al.
Published: (2011)