A symmetric key distribution protocol utilizing network steganography

This study explores network steganography techniques in implementing a symmetric key distribution protocol. The implemented design used the Overflow Field of an IP Timestamp Option as a covert channel to carry the symmetric key. The researchers developed Steganogram Receiver and Sender programs to s...

Full description

Saved in:
Bibliographic Details
Main Authors: De La Cerna, Methuselah Galagar, Valera, Luis Angelo De La Cruz, Betito, Bernice Marie Martinez
Format: text
Language:English
Published: Animo Repository 2022
Subjects:
Online Access:https://animorepository.dlsu.edu.ph/etdb_comtech/5
https://animorepository.dlsu.edu.ph/cgi/viewcontent.cgi?article=1006&context=etdb_comtech
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
Be the first to leave a comment!
You must be logged in first