Secure Data Communications using Cryptography and IPv6 Steganography

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Security is an important topic in any communication especially if the communicating endpoints have confidential data and require utilizing special techniques to protect it. In this research paper, cryptography method was combined with steganography to enable sending confidential data by utilizing IPv6 protocol header as a cover to conceal secret messages. Flow label field is the field that will be used as a covert channel to exchange critical data between the endpoints. To generate the encryption/decryption key, a proposed pseudo-random number generator was applied. The generated numbers show good statistics when tested using standard statistical tests. In cryptography, RC6 was executed in CBC mode to encrypt/decrypt N blocks of data. For origin authentication, a proposed MAC was implemented to the encrypted data to obtain MAC value that will be sent along with the encrypted data to the receiving endpoints. After obtaining the encrypted data and the MAC, both will be embedded in IPv6 flow label field.

     

     

     


  • Keywords


    Data Hiding, Cryptography, Steganography, Network Steganography, TCP/IP.

  • References


      [1] P. Xue, H. Liu, J. Hu, and R. Hu, "A multi-layer steganographic method based on audio time domain segmented and network steganography," in AIP Conference Proceedings, 2018, p. 020046.

      [2] P. Sharma and S. Dahiya, "Network Security with Cryptography," 2018.

      [3] R. K. Yadav and M. Kushwaha, "Message Hiding Using Steganography and Cryptography," 2018.

      [4] N. Singh, J. Bhardwaj, and G. Raghav, Network Steganography and its Techniques: A Survey vol. 174, 2017.

      [5] E. Cauich, R. G. Cárdenas, and R. Watanabe, "Data hiding in identification and offset IP fields," in International Symposium and School on Advancex Distributed Systems, 2005, pp. 118-125.

      [6] S. Zander, G. Armitage, and P. Branch, "A survey of covert channels and countermeasures in computer network protocols," IEEE Communications Surveys & Tutorials, vol. 9, pp. 44-57, 2007.

      [7] T. G. Handel and M. Sandford, "Data hiding in the OSI network model," in Proceedings of Information Hiding: First International Workshop, 1996, pp. 73-93.

      [8] C. H. Rowland, "Covert channels in the TCP/IP protocol suite," First Monday, vol. 2, 1997.

      [9] D. Dhobale, V. Ghorpade, B. Patil, and S. Patil, "Steganography by hiding data in TCP/IP headers," in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, 2010, pp. V4-61-V4-65.

      [10] [R. Goudar, S. Wagh, and M. Goudar, "Secure data transmission using steganography based data hiding in TCP/IP," in Proceedings of the International Conference & Workshop on Emerging Trends in Technology, 2011, pp. 974-979.

      [11] M. Alaa Qasim, D. Pawar, and I. Publication, ENCRYPTION & STEGANOGRAPHY IN IPv6 SOURCE ADDRESS vol. 4, 2013.

      [12] S. Bobade and R. Goudar, "Secure data communication using protocol steganography in IPv6," in Computing Communication Control and Automation (ICCUBEA), 2015 International Conference on, 2015, pp. 275-279.

      [13] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, Handbook of applied cryptography: CRC press, 1996.

      [14] S.V. Manikanthan, T.Padmapriya, "United Approach in Authorized and Unauthorized Groups in LTE-A Pro", Jour of Adv Research in Dynamical & Control Systems, Vol. 10, 10-Special Issue, 2018, pp. (1137-1145).


 

View

Download

Article ID: 27972
 
DOI: 10.14419/ijet.v7i4.19.27972




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.