Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication
Title | Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Fatayer, T. S. A. |
Conference Name | 2017 Palestinian International Conference on Information and Communication Technology (PICICT) |
Keywords | advanced encryption standard, Algorithm, authentication, compositionality, confidentiality, covert channel, covert channels, cryptography, cryptography algorithms, dynamic secure communication, dynamically, Encryption, fake key, generated un-detectability covert channel algorithm, hashed message authentication code, Heuristic algorithms, message authentication, Protocols, pubcrawl, Resiliency, Scalability, Servers, telecommunication channels, telecommunication security, un-detectability |
Abstract | The keys generated by (symmetric or asymmetric) have been still compromised by attackers. Cryptography algorithms need extra efforts to enhance the security of keys that are transferring between parities. Also, using cryptography algorithms increase time consumption and overhead cost through communication. Encryption is very important issue for protecting information from stealing. Unfortunately encryption can achieve confidentiality not integrity. Covert channel allows two parties to indirectly send information, where the main drawbacks of covert channel are detectability and the security of pre-agreement knowledge. In this paper, i merge between encryption, authentication and convert channel to achieve un-detectability covert channel. This channel guarantee integrity and confidentiality of covert data and sending data dynamically. I propose and implement un-detectability a covert channel using AES (Advanced Encryption Standard) algorithm and HMAC (Hashed Message Authentication Code). Where this channel is un-detectability with integrity and confidentiality agreement process between the sender and the receiver. Instead of sending fake key directly through channel, encryption and HMAC function used to hide fake key. After that investigations techniques for improving un-detectability of channel is proposed. |
URL | http://ieeexplore.ieee.org/document/8038315/ |
DOI | 10.1109/PICICT.2017.13 |
Citation Key | fatayer_generated_2017 |
- fake key
- un-detectability
- telecommunication security
- telecommunication channels
- Servers
- Scalability
- Resiliency
- pubcrawl
- Protocols
- message authentication
- Heuristic algorithms
- hashed message authentication code
- generated un-detectability covert channel algorithm
- advanced encryption standard
- encryption
- dynamically
- dynamic secure communication
- cryptography algorithms
- Cryptography
- covert channels
- covert channel
- confidentiality
- Compositionality
- authentication
- Algorithm