Studied on Application of Double Encryption Algorithm in Covert Channel Transmission
Title | Studied on Application of Double Encryption Algorithm in Covert Channel Transmission |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Liu, T., Wen, Y. |
Conference Name | 2018 International Conference on Intelligent Transportation, Big Data Smart City (ICITBS) |
Date Published | jan |
Publisher | IEEE |
ISBN Number | 978-1-5386-4201-6 |
Keywords | asymmetric encryption algorithm, Big Data, compositionality, Conferences, covert channel, covert channel transmission, covert channels, covert transmission, cryptography, DES, Double encryption, double encryption algorithm, file transfer, intelligent mobile terminal, mobile computing, mobile intelligent terminal, mobile terminal data transmission, resilience, RSA, Scalability, Security transmission, smart cities, symmetric encryption, telecommunication security, transmission process, Transportation |
Abstract | In the process of mobile intelligent terminal for file transfer, ensure the safety of data transmission is significant. It is necessary to prevent the file from being eavesdropped and tampered during transmission. The method of using double encryption on covert channel is proposed in this paper based on the analysis of encryption algorithms and covert channel, which uses asymmetric encryption algorithm to encrypt the key of symmetric encryption, to form hidden information, and to carry out covert transmission through covert channels to enhance the security of mobile terminal data transmission. By simulating the above scenarios in intelligent mobile terminal, the confidentiality and concealment of important information are realized in the transmission process. |
URL | https://ieeexplore.ieee.org/document/8332745 |
DOI | 10.1109/ICITBS.2018.00061 |
Citation Key | liu_studied_2018 |
- intelligent mobile terminal
- Transportation
- transmission process
- telecommunication security
- symmetric encryption
- smart cities
- Security transmission
- Scalability
- RSA
- resilience
- mobile terminal data transmission
- mobile intelligent terminal
- mobile computing
- asymmetric encryption algorithm
- file transfer
- double encryption algorithm
- Double encryption
- DES
- Cryptography
- covert transmission
- covert channels
- covert channel transmission
- covert channel
- Conferences
- Compositionality
- Big Data