Starten Sie Ihre Suche...


Durch die Nutzung unserer Webseite erklären Sie sich damit einverstanden, dass wir Cookies verwenden. Weitere Informationen

Reversible and Plausibly Deniable Covert Channels in One-Time Passwords Based on Hash Chains

Applied Sciences. Bd. 11. H. 2. Basel, Schweiz: MDPI 2021 S. 731 - 742

Erscheinungsjahr: 2021

ISBN/ISSN: 2076-3417

Publikationstyp: Zeitschriftenaufsatz

Sprache: Englisch

Doi/URN: 10.3390/app11020731

Volltext über DOI/URN

GeprüftBibliothek

Inhaltszusammenfassung


Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such covert communications. We present a covert channel between two devices where one device authenticates itself with Lamport’s one-time passwords based on a cryptographic hash function. Our channel enables plausible deniability jointly with reversi...Covert channels enable stealthy communications over innocent appearing carriers. They are increasingly applied in the network context. However, little work is available that exploits cryptographic primitives in the networking context to establish such covert communications. We present a covert channel between two devices where one device authenticates itself with Lamport’s one-time passwords based on a cryptographic hash function. Our channel enables plausible deniability jointly with reversibility and is applicable in different contexts, such as traditional TCP/IP networks, CPS/IoT communication, blockchain-driven systems and local inter-process communications that apply hash chains. We also present countermeasures to detect the presence of such a covert channel, which are non-trivial because hash values are random-looking binary strings, so that deviations are not likely to be detected. We report on experimental results with MD5 and SHA-3 hash functions for two covert channel variants running in a localhost setup. In particular, we evaluate the channels’ time performance, conduct statistical tests using the NIST suite and run a test for matching hash values between legitimate and covert environments to determine our channels’ stealthiness. » weiterlesen» einklappen

  • Covert Channel Steganography Information Hiding Cryptology Hash Chain One-time Passwords Cryptographic Hash Function Plausible Deniability

Autoren


Keller, Jörg (Autor)

Klassifikation


DFG Fachgebiet:
Informatik

DDC Sachgruppe:
Informatik

Verbundene Forschungsprojekte


Verknüpfte Personen