Abstract
Cryptography, the science of secret writing, is in use since long to inarticulate the legitimate contents to prevent their unauthorized exposure. To ensure secure communication between communicators, cryptographic contrivances such as encryption and authentication relies on the conjecture of prior sharing of some secret called cryptographic or secret key that reign the security of the underneath algorithms. Hence, safekeeping and handling of such keys at all stages of encryption and decryption inclusive of its generation, storage, distribution, archiving and destruction are imperative. Kirchhoff, in 1883, has already elucidated on the significance of such keys by expounding that the security of a public domain encryption algorithm lies in protecting the key used in communication. Regardless of the key being symmetric or asymmetric, its distribution/exchange over an insecure channel such as the internet, together with the increasing concern among technologically advanced countries on suppressing encryption, calls for an oblivious mechanism for its undercover traversal. Steganography, the purpose of which is to embed information seamlessly inside some carrier, is the technique used for stealth information exchange, and hence, seems ideal for key management and its successive dissemination. Through this research endeavor, we have proposed a novel stealth key-exchange solution, which makes use of interactive computer-mediated technologies, cryptography, and steganography. Our proposed method adlibs the Diffie-Hellman key exchange algorithm by disregarding the direct routing of any data relating to key exchange, and hence protects it from man-in-the-middle attack by keeping intact the anonymity of communicators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mohammadi, M: The Internet and the treasure house of information. In: The Iranian Reform Movement, pp. 215–239 (2019). Springer
Papacharissi, Z.: The virtual sphere: the internet as a public sphere. In: Praktiken der Überwachten, pp. 43–60. Springer, Wiesbaden (2019)
Aswale, P., Shukla, A., Bharati, P., Bharambe, S., Palve, S.: An overview of internet of things: architecture, protocols and challenges. In: Information and Communication Technology for Intelligent Systems, pp. 299–308. Springer, Singapore (2019)
Chang, C., Srirama, S.N., Buyya, R.: Internet of Things (IoT) and new computing paradigms. In: Buyya, R., Srirama, S.N., (eds.) Fog and Edge Computing: Principles and Paradigms, 1st edn. Wiley (2019)
Benjelloun, F.-Z., Lahcen, A.A.: Big data security: challenges, recommendations and solutions. In: Web Services: Concepts, Methodologies, Tools, and Applications, pp. 25–38. IGI Global (2019)
Ali, I., Sabir, S., Ullah, Z.: Internet of things security, device authentication and access control: a review. arXiv preprint arXiv:1901.07309 (2019)
Sciancalepore, S., Oligeri, G., Piro, G., Boggia, G., Di Pietro, R.: Exchange: securing IoT via channel anonymity. Comput. Commun. 134, 14–29 (2019)
Yahya, A.: Steganography techniques. In: Steganography Techniques for Digital Images, pp. 9–42. Springer (2019)
Horsman, G.: A call for the prohibition of encryption; panacea or problem? IEEE Security and Privacy Magazine (2018)
Kuehn, K.: Surveillance and South Africa. The Polit. Econ. Commun. 6(2), 94–100 (2019)
Kapoor, N., Narkowicz, K.: Unmaking citizens: passport removals, pre-emptive policing and the reimagining of colonial governmentalities. Ethn. and Racial Stud. 42, 45–62 (2019)
Bachmann, G., Knecht, M., Wittel, A.: The social productivity of anonymity. Ephemera Theor. Polit. Organ. 17, 241–258 (2017)
Lipschultz, J.: Free Expression in the Age of the Internet: Social and Legal Boundaries. Routledge, New York (2018)
Draper, N.A.: The Identity Trade: Selling Privacy and Reputation Online. New York University Press, New York (2019)
Chang, C.P.: Searching on Facebook through the lens of the concept of privacy. In: Social Networks and Surveillance for Society, pp. 129–148. Springer, Cham (2019)
Mishra, S., Sahoo, S., Mishra, B.K.: Addressing security issues and standards in Internet of things. In: Emerging Trends and Applications in Cognitive Computing, pp. 224–257. IGI Global (2019)
Attié, E., Meyer-Waarden, L.: The acceptance process of the Internet of Things: how to improve the acceptance of the IoT technology. In: Smart Marketing with the Internet of Things, pp. 21–45. IGI Global (2019)
Lin, T.T.C., Kononova, A., Chiang, Y.-H.: Screen addiction and media multitasking among American and Taiwanese users. J. Comput. Inf. Syst., (2019). https://doi.org/10.1080/08874417.2018.1556133
Przegalinska, A.: Addiction and distraction. In Wearable Technologies in Organizations, pp. 25–31. Springer, Cham (2019)
Hedström, K., Sefyrin, J., Gustafsson, M., Wihlborg, E., Iréne, B.: A digital society for all? Meanings, practices and policies for digital diversity. In: Proceedings of the 52nd Hawaii International Conference on System Sciences (2019)
Kizza, J.M.: Ethical, privacy, and security issues in the online social network ecosystems. In: Ethical and Secure Computing. Undergraduate Topics in Computer Science, Springer, Cham (2019)
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., et al.: RFC 2616. Hypertext Transfer Protocol–HTTP/1.1, vol. 2, p. 2.2 (1999)
Andersson, L., Madsen, T.: RFC 4026-Provider Provisioned Virtual Private Network (VPN) Terminology, March 2005
Appelbaum, J., Muffett, A.: The “. onion” special-use domain name (2015)
Pinsonneault, A., Heppel, N.: Anonymity in group support systems research: a new conceptualization, measure, and contingency framework. J. Manag. Inf. Syst. 14, 89–108 (1997)
Wang, D., Cheng, H., He, D., Wang, P.: On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices. IEEE Syst. J. 12, 916–925 (2018)
Wood, A., Nissim, K.: Is privacy privacy? (2018)
Rumbold, B., Wilson, J.: Privacy rights and public information. J. Polit. Philos. 27, 3–25 (2019)
Cole, D., Fabbrini, F.: Bridging the transatlantic divide? The United States, the European Union, and the protection of privacy across borders. Int. J. Const. Law 14, 220–237 (2016)
Hamidi, F., Poneres, K., Massey, A., Hurst, A.: Who should have access to my pointing data?: privacy tradeoffs of adaptive assistive technologies. In: Proceedings of the 20th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 203–216 (2018)
Forgas, J.P., Baumeister Routledge, R.F.: The Social Psychology of Living Well, 1st edn. Published February 7 (2018). ISBN 9780815369240
Roth, G.B.: Probabilistic key rotation. Google Patents (2019)
Thapar, S.S., Sarangal, H.: A study of data threats and the role of cryptography algorithms. In: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), pp. 819–824 (2018)
Yan, S.Y.: Offensive cryptography. In: Cybercryptography: Applicable Cryptography for Cyberspace Security. Springer, Cham (2019)
Pelton, J.N., Singh, I.B.: Protecting privacy from internet abuses in the smart city. In: Smart Cities of Today and Tomorrow. Copernicus, Cham (2019)
Cavelty, M.D., Kavanagh, C.: Cybersecurity and human rights. In: Research Handbook on Human Rights and Digital Technology. Edward Elgar Publishing (2019)
Geurden, M.: A New Future for Military Security Using Fully Homomorphic Encryption (2018)
Dierks, T., Rescorla, E.: RFC 5246. The transport layer security (TLS) protocol version, vol. 1 (2008)
Hoffman, P.: Cryptographic suites for IPsec, 2070–1721 (2005)
Ghosh, E., Debnath, D., Banik, B.G.: Blind RGB image Steganography using discrete cosine transformation. In: Emerging Technologies in Data Mining and Information Security, pp. 189–201. Springer, Singapore (2019)
Douglas, M., Bailey, K., Leeney, M., Curran, K.: An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Appl. 77, 17333–17373 (2018)
Sarmah, D.K., Kulkarni, A.J.: Improved cohort Intelligence—a high capacity, swift and secure approach on JPEG image steganography. J. Inf. Secu. Appl. 45, 90–106 (2019)
Kothari, A.M., Dwivedi, V., Thanki, R.M.: Introduction. In: Watermarking Techniques for Copyright Protection of Videos. Signals and Communication Technology. Springer, Cham (2019)
Kini, N.G., Kini, V.G.: A secured steganography algorithm for hiding an image in an image. In: Integrated Intelligent Computing, Communication and Security, pp. 539–546. Springer (2019)
Pandian, R., Xu, F., Sadrloshrafi, M., Gupta, R.: Online data transformation. Google Patents (2018)
Shashni, N., Yadav, M.: Cryptanalysis on digital image watermarking based on feature extraction and visual cryptography. In: Progress in Advanced Computing and Intelligent Engineering, pp. 425–435. Springer, Singapore (2019)
Bhat, S., Kapoor, V.: Secure and efficient data privacy, authentication and integrity schemes using hybrid cryptography. In: International Conference on Advanced Computing Networking and Informatics, pp. 279–285 (2019)
Hancock, P., Steele, S.: Facilitating provisioning of an out-of-band pseudonym over a secure communication channel. Google Patents (2019)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
Housley, R.: Internationalization Updates to RFC 5280, 2070–1721 (2018)
Harkins, D., Carrel, D.: RFC 2409. The Internet Key Exchange (IKE) (1998)
Felsch, D., Grothe, M., Schwenk, J., Czubak, A., Szymanek, M.: The dangers of key reuse: practical attacks on IPsec {IKE}. In: 27th {USENIX} Security Symposium ({USENIX} Security 18), pp. 567–583 (2018)
Farrell, S., Tschofenig, H.: Pervasive monitoring is an attack (2014)
Deibert, R.: Cyberspace under siege. J. Democracy 26, 64–78 (2015)
Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., Morris, J., Hansen, M. et al.: RFC 6973: Privacy considerations for Internet protocols. IETF. Retrieved from tools. ietf. org/html/rfc6973 (2013)
Rescorla, E., Korver, B.: RFC 3552: Guidelines for writing RFC text on security considerations. Internet Society Req. for Comm. (2003)
Simmons, G.J.: The prisoners’ problem and the subliminal channel. In: Advances in Cryptology, pp. 51–67 (1984)
Von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using hard AI problems for security. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 294–311 (2003)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
Turner, S.: Using SHA2 Algorithms with Cryptographic Message Syntax (2010)
Daemen, J., Rijmen, V.: AES proposal: Rijndael (1999)
Choi, J., Oh, T., Aiken, W., Woo, S.S., Kim, H.: POSTER: I can’t hear this because I am human: a novel design of audio CAPTCHA system. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pp. 833–835 (2018)
Chong, I., Xiong, A., Proctor, R.W.: Human factors in the privacy and security of the Internet of things. In: Ergonomics in Design (2018). https://doi.org/10.1177/1064804617750321
Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol. J. 19, 122–131 (2001)
Andress, A.: Surviving Security: How to Integrate People, Process, and Technology. Auerbach Publications, Boca Raton, 2003
Brauch, H.G.: From a security towards a survival dilemma. In: Globalization and environmental challenges, pp. 537–552. Springer, Berlin (2008)
Nye Jr., J.S., Lynn-Jones, S.M.: International security studies: a report of a conference on the state of the field. Int. Secur. 12, 5–27 (1988)
Perrin, C.: The CIA triad. Dostopno na (2008). http://www.techrepublic.com/blog/security/the-cia-triad/488
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Rafat, K.F. (2019). A Stealth Key Exchange Protocol. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Intelligent Computing. CompCom 2019. Advances in Intelligent Systems and Computing, vol 998. Springer, Cham. https://doi.org/10.1007/978-3-030-22868-2_48
Download citation
DOI: https://doi.org/10.1007/978-3-030-22868-2_48
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22867-5
Online ISBN: 978-3-030-22868-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)