SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
315
ENCRYPTION & STEGANOGRAPHY IN IPv6 SOURCE ADDRESS
Mustafa Alaa Qasim1
, Dipak Pawar2
1
(Research Scholar, Department of Computer Engineering, VIT College, University of Pune,
Pune, India)
2
(Asst. Prof., Department of Computer Engineering, VIT College, University of Pune, Pune,
India)
ABSTRACT
Steganography is the process of hiding a secret message in covert channel that is
difficult to detect the existence of secret message. Covert channel is a secret communication
channel used for transmitting information. Steganography within the source address fields of
Internet Protocol Version 6 (IPv6) packets create a covert channel in which secret messages
are passed from one side to another. Cryptography is the conversion of data into a secret code
for transmission over a public network. The feature of Steganography over cryptography is
that messages which not attract attention to themselves, whereas cryptography protects the
contents of a message. Steganography can protect both messages and communicating parties.
keywords: Covert Channel, Steganography, Cryptography.
I. INTRODUCTION
Steganography is very old art of embedding private messages in seemingly innocuous
messages in a way that prevents the detection of the secret messages by a third party.
Similarly, Steganography means establishing covert channels. A covert channel is a secret
communication channel used for transmitting information [1]. Steganographic methods
operate in two steps: First, a cover object is analyzed to determine to what extent it can be
modified so that the medications will not be easily observable, second: the message bits are
inserted into the cover object by making changes replaced by the message bits to create an
altered cover object [2]. TCP/IP header fields such as type of service, IP Identification field,
fragment offset, option etc. may be used to embed steganographic data and use as
steganographic carriers [3,4]. Internet protocol version 6 (IPv6) is the “next generation”
internet protocol which is set slowly, merge and ultimately replace IPv4. If the world
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING
& TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 2, March – April (2013), pp. 315-324
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
316
continues at its current rate of adding 170 million IP addresses per year for new hosts which
connect the Internet, people will exhaust the current address space available for IPv4 in 7.5
years. This is the main driving force behind the push to switch to IPv6 [5]. An IPv6 packet
header consists of the fields shown below in Figure 1.
Version
( 4 Bit )
Traffic class
( 8 Bit )
Flow Label ( 20 Bit )
Payload Length
( 16 Bit )
Next Header
( 8 Bit )
Hop Limit
( 8 Bit )
Source Address
( 128 Bit )
Destination Address
( 128 Bit )
Fig.1 IPv6 Header
Many covert channels can be selected in IPv6 header such as traffic class, flow label,
payload length, next header, hop limit and source address [6]. The IPv6 specifications [7]
along with the privacy extensions for the stateless address auto configuration feature
introduces the possibility of embedding a significant amount of secret data into the source
address field. The packet header will likely be undetectable to an uninformed observer. The
source address is a 128-bit field, which is intended to contain the universally unique internet
address of the originator of the packet. The privacy extensions proposed for IPv6 rely on the
random generation of a 64-bit portion of the 128-bit source address, the expectation that the
built-in randomness will create a shield of entropy, which should effectively hide any
enclosed message [5]. Cryptography can be defined as secret writing. The basic service that
cryptography offers is the ability of transmitting information among people in a way that
prevents a third party from reading it. Cryptographic systems usually involves both an
algorithm and secret key. The reason for having a secret key is keeping the algorithm secret
in a very difficult way to view [1].
II. RELATED WORK
One of the most common ways of sending messages in modern times, is through the
use of the internet [5]. The TCP/IP header can be used as a carrier for a steganographic covert
channel. The Steganographic covert channels depend on modification of network protocol
header values. In TCP Header, there are many possible hidden channels such as PAD
(padding bits) with bandwidth 31 bits/packet, usage of chosen ISN (initial sequence number)
with 32 bits per connection, usage of urgent pointer when URG=0-16 bits/packet, usage of
reserved bits with 6 bits/packet, and existence of data when
RST=1and Port numbers as analphabet (→) [3,4].
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
317
Source Port
Destination Port
Sequence Number
Acknowledgment Number
Header
Length
Reserved
Code
bits Window
Checksum
Urgent Pointer
Checksum
Padding
Fig.2 TCP Header
In IPv6 header, there are many possible hidden channels such as traffic class (set a
false traffic class), flow Label (set a false flow label), payload Length (increase value to
insert extra data), next header (set a valid value to add an extra extension header), hop limit
(increasing or decreasing value of hop limit) and source address (set a false source address)
[6]. IPv6 address is 128 bits consist of two parts: network prefix 64 bit and interface identifier
64 bit which is host ID part.
Fig.3 IPv6 Source address
Network prefix has two parts : global routing prefix 48 bit and subnet ID 16 bit.
Fig.4 IPv6 Source Address
IPv6 source address is used as a covert channel by two methods: first, encoding
messages through MAC address (Passive Injection) and this is subdivided into long MAC
encoding and short MAC encoding, second is encoding messages through packet creation
(Active Injection). The packets spoofed source address contains the secret message created
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
318
by the program which is injected into the network solely for sending the secret message. All
these methods use 64 bit interface identifier in IPv6 source address only to hide the secret
messages [5]. Therefore; if we select source IPv6 address then we can hide 8 bytes of data in
a IPv6 packet. This kind of message hiding, is difficult to detect; but if it is detected, then the
message can be easily extracted because cryptography is not applied.
III. PROPOSED METHOD: AES STEGANOGRAPHY
In this Method, encryption is used to encode the text (which is now encrypted
message), it will be injected into source address covert channel of IPv6 packet.
The Advanced Encryption Standard (AES) algorithm is a symmetric block cipher that can
process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits,
will be used in this method. The key size used for an AES cipher specifies the number of
repetitions of transformation rounds that convert the input called the plaintext into the final
output, which is called the cipher text [8]. The number of cycles of repetition are as follow:
• 128-bit keys: 10 cycles of repetition.
• 192-bit keys: 12 cycles of repetition.
• 256-bit keys: 14 cycles of repetition.
Each round consists of several processing steps, including one that depends on the
encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the
original plaintext by using the same encryption key.
Message " Vishwakarma Institute of Technology affiliated to the University of Pune " is
a plain text, it will be encrypted by using AES algorithm. The cipher text will be:
"gYKVPmH2C6/jgUvBXHN6PaOAe7swxbmMFOgnfU3Sx0tBkWAbqwnKig/t1nfR+JoG2j
2hL7dzM7xlBdUqeCwQbJRxptuV2UmJQ41mL2VFDIU="
After that, this Cipher text will be converted to hexadecimal in order to match IPv6 source
address format. It is shown below:
67594b56506d4832
764258484e365061
78626d4d464f676e
74426b5741627177
316e66522b4a6f47
647a4d37786c0d0a
7751624a52787074
5134316d4c325646
The message will be divided into four parts each part Contains 64 bits (16 Character):
Part 1 : 6759:4b56:506d:4832
Part 2: 7642:5848:4e36:5061
Part 3: 7862:6d4d:464f:676e
Part 4: 7442:6b57:4162:7177
Part 5: 316e:6652:2b4a:6f47
Part 6: 647a:4d37:786c:0d0a
Part 7: 7751:624a:5278:7074
Part 8: 5134:316d:4c32:5646
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
319
Each part will be injected into interface identifier (64 bit)of IPv6 packet. When using
IPv6 source address steganography, the sender will not know whether the packet delivered to
destination or not, because the three way handshake will not be completed due to fake source
address, so the acknowledgement from receiver will not reach the real source address
(Sender). The network prefix (64 bit) contains four places, the last place is for the subnet ID
which will be used as a sequence number for the message by assigning a number to each part
starting from 0 to 7 and also count of total number of packets sent by sender. Proposed
method includes sequence number which is useful on receiver side to track the packets sent
by sender. The receiver will receive the packets with sequence number. In case of any loss in
any packet, destination can inform the sender about missing part of the message to re-
transmit.
This method is used with two types of IPv6 address :
Site Local: (FEC0:0000:0000:1111: 200:5aee:feaa:20a2) and Global. IPv6 Internet
addresses (2001:4860:b002:1820: 200:5aee:feaa:20a2)
Both Sites Local and Global subnet ID are used, so we can use this part for sequence packet.
N.W Prefix Interface Identifier
Subnet ID
Part 1: feca:0000:0000:7a8:6759:4b56:506d:4832
Part 2: feca:0000:0000:6a8:7642:5848:4e36:5061
Part 3: feca:0000:0000:5a8:7862:6d4d:464f:676e
Part 4: feca:0000:0000:4a8:7442:6b57:4162:7177
Part 5: feca:0000:0000:3a8:316e:6652:2b4a:6f47
Part 6: feca:0000:0000:2a8:647a:4d37:786c:0d0a
Part 7: feca:0000:0000:1a8:7751:624a:5278:7074
Part 8: feca:0000:0000:0a8:5134:316d:4c32:5646
IV. PROGRAMMER'S DESIGN
Existing system performs communication between two parties by using IPv6 source
address as covert channel. If third party extracts data, the message will be directly exposed to
intruder. Hence, more level of security is required. That can be achieved by using
cryptography. Therefore; steganography is followed by cryptography approach for better
security. A cryptography techniques are shown in this table:
Algorithm Type Security
RC4 Private Medium
Blowfish Private Medium
AES Private High
RSA Public High
Table 1 Cryptography Algorithm
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
320
AES algorithm with private key, is suitable due to design and strength of all key
lengths of the AES algorithm (i.e., 128, 192 and 256). These are sufficient to protect
classified information up to the secret level. Top secret information will require the use of
both the 192 or 256 key lengths. The implementation of AES in products intends to protect
national security systems and/or information.
Input at Sender Side
– Cover medium(C): IPv6 packet (IPv6 Source Address field)
– Private Key for AES encryption
– Secret Message(M)
Output at Receiver End
– Cover Medium(C): IPv6 packet (IPv6 Source Address field)
– Private Key for AES decryption
– Secret Message(M)
Sender Site Algorithm
1. Accepting the message from the user(Plaintext).
2. Applying AES encryption algorithm with Private Key on plaintext to produce ciphertext.
3. Converting the Ciphertext to Hex to match IPv6 Source Address formatting.
4. Calculating the number of IPv6 packets.
5. Creating IPv6 packet(s) and assign a sequence number to each packet.
6. Hiding the hex in covert channel IPv6 source address.
7. Sending all packets to receiver.
Receiver Site Algorithm
2. Receiving packets; and collecting them according to the sequence number.
3. Analyzing packet one by one. Fetching data of IPv6 source address.
4. Collecting all these encrypted data to form ciphertext.
5. Applying AES decryption algorithm using same Private key by sender on the ciphertext to
produce plaintext.
6. Arrange plaintext data according to packet sequence to form a secret message
V. ARCHITECTURE DESIGN
We are showing secure model of AES Steganography.
Crypto, AES system input Consist of:
1. Secret message.
2. Private Key.
Output: AES Crypto message Ct.
AES Steganography input:
1. IPv6 Packet.
2. Crypto message Ct.
Output: AES-Steganography packets.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
321
Fig.5 Architecture design
VI. RESULTS AND DISCUSSION
This project is implemented in JAVA.JAVA open source library i.e. jpcap is used to
capture and send IPv6 packets. This project is performed on Windows 7 platform. Wireshark
protocol analyzer software is used to monitor the traffic generated from project. For security
on secret data cryptography by using AES algorithm is also applied. To run this project at
first receiver opens the communication device as shown in figure 6. Then sender will accept
secret message from user and perform Steganography and cryptography and send the
message as shown in figure 7. Then receiver accepts packets, arrange them according to
sequence number then apply decryption and display secret message to receiver as shown in
figure 8.
Fig.6 Receiver Site(Open communication device)
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March
Computer Engineering and Technology (IJCET), ISSN 0976
6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
322
Fig.7 Sender Site
Fig.8 Receiver Site
Computer Engineering and Technology (IJCET), ISSN 0976-
April (2013), © IAEME
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
323
VI.I MATHEMATICAL MODEL
Let's assume Y = 0.7 is the probability of detecting the cover media IPv6 source
address.
Let's assume X = 0.9 is the probability of detecting the message for Active injection
Steganography [5].
.S = X * Y
S = 0.9 * 0.7
S = 0.63 …… probability of detecting the message
Let's assume X = 0.6 is the probability of detecting the message for Short MAC
encoding Steganography [5].
S = X * Y
S = 0.6 * 0.7
S = 0.42 …… probability of detecting the message
Let's assume X = 0.7 is the probability of detecting the message for Long MAC
encoding Steganography [5].
S = X * Y
S = 0.7 * 0.7
S = 0.49 …… probability of detecting the message
Let's assume X = 0.3 is the probability of detecting the message for Proposed Method
(i.e. Steganography and Cryptography). We are assuming low probability for proposed
technique because earlier techniques only consider Steganography whereas we are proposing
Steganography followed by cryptography.
S = X * Y
S = 0.4 * 0.7
S = 0.28 …… probability of detecting the message
We have kept Y constant and we are varying X because X depends on Steganography
technique applied. Proposed method outperform existing methods in terms of security as
shown in figure 9.
Fig.9 Comparision Graph
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Short MAC
Encoding
Long MAC
Encoding
Active
Injection
Proposed
Method
Probabilty of detecting message
Security Level
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME
324
VII. CONCLUSION
IPv6 source address is used as a covert channel with capability of storing 64 bit per
packet with assigning a sequence number to each packet which is useful for receiver to track
the packets, providing high level of security by applying AES with private key. Applying
Steganography and cryptography reduce the probability of piracy from detecting the
messages on the network. The proposed method can be applied when high level of security is
required for example: Confidential communication for secret data, Military, etc.
VIII. ACKNOWLEDGEMENTS
We thank Prof. Sandeep Shinde & Mr. Muhammad Hussein Mayud for their valuable
guidance in carrying out our research work.
REFERENCES
[1] Richard Popa, "An Analysis of Steganographic Techniques", The Politehnica
University of Timisoara,1998.
[2] Zoran Duric, Michael Jacobs, Sushil Jajodia, "Information Hiding: Steganography and
Steganalysis", George Mason University2005.
[3] Murdoch, S.J., and Lewis, S. "Embedding covert channels into TCP/IP",
Informatioding,2005.
[4] Kamran Ahsan. "Covert channel analysis and data hiding in tcp/ip". Master's thesis,
University of Toronto, 2002.
[5] Barret Miller, "Steganography in IPv6", University of Arkansas, 2008.
[6] Lewandowski, Grzegorz, "Network-aware Active Wardens in IPv6". Dissertations,
Syracuse University (2011). http://surface.syr.edu/eecs_etd/306
[7] S. Deering, R. Hinden, "Internet Protocol Version 6(IPv6) Specification", RFC 2460.
[8] National Institute of Standards and Technology. Advanced Encryption Standard (AES).
Federal Information Processing Standards Publications –FIPS 197.
[9] "en.wikipedia.org/wiki/Advanced_Encryption_Standard"
[10] Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s
Headers Over Ethernet Frame”, International journal of Electronics and Communication
Engineering & Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99 - 111, ISSN
Print: 0976- 6464, ISSN Online: 0976 –6472.
[11] Shamim Ahmed Laskar and Kattamanchi Hemachandran, “Steganography Based on
Random Pixel Selection for Efficient Data Hiding”, International journal of Computer
Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 31 - 44,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Juniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by IrzanJuniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by Irzan
Febrian ‎
 
Eigrp
EigrpEigrp
Eigrp
firey
 
OpenvSwitchの落とし穴
OpenvSwitchの落とし穴OpenvSwitchの落とし穴
OpenvSwitchの落とし穴
Takashi Naito
 
오픈소스컨설팅 클러스터제안 V1.0
오픈소스컨설팅 클러스터제안 V1.0오픈소스컨설팅 클러스터제안 V1.0
오픈소스컨설팅 클러스터제안 V1.0
sprdd
 
Linux packet-forwarding
Linux packet-forwardingLinux packet-forwarding
Linux packet-forwarding
Masakazu Asama
 

What's hot (20)

GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
 
Juniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by IrzanJuniper IPv6 Workshop by Irzan
Juniper IPv6 Workshop by Irzan
 
Project calico introduction - OpenStack最新情報セミナー 2017年7月
Project calico introduction - OpenStack最新情報セミナー 2017年7月Project calico introduction - OpenStack最新情報セミナー 2017年7月
Project calico introduction - OpenStack最新情報セミナー 2017年7月
 
Eigrp
EigrpEigrp
Eigrp
 
Community Openstack 구축 사례
Community Openstack 구축 사례Community Openstack 구축 사례
Community Openstack 구축 사례
 
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
Day 3 ENHANCED IGRP (EIGRP) AND OPEN SHORTEST PATH FIRST (OSPF)
 
CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1CCNP ROUTE V7 CH1
CCNP ROUTE V7 CH1
 
Hardening automation with Kubespray by Alessio Greggi
Hardening automation with Kubespray by Alessio GreggiHardening automation with Kubespray by Alessio Greggi
Hardening automation with Kubespray by Alessio Greggi
 
Ipv6
Ipv6Ipv6
Ipv6
 
Policy and firewall_filters
Policy and firewall_filtersPolicy and firewall_filters
Policy and firewall_filters
 
CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2CCNP ROUTE V7 CH2
CCNP ROUTE V7 CH2
 
Open vSwitch Introduction
Open vSwitch IntroductionOpen vSwitch Introduction
Open vSwitch Introduction
 
introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack introduction to linux kernel tcp/ip ptocotol stack
introduction to linux kernel tcp/ip ptocotol stack
 
OpenvSwitchの落とし穴
OpenvSwitchの落とし穴OpenvSwitchの落とし穴
OpenvSwitchの落とし穴
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
 
Comparison of SRv6 Extensions uSID, SRv6+, C-SRH
Comparison of SRv6 Extensions uSID, SRv6+, C-SRHComparison of SRv6 Extensions uSID, SRv6+, C-SRH
Comparison of SRv6 Extensions uSID, SRv6+, C-SRH
 
Catalogo Skil
Catalogo SkilCatalogo Skil
Catalogo Skil
 
IPv4/IPv6 移行・共存技術の動向
IPv4/IPv6 移行・共存技術の動向IPv4/IPv6 移行・共存技術の動向
IPv4/IPv6 移行・共存技術の動向
 
오픈소스컨설팅 클러스터제안 V1.0
오픈소스컨설팅 클러스터제안 V1.0오픈소스컨설팅 클러스터제안 V1.0
오픈소스컨설팅 클러스터제안 V1.0
 
Linux packet-forwarding
Linux packet-forwardingLinux packet-forwarding
Linux packet-forwarding
 

Similar to Encryption & steganography in i pv6 source address

Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
IJERA Editor
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
Alexander Decker
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
IJRAT
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
IJMER
 

Similar to Encryption & steganography in i pv6 source address (20)

Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
Design and Implementation of Ipv6 Address Using Cryptographically Generated A...
 
Introduction to IPv6
Introduction to IPv6Introduction to IPv6
Introduction to IPv6
 
Performance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition TechniquesPerformance Analysis of Ipv4 Ipv6 Transition Techniques
Performance Analysis of Ipv4 Ipv6 Transition Techniques
 
40120130405018 2
40120130405018 240120130405018 2
40120130405018 2
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Ipv6
Ipv6Ipv6
Ipv6
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODSREVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
REVIEW ON IPV6 SECURITY VULNERABILITY ISSUES AND MITIGATION METHODS
 
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
Design and implementation of proposed 320 bit RC6-cascaded encryption/decrypt...
 
Why We Need IPv6
Why We Need IPv6Why We Need IPv6
Why We Need IPv6
 
Network optimization of ipv6 networks using tunnel header compression
Network optimization of ipv6 networks using tunnel header compressionNetwork optimization of ipv6 networks using tunnel header compression
Network optimization of ipv6 networks using tunnel header compression
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
 
i pv6
i pv6i pv6
i pv6
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and ToolsA Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
 
Da3210751081
Da3210751081Da3210751081
Da3210751081
 

More from IAEME Publication

A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Encryption & steganography in i pv6 source address

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 315 ENCRYPTION & STEGANOGRAPHY IN IPv6 SOURCE ADDRESS Mustafa Alaa Qasim1 , Dipak Pawar2 1 (Research Scholar, Department of Computer Engineering, VIT College, University of Pune, Pune, India) 2 (Asst. Prof., Department of Computer Engineering, VIT College, University of Pune, Pune, India) ABSTRACT Steganography is the process of hiding a secret message in covert channel that is difficult to detect the existence of secret message. Covert channel is a secret communication channel used for transmitting information. Steganography within the source address fields of Internet Protocol Version 6 (IPv6) packets create a covert channel in which secret messages are passed from one side to another. Cryptography is the conversion of data into a secret code for transmission over a public network. The feature of Steganography over cryptography is that messages which not attract attention to themselves, whereas cryptography protects the contents of a message. Steganography can protect both messages and communicating parties. keywords: Covert Channel, Steganography, Cryptography. I. INTRODUCTION Steganography is very old art of embedding private messages in seemingly innocuous messages in a way that prevents the detection of the secret messages by a third party. Similarly, Steganography means establishing covert channels. A covert channel is a secret communication channel used for transmitting information [1]. Steganographic methods operate in two steps: First, a cover object is analyzed to determine to what extent it can be modified so that the medications will not be easily observable, second: the message bits are inserted into the cover object by making changes replaced by the message bits to create an altered cover object [2]. TCP/IP header fields such as type of service, IP Identification field, fragment offset, option etc. may be used to embed steganographic data and use as steganographic carriers [3,4]. Internet protocol version 6 (IPv6) is the “next generation” internet protocol which is set slowly, merge and ultimately replace IPv4. If the world INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), pp. 315-324 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 316 continues at its current rate of adding 170 million IP addresses per year for new hosts which connect the Internet, people will exhaust the current address space available for IPv4 in 7.5 years. This is the main driving force behind the push to switch to IPv6 [5]. An IPv6 packet header consists of the fields shown below in Figure 1. Version ( 4 Bit ) Traffic class ( 8 Bit ) Flow Label ( 20 Bit ) Payload Length ( 16 Bit ) Next Header ( 8 Bit ) Hop Limit ( 8 Bit ) Source Address ( 128 Bit ) Destination Address ( 128 Bit ) Fig.1 IPv6 Header Many covert channels can be selected in IPv6 header such as traffic class, flow label, payload length, next header, hop limit and source address [6]. The IPv6 specifications [7] along with the privacy extensions for the stateless address auto configuration feature introduces the possibility of embedding a significant amount of secret data into the source address field. The packet header will likely be undetectable to an uninformed observer. The source address is a 128-bit field, which is intended to contain the universally unique internet address of the originator of the packet. The privacy extensions proposed for IPv6 rely on the random generation of a 64-bit portion of the 128-bit source address, the expectation that the built-in randomness will create a shield of entropy, which should effectively hide any enclosed message [5]. Cryptography can be defined as secret writing. The basic service that cryptography offers is the ability of transmitting information among people in a way that prevents a third party from reading it. Cryptographic systems usually involves both an algorithm and secret key. The reason for having a secret key is keeping the algorithm secret in a very difficult way to view [1]. II. RELATED WORK One of the most common ways of sending messages in modern times, is through the use of the internet [5]. The TCP/IP header can be used as a carrier for a steganographic covert channel. The Steganographic covert channels depend on modification of network protocol header values. In TCP Header, there are many possible hidden channels such as PAD (padding bits) with bandwidth 31 bits/packet, usage of chosen ISN (initial sequence number) with 32 bits per connection, usage of urgent pointer when URG=0-16 bits/packet, usage of reserved bits with 6 bits/packet, and existence of data when RST=1and Port numbers as analphabet (→) [3,4].
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 317 Source Port Destination Port Sequence Number Acknowledgment Number Header Length Reserved Code bits Window Checksum Urgent Pointer Checksum Padding Fig.2 TCP Header In IPv6 header, there are many possible hidden channels such as traffic class (set a false traffic class), flow Label (set a false flow label), payload Length (increase value to insert extra data), next header (set a valid value to add an extra extension header), hop limit (increasing or decreasing value of hop limit) and source address (set a false source address) [6]. IPv6 address is 128 bits consist of two parts: network prefix 64 bit and interface identifier 64 bit which is host ID part. Fig.3 IPv6 Source address Network prefix has two parts : global routing prefix 48 bit and subnet ID 16 bit. Fig.4 IPv6 Source Address IPv6 source address is used as a covert channel by two methods: first, encoding messages through MAC address (Passive Injection) and this is subdivided into long MAC encoding and short MAC encoding, second is encoding messages through packet creation (Active Injection). The packets spoofed source address contains the secret message created
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 318 by the program which is injected into the network solely for sending the secret message. All these methods use 64 bit interface identifier in IPv6 source address only to hide the secret messages [5]. Therefore; if we select source IPv6 address then we can hide 8 bytes of data in a IPv6 packet. This kind of message hiding, is difficult to detect; but if it is detected, then the message can be easily extracted because cryptography is not applied. III. PROPOSED METHOD: AES STEGANOGRAPHY In this Method, encryption is used to encode the text (which is now encrypted message), it will be injected into source address covert channel of IPv6 packet. The Advanced Encryption Standard (AES) algorithm is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256 bits, will be used in this method. The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input called the plaintext into the final output, which is called the cipher text [8]. The number of cycles of repetition are as follow: • 128-bit keys: 10 cycles of repetition. • 192-bit keys: 12 cycles of repetition. • 256-bit keys: 14 cycles of repetition. Each round consists of several processing steps, including one that depends on the encryption key itself. A set of reverse rounds are applied to transform ciphertext back into the original plaintext by using the same encryption key. Message " Vishwakarma Institute of Technology affiliated to the University of Pune " is a plain text, it will be encrypted by using AES algorithm. The cipher text will be: "gYKVPmH2C6/jgUvBXHN6PaOAe7swxbmMFOgnfU3Sx0tBkWAbqwnKig/t1nfR+JoG2j 2hL7dzM7xlBdUqeCwQbJRxptuV2UmJQ41mL2VFDIU=" After that, this Cipher text will be converted to hexadecimal in order to match IPv6 source address format. It is shown below: 67594b56506d4832 764258484e365061 78626d4d464f676e 74426b5741627177 316e66522b4a6f47 647a4d37786c0d0a 7751624a52787074 5134316d4c325646 The message will be divided into four parts each part Contains 64 bits (16 Character): Part 1 : 6759:4b56:506d:4832 Part 2: 7642:5848:4e36:5061 Part 3: 7862:6d4d:464f:676e Part 4: 7442:6b57:4162:7177 Part 5: 316e:6652:2b4a:6f47 Part 6: 647a:4d37:786c:0d0a Part 7: 7751:624a:5278:7074 Part 8: 5134:316d:4c32:5646
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 319 Each part will be injected into interface identifier (64 bit)of IPv6 packet. When using IPv6 source address steganography, the sender will not know whether the packet delivered to destination or not, because the three way handshake will not be completed due to fake source address, so the acknowledgement from receiver will not reach the real source address (Sender). The network prefix (64 bit) contains four places, the last place is for the subnet ID which will be used as a sequence number for the message by assigning a number to each part starting from 0 to 7 and also count of total number of packets sent by sender. Proposed method includes sequence number which is useful on receiver side to track the packets sent by sender. The receiver will receive the packets with sequence number. In case of any loss in any packet, destination can inform the sender about missing part of the message to re- transmit. This method is used with two types of IPv6 address : Site Local: (FEC0:0000:0000:1111: 200:5aee:feaa:20a2) and Global. IPv6 Internet addresses (2001:4860:b002:1820: 200:5aee:feaa:20a2) Both Sites Local and Global subnet ID are used, so we can use this part for sequence packet. N.W Prefix Interface Identifier Subnet ID Part 1: feca:0000:0000:7a8:6759:4b56:506d:4832 Part 2: feca:0000:0000:6a8:7642:5848:4e36:5061 Part 3: feca:0000:0000:5a8:7862:6d4d:464f:676e Part 4: feca:0000:0000:4a8:7442:6b57:4162:7177 Part 5: feca:0000:0000:3a8:316e:6652:2b4a:6f47 Part 6: feca:0000:0000:2a8:647a:4d37:786c:0d0a Part 7: feca:0000:0000:1a8:7751:624a:5278:7074 Part 8: feca:0000:0000:0a8:5134:316d:4c32:5646 IV. PROGRAMMER'S DESIGN Existing system performs communication between two parties by using IPv6 source address as covert channel. If third party extracts data, the message will be directly exposed to intruder. Hence, more level of security is required. That can be achieved by using cryptography. Therefore; steganography is followed by cryptography approach for better security. A cryptography techniques are shown in this table: Algorithm Type Security RC4 Private Medium Blowfish Private Medium AES Private High RSA Public High Table 1 Cryptography Algorithm
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 320 AES algorithm with private key, is suitable due to design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256). These are sufficient to protect classified information up to the secret level. Top secret information will require the use of both the 192 or 256 key lengths. The implementation of AES in products intends to protect national security systems and/or information. Input at Sender Side – Cover medium(C): IPv6 packet (IPv6 Source Address field) – Private Key for AES encryption – Secret Message(M) Output at Receiver End – Cover Medium(C): IPv6 packet (IPv6 Source Address field) – Private Key for AES decryption – Secret Message(M) Sender Site Algorithm 1. Accepting the message from the user(Plaintext). 2. Applying AES encryption algorithm with Private Key on plaintext to produce ciphertext. 3. Converting the Ciphertext to Hex to match IPv6 Source Address formatting. 4. Calculating the number of IPv6 packets. 5. Creating IPv6 packet(s) and assign a sequence number to each packet. 6. Hiding the hex in covert channel IPv6 source address. 7. Sending all packets to receiver. Receiver Site Algorithm 2. Receiving packets; and collecting them according to the sequence number. 3. Analyzing packet one by one. Fetching data of IPv6 source address. 4. Collecting all these encrypted data to form ciphertext. 5. Applying AES decryption algorithm using same Private key by sender on the ciphertext to produce plaintext. 6. Arrange plaintext data according to packet sequence to form a secret message V. ARCHITECTURE DESIGN We are showing secure model of AES Steganography. Crypto, AES system input Consist of: 1. Secret message. 2. Private Key. Output: AES Crypto message Ct. AES Steganography input: 1. IPv6 Packet. 2. Crypto message Ct. Output: AES-Steganography packets.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 321 Fig.5 Architecture design VI. RESULTS AND DISCUSSION This project is implemented in JAVA.JAVA open source library i.e. jpcap is used to capture and send IPv6 packets. This project is performed on Windows 7 platform. Wireshark protocol analyzer software is used to monitor the traffic generated from project. For security on secret data cryptography by using AES algorithm is also applied. To run this project at first receiver opens the communication device as shown in figure 6. Then sender will accept secret message from user and perform Steganography and cryptography and send the message as shown in figure 7. Then receiver accepts packets, arrange them according to sequence number then apply decryption and display secret message to receiver as shown in figure 8. Fig.6 Receiver Site(Open communication device)
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 322 Fig.7 Sender Site Fig.8 Receiver Site Computer Engineering and Technology (IJCET), ISSN 0976- April (2013), © IAEME
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 323 VI.I MATHEMATICAL MODEL Let's assume Y = 0.7 is the probability of detecting the cover media IPv6 source address. Let's assume X = 0.9 is the probability of detecting the message for Active injection Steganography [5]. .S = X * Y S = 0.9 * 0.7 S = 0.63 …… probability of detecting the message Let's assume X = 0.6 is the probability of detecting the message for Short MAC encoding Steganography [5]. S = X * Y S = 0.6 * 0.7 S = 0.42 …… probability of detecting the message Let's assume X = 0.7 is the probability of detecting the message for Long MAC encoding Steganography [5]. S = X * Y S = 0.7 * 0.7 S = 0.49 …… probability of detecting the message Let's assume X = 0.3 is the probability of detecting the message for Proposed Method (i.e. Steganography and Cryptography). We are assuming low probability for proposed technique because earlier techniques only consider Steganography whereas we are proposing Steganography followed by cryptography. S = X * Y S = 0.4 * 0.7 S = 0.28 …… probability of detecting the message We have kept Y constant and we are varying X because X depends on Steganography technique applied. Proposed method outperform existing methods in terms of security as shown in figure 9. Fig.9 Comparision Graph 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Short MAC Encoding Long MAC Encoding Active Injection Proposed Method Probabilty of detecting message Security Level
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 2, March – April (2013), © IAEME 324 VII. CONCLUSION IPv6 source address is used as a covert channel with capability of storing 64 bit per packet with assigning a sequence number to each packet which is useful for receiver to track the packets, providing high level of security by applying AES with private key. Applying Steganography and cryptography reduce the probability of piracy from detecting the messages on the network. The proposed method can be applied when high level of security is required for example: Confidential communication for secret data, Military, etc. VIII. ACKNOWLEDGEMENTS We thank Prof. Sandeep Shinde & Mr. Muhammad Hussein Mayud for their valuable guidance in carrying out our research work. REFERENCES [1] Richard Popa, "An Analysis of Steganographic Techniques", The Politehnica University of Timisoara,1998. [2] Zoran Duric, Michael Jacobs, Sushil Jajodia, "Information Hiding: Steganography and Steganalysis", George Mason University2005. [3] Murdoch, S.J., and Lewis, S. "Embedding covert channels into TCP/IP", Informatioding,2005. [4] Kamran Ahsan. "Covert channel analysis and data hiding in tcp/ip". Master's thesis, University of Toronto, 2002. [5] Barret Miller, "Steganography in IPv6", University of Arkansas, 2008. [6] Lewandowski, Grzegorz, "Network-aware Active Wardens in IPv6". Dissertations, Syracuse University (2011). http://surface.syr.edu/eecs_etd/306 [7] S. Deering, R. Hinden, "Internet Protocol Version 6(IPv6) Specification", RFC 2460. [8] National Institute of Standards and Technology. Advanced Encryption Standard (AES). Federal Information Processing Standards Publications –FIPS 197. [9] "en.wikipedia.org/wiki/Advanced_Encryption_Standard" [10] Fahim A. Ahmed Ghanem and Vilas M. Thakare, “Optimization of Ipv6 Packet’s Headers Over Ethernet Frame”, International journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 1, 2013, pp. 99 - 111, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [11] Shamim Ahmed Laskar and Kattamanchi Hemachandran, “Steganography Based on Random Pixel Selection for Efficient Data Hiding”, International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 31 - 44, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.