@article{(Open Science Index):https://publications.waset.org/pdf/1907, title = {Stealthy Network Transfer of Data}, author = {N. Veerasamy and C. J. Cheyne}, country = {}, institution = {}, abstract = {Users of computer systems may often require the private transfer of messages/communications between parties across a network. Information warfare and the protection and dominance of information in the military context is a prime example of an application area in which the confidentiality of data needs to be maintained. The safe transportation of critical data is therefore often a vital requirement for many private communications. However, unwanted interception/sniffing of communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the authors. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data.}, journal = {International Journal of Information and Communication Engineering}, volume = {1}, number = {10}, year = {2007}, pages = {3043 - 3048}, ee = {https://publications.waset.org/pdf/1907}, url = {https://publications.waset.org/vol/10}, bibsource = {https://publications.waset.org/}, issn = {eISSN: 1307-6892}, publisher = {World Academy of Science, Engineering and Technology}, index = {Open Science Index 10, 2007}, }