WASET
	%0 Journal Article
	%A N. Veerasamy and  C. J. Cheyne
	%D 2007
	%J International Journal of Information and Communication Engineering
	%B World Academy of Science, Engineering and Technology
	%I Open Science Index 10, 2007
	%T Stealthy Network Transfer of Data
	%U https://publications.waset.org/pdf/1907
	%V 10
	%X Users of computer systems may often require the
private transfer of messages/communications between parties across
a network. Information warfare and the protection and dominance of
information in the military context is a prime example of an
application area in which the confidentiality of data needs to be
maintained. The safe transportation of critical data is therefore often
a vital requirement for many private communications. However,
unwanted interception/sniffing of communications is also a
possibility. An elementary stealthy transfer scheme is therefore
proposed by the authors. This scheme makes use of encoding,
splitting of a message and the use of a hashing algorithm to verify the
correctness of the reconstructed message. For this proof-of-concept
purpose, the authors have experimented with the random sending of
encoded parts of a message and the construction thereof to
demonstrate how data can stealthily be transferred across a network
so as to prevent the obvious retrieval of data.
	%P 3043 - 3048