Blockchain-Based Authenticated Stego-Channels and Application to Ethereum

被引:3
作者
Kanth, Vikram [1 ]
Hale, Britta [2 ]
机构
[1] Naval Postgrad Sch, Dept Elect & Comp Engn, Monterey, CA 93940 USA
[2] Naval Postgrad Sch, Dept Comp Sci, Monterey, CA 93940 USA
关键词
Blockchains; Steganography; Security; Protocols; Data models; Authentication; Analytical models; AEAD; authenticated hidden text; blockchain; covert channels; ethereum; steganography;
D O I
10.1109/TDSC.2024.3399696
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Given their usefulness for evading traceability in networks, it is not surprising that steganographic techniques continue in the modern era and have been looked at through the lens of modern threats and technologies. Among such threats include the linkage of contextual information (associated data) to de-anonymize traffic. Such detection would be fatal to steganographic goals. Cryptographic analyses have expanded to include associated data when analyzing confidentiality and authenticity in channel security; in this work we take a similar approach and extrapolate the security model for steganographic analysis to also account for contextual information. We introduce the security definition of Authenticated Stegotext with Associated Data (ASAD), which captures steganographic properties even when there is contextual information sent alongside the hidden data, and provide a concrete stego-embedding scheme, Authenticated SteGotex with Associated tRansaction Data (ASGARD). Our scheme leverages a blockchain-based channel medium for the transmission of hidden data, namely the Ethereum blockchain. We analyze ASGARD in the ASAD framework and present details on implementation and real-world security considerations.
引用
收藏
页码:373 / 387
页数:15
相关论文
共 55 条
[1]   Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity [J].
Alsalami, Nasser ;
Zhang, Bingsheng .
2020 IEEE/ACM 28TH INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2020,
[2]  
[Anonymous], 2009, RFC 5652
[3]  
[Anonymous], [76] "https://ethereum.org/en/developers/docs/evm/opcodes/", available online last accessed 5/5/2023.
[4]  
[Anonymous], Information and services - The Official Portal of the UAE Government. (n.d.) [online]. [Accessed 23 November 2021]. Available at: https://u.ae/en/information-and-services/#/
[5]  
[Anonymous], Lewis, A. 2010. [Online. Available from: https://twitter.com/andlewis/status/24380177712?lang=en [Accessed: 2022-09-03].
[6]  
[Anonymous], 2011, The keccak reference
[7]  
[Anonymous], Etherscan
[8]  
Bach LM, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1545, DOI 10.23919/MIPRO.2018.8400278
[9]  
Bassham III L. E., 2010, 80022 SP NIST
[10]   A concrete security treatment of symmetric encryption [J].
Bellare, M ;
Desai, A ;
Jokipii, E ;
Rogaway, P .
38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, :394-403