Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the author. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data
Reference:
Veerasamy, N and Cheyne, CJ. 2007. Stealthy network transfer of data. International Journal of Computer Science and Engineering, vol 1(3), pp 201-206.
Veerasamy, N., & Cheyne, C. (2007). Stealthy network transfer of data. http://hdl.handle.net/10204/3365
Veerasamy, Namosha, and CJ Cheyne "Stealthy network transfer of data." (2007) http://hdl.handle.net/10204/3365
Veerasamy N, Cheyne C. Stealthy network transfer of data. 2007; http://hdl.handle.net/10204/3365.