2021年5月12日星期三

modern protocol created by me

1. Timed based authenticator like random number mod based to choose from a hash table to select one of predefined ordering of fields to construct protocol messages, for example 18 types of ordering, there will be 18 types of ordering of fields in protocol messages
2. Extra types of field such as dummy fields are added to protocol messages
Length of messages is also dynamic.
3. Each field is encrypted by time based authenticator mod based to choose a predefined passwords from hash table to decrypt fields

This kind of protocol is a kind of defense from wireshark or sniffing

Because unknown length of fields and ordering are also different. Besides can not learn from machine, it can not be analyzed from machine.

Update or upgrade mechanism can also use to prevent rogue update.

Originally i would like to write an example to publish in github but it is so easy to write.
I keep this for my retirement entertainment.




沒有留言:

發佈留言