**Author details**

Tamer S.A. Fatayer Computer Science and Information Technology, Al-Aqsa University, Gaza, Palestine

\*Address all correspondence to: ts.fatayer@alaqsa.edu.ps

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**117**

*Secure Communication Using Cryptography and Covert Channel*

card. International Journal of Network

[11] Information Technology Laboratory. The keyed-hash message authentication code (HMAC). National Institute of Standards and Technology, Technical

Security. 2010;**10**:175-184

Report FIPS PUB 198; 2002

1996. pp. 1-15

1976;**IT-22**:644-654

[12] Bellare M, Canetti R, Krawczyk H. Keying hash functions for message authentication. In: CRYPTO'96: Proceedings of the 16th Annual

International Cryptology conference on Advances in Cryptology; London, UK;

[14] Mahalanobis A. Diffie-Hellman key exchange protocol, its generalization

[15] Fatayer T, Khattab S, Omara F. A key-exchange protocol based on the stack-overflow software vulnerability. In: ISCC'10: IEEE Symposium on Computers and Communications; Riccione, Italy; June 2010. pp. 411-416

[16] Fatayer T, Khattab S, Omara F. OverCovert: Using stack overflow software vulnerability to create a covert channel. In: NTMS'11: 4th IFIP International Conference on New Technologies, Mobility and Security;

Paris, France; February 2011

[17] Fatayer T, Timraz K. MLSCPC: Multi-level security using covert channel to achieve privacy through cloud computing. Presented at the WSCNIS'2015 the 2nd World Symposium on Computer Networks

[13] Diffie W, Hellman M. New directions in cryptography. IEEE Transactions on Information Theory.

and nilpotent groups [Ph.D. dissertation]. Florida: The Charles E. Schmidt College of Science, Florida Atlantic University; August 2005

*DOI: http://dx.doi.org/10.5772/intechopen.82580*

[1] Dlaminia EM, Eloffb M. Information security: The moving target. Computers

[2] Tilborg H, Jajodia S. Encyclopedia of Cryptography and Security. 2nd edition. Boston: Springer; 2011. ISBN:

confinement problem. Communications

[3] Lampson B. A note on the

of the ACM. 1973;**16**:613-615

USA; 2008. pp. 246-253

CA, USA; 2002

[4] Ray B, Mishra S. A protocol for building secure and reliable covert channel. In: PST'08: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust; Washington, DC,

[5] Giffin J, Greenstadt R, Litwack P, Tibbetts R. Covert messaging through TCP timestamps. Presented at the PET'02: The Workshop on Privacy Enhancing Technologies; San Francisco,

[6] Zhang X, Tan Y-A, Liang C, Li U, Li J. A covert channel over VoLTE via adjusting silence periods. IEEE Access.

February 2018;**6**:9292-9302

Berkely, USA: Apress; 2007

[8] Sandhu R, Samarati P.

USA; 2006. pp. 168-178

1996;**28**:241-243

[7] Daswani N, Kern C, Kesavan

Authentication, access control, and audit. ACM Computing Surveys.

[9] Brainard J, Juels A, Rivest R. Fourth factor authentication: Somebody you know. In: CCS'06: Proceedings of the 13th ACM conference on Computer and communications security; Virginia,

[10] Kumar M. An enhanced remote user authentication scheme with smart

A. Foundations of Security: What Every Orogrammer Needs to Know. 1st ed.

& Security. 2009;**28**:10

978-1441959058

**References**
