The application of blockchain technology to covert communication can improve the quality of communication due to its characteristics such as decentralization and anonymity. However, blockchain covert ...
A known-plaintext attack (KPA) occurs when a hacker uses pairs of both encrypted and unencrypted data to figure out the encryption algorithm or key. In this attack, the hacker has access to both the ...