Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being transmitted and obtain the raw packets that are being relayed across the network. However, some of them like Whatsapp and Facebook Messenger have embraced end-to-end encryption. In so doing, this encryption protects this data as it is being passed from one device to another over communication channels. Effectively, this prevents potential eavesdroppers such as telecommunication service providers, Internet service providers or the provider of the communication service from being able to access the cryptographic keys needed to decrypt the conversation. However, most messaging applications encrypt data but only between the user and the companies' servers. The consequence of this is that the service providers can pry open the data being passed across their network data anytime and access the information being passed between the communicating parties. This paper sought to develop a port-based algorithm for packet encapsulation in instant messaging sessions. This is in realization of the fact that even with end to end encryption, the instant messages are in plain text at the communicating devices. This means that eavesdropping can still happen if these instant messages are read by people other than the ones for which the communication was meant. A prototype instant messenger application was developed with end to end encryption in place, as well as message encryption at the end devices. In this way, only a party that has a decryption key can read the transmitted messages.
Peter S. Nyakomitta, Dr. Solomon Ogara, Dr. Silvance O. Abeka
Instant Messaging, packets, Whatsapp, Facebook Massager, Skype, Eavesdroppers, Port-based algorithm
- Wendy (2013). ZDNet UK; Instant messaging boosts business.
- Neal (2014). Semantic Security Response; Threats to Instant Messaging.
- Nardi, S. Whittaker, E. Bradner (2012). Interaction and outeraction: instant messaging in action. Proceedings of the ACM Conference on Computer Supported Cooperative Work, Philadelphia, Pennsylvania, USA
- Vleck (2015) . Instant Messaging on CTSS and Multics. Multicians.org.
- Schiano, C. Kamm (2013). The character, functions and styles of instant messaging in the workplace. Proceedings of the ACM Conference on Computer Supported Cooperative Work , New Orleans, Louisiana, USA.
- Roberts (2015). IDG News Service; MSN Messenger Worm Steals Game Keys W32/Rodok-A or Henpeck worm used via IM, then plant trojan to lift game.
- Sanchez, J., (2014). Malicious Threats, Vulnerabilities and Defenses in WhatsApp and Mobile Instant Messaging Platforms.
- Mahajan, A., Dahiya, M., Sanghvi, H., (2013). Forensic Analysis of Instant Messenger Applications on Android Devices. Int. J. Comput. Appl. 68, 38–44.
- Anglano, C.,( 2014). Forensic analysis of WhatsApp Messenger on Android smartphones. Digit. Investig. 11, 201–213.
- Barghuthi, N.B. Al, Said, H., (2013). Social Networks IM Forensics: Encryption Analysis. J. Commun. 8.
- Bodriagov, O., Buchegger, S.(2011). Encryption for peer-to-peer social networks. In: Proceedings - IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. pp. 1302–1309.
- Ricochet P. (2014). Anonymous and serverless instant messaging that just works.
- Yusof, M.K., Abidin, A.F.A., (2011). A secure private instant messenger. In: 17th Asia-Pacific Conference on Communications.
|Published in :
||Volume 3 | Issue 1 | January-February - 2017
|Date of Publication
Cite This Article
Peter S. Nyakomitta, Dr. Solomon Ogara, Dr. Silvance O. Abeka, "Secure End Point Data Security Using Java Application Programming Interface", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 1, pp.243-251, January-February-2017.
URL : http://ijsrset.com/IJSRSET173155.php