Multi Device Messaging Protocol With Detecting End-Point Compromise In Messaging

Authors

  • K. Amarnadh  PG Scholar, Dept of MCA, St. Ann's College of Engineering and Technology, Chirala. Andhra Pradesh, India
  • Dr. R. Murugadoss  Professor, Dept. of MCA, St. Ann's College of Engineering and Technology, Chirala. Andhra Pradesh, India

Keywords:

End-to-end (e2e) encryptions, mobile messengers, MITM attack, signal security.

Abstract

In this paper we examine the security and usability of the cutting edge secure mobile messenger signal. In the initial segment of this paper we examine the risk show current secure mobile messengers face. In the accompanying, we lead a client concentrate to look at the usability of signals security highlights. In particular, our investigation evaluates if users can identify and hinder man-in-the-center attacks on the signal convention. Our outcomes demonstrate that the dominant part of users neglected to effectively contrast keys and their discussion accomplice for verification purposes because of convenience issues and deficient mental models. Thus users are probably going to succumb to attacks on the basic foundation of the present secure messaging. The focal administrations to trade cryptographic keys. We expect that our discoveries foster investigate into the novel usability and security difficulties of condition of-the art secure mobile messengers and subsequently at last outcome in solid insurance measures for the normal client.

References

  1. WhatsApp Inc., "Whatsapp," online, 2016, https://whatsapp.com.
  2. EFF, "Whatsapp rolls out end-to-end encryption to its over one billionusers," online, April 2016, https://www.eff.org/deeplinks/2016/04/whatsapp-rolls-out-end-end-encryption-its-1bn-users.
  3. N. Borisov, I. Goldberg, and E. Brewer, "Off-the-record communication,or, why not to use pgp," in Proceedings of the 2004 ACM workshop onPrivacy in the electronic society. ACM, 2004, pp. 77–84.
  4. T. Frosch, C. Mainka, C. Bader, F. Bergsma, and T. Holz, "How secureis textsecure?" 2014.
  5. C. Lewis, Using the" thinking-aloud" method in cognitive interfacedesign. IBM TJ Watson Research Center, 1982.
  6. L. SaurikIT, "Cydia substrate," 2016, http://www.cydiasubstrate.com.
  7. M. Blanchou, "Android-ssl-trustkiller," 2016, https: //github.com/iSEC Partners/Android-SSL-TrustKiller.
  8. A. Cortesi, "mitmproxy," 2016, https://mitmproxy.org/.
  9. M. Lv, "Proxydroid," 2016, https://github.com/madeye/proxydroid.
  10. A. Whitten and J. D. Tygar, "Why johnny can’t encrypt: A usabilityevaluation of pgp 5.0." in Usenix Security, vol. 1999, 1999.
  11. S. L. Garfinkel, D. Margrave, J. I. Schiller, E. Nordlander, and R. C.Miller, "How to make secure email easier to use," in Proceedings of theSIGCHI conference on human factors in computing systems. ACM,2005, pp. 701–710.
  12. K. Renaud, M. Volkamer, and A. Renkema-Padmos, "Why doesn’t janeprotect her privacy?" in Privacy Enhancing Technologies. Springer,2014, pp. 244–262.
  13. A. Fry, S. Chiasson, and A. Somayaji, "Not seaconducted but delivered: The(un) usability of s/mime today," in Annual Symposium on InformationAssurance and Secure Knowconductedge Management (ASIA’12), Albany, NY,2012.
  14. Open Whisper Systems, "Signal messenger," online, 2016, https://whispersystems.org.
  15. EFF, "Secure messaging scorecard v 1.0," online, 2015, https://www.eff.org/node/82654.
  16. Open Whisper Systems, "Signal messenger," online, 2016, https://whispersystems.org.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
K. Amarnadh, Dr. R. Murugadoss, " Multi Device Messaging Protocol With Detecting End-Point Compromise In Messaging, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.1331-1338, January-February-2018.