Multi Device Messaging Protocol With Detecting End-Point Compromise In Messaging
Keywords:
End-to-end (e2e) encryptions, mobile messengers, MITM attack, signal security.Abstract
In this paper we examine the security and usability of the cutting edge secure mobile messenger signal. In the initial segment of this paper we examine the risk show current secure mobile messengers face. In the accompanying, we lead a client concentrate to look at the usability of signals security highlights. In particular, our investigation evaluates if users can identify and hinder man-in-the-center attacks on the signal convention. Our outcomes demonstrate that the dominant part of users neglected to effectively contrast keys and their discussion accomplice for verification purposes because of convenience issues and deficient mental models. Thus users are probably going to succumb to attacks on the basic foundation of the present secure messaging. The focal administrations to trade cryptographic keys. We expect that our discoveries foster investigate into the novel usability and security difficulties of condition of-the art secure mobile messengers and subsequently at last outcome in solid insurance measures for the normal client.
References
- WhatsApp Inc., "Whatsapp," online, 2016, https://whatsapp.com.
- EFF, "Whatsapp rolls out end-to-end encryption to its over one billionusers," online, April 2016, https://www.eff.org/deeplinks/2016/04/whatsapp-rolls-out-end-end-encryption-its-1bn-users.
- N. Borisov, I. Goldberg, and E. Brewer, "Off-the-record communication,or, why not to use pgp," in Proceedings of the 2004 ACM workshop onPrivacy in the electronic society. ACM, 2004, pp. 77–84.
- T. Frosch, C. Mainka, C. Bader, F. Bergsma, and T. Holz, "How secureis textsecure?" 2014.
- C. Lewis, Using the" thinking-aloud" method in cognitive interfacedesign. IBM TJ Watson Research Center, 1982.
- L. SaurikIT, "Cydia substrate," 2016, http://www.cydiasubstrate.com.
- M. Blanchou, "Android-ssl-trustkiller," 2016, https: //github.com/iSEC Partners/Android-SSL-TrustKiller.
- A. Cortesi, "mitmproxy," 2016, https://mitmproxy.org/.
- M. Lv, "Proxydroid," 2016, https://github.com/madeye/proxydroid.
- A. Whitten and J. D. Tygar, "Why johnny can’t encrypt: A usabilityevaluation of pgp 5.0." in Usenix Security, vol. 1999, 1999.
- S. L. Garfinkel, D. Margrave, J. I. Schiller, E. Nordlander, and R. C.Miller, "How to make secure email easier to use," in Proceedings of theSIGCHI conference on human factors in computing systems. ACM,2005, pp. 701–710.
- K. Renaud, M. Volkamer, and A. Renkema-Padmos, "Why doesn’t janeprotect her privacy?" in Privacy Enhancing Technologies. Springer,2014, pp. 244–262.
- A. Fry, S. Chiasson, and A. Somayaji, "Not seaconducted but delivered: The(un) usability of s/mime today," in Annual Symposium on InformationAssurance and Secure Knowconductedge Management (ASIA’12), Albany, NY,2012.
- Open Whisper Systems, "Signal messenger," online, 2016, https://whispersystems.org.
- EFF, "Secure messaging scorecard v 1.0," online, 2015, https://www.eff.org/node/82654.
- Open Whisper Systems, "Signal messenger," online, 2016, https://whispersystems.org.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.