Abstract

In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has beenproposed. This is achieved by the use of public key cryptography techniques. The proposed application used the Elliptic Curve DiffieHellman Key Exchange (ECDH) algorithm to generate the key pair and exchange to produce the shared key that will be used for theencryption of data by symmetric algorithms. The proposed Application allows the users to communicate via text messages, voicemessages and photos. For the text message security the standard AES algorithm with a 128 bit key are used. The generated key (160 bit)minimized to 128 bit length by selecting the first 128 bit of the generated key in order to be used by the AES algorithm. For the voice andimage security processes the proposed application used the symmetric algorithm RC4 for this purpose.

Highlights

  • INTRODUCTIONThe mobile instant message applications have overwhelmed the Short Message Service (SMS) operated by cellular network carriers, with 19 billion messages sent for every day contrasted and more than 17 billion SMS messages [1]

  • The mobile instant message applications have overwhelmed the Short Message Service (SMS) operated by cellular network carriers, with 19 billion messages sent for every day contrasted and more than 17 billion SMS messages [1].Instant message will assume an essential part later on business territories, which are prevalently known as mcommerce, mobile banking, administrative use, and everyday life correspondence

  • The algorithm used for encrypting text messages in the proposed application is the AES standard which is slower than other block cipher, but it provides a higher security

Read more

Summary

INTRODUCTION

The mobile instant message applications have overwhelmed the Short Message Service (SMS) operated by cellular network carriers, with 19 billion messages sent for every day contrasted and more than 17 billion SMS messages [1]. There are likewise some extra security issues in the wireless media that are not the situation in a wired framework. In this manner, extraordinary secure protocols are required for assortment mobile chat system platforms [3]. Notwithstanding, there is no arrangement for such security services in the mobile chat systems Both mobile chat system customer and mobile chat system server are defenseless against both passive and active attacks. There are assorted security and protection highlights given by different mobile chat applications, yet there are not very many portable talk applications that give an End-to-End encryption administrations security to their customers [4]

RELATED WORKS
ECDH KEY EXCHANGE
AES ALGORITHM
RC4 ALGORITHM
THE PROPOSED MODEL
Registration Screen
THE PROPOSED SECURITY MODEL
Results and Discussions
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call