Abstract
In the recent years, battle between national security and a person’s privacy has become prime conflict. Governments and secret services are asking encrypted messaging services such as WhatsApp to allow them access to user’s data. After the March attack at Westminster(2017), UK home secretary, stated that accessibility of WhatsApp's data is mandatory to authorize the legitimate user since the government couldn’t smell the encrypted messages of suspected terrorists. But in turn such access to messages will allow authorities to thwart future terror attacks. In this paper, novel enhanced End to end encryption technique is proposed to identify the breaches and mitigate the terror attacks. Also different encryption techniques are compared with respect to their performance and the best encryption technique is revealed
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Recent Technology and Engineering
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.