Abstract

In the recent years, battle between national security and a person’s privacy has become prime conflict. Governments and secret services are asking encrypted messaging services such as WhatsApp to allow them access to user’s data. After the March attack at Westminster(2017), UK home secretary, stated that accessibility of WhatsApp's data is mandatory to authorize the legitimate user since the government couldn’t smell the encrypted messages of suspected terrorists. But in turn such access to messages will allow authorities to thwart future terror attacks. In this paper, novel enhanced End to end encryption technique is proposed to identify the breaches and mitigate the terror attacks. Also different encryption techniques are compared with respect to their performance and the best encryption technique is revealed

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.