Research Article

Survey of Instant Messaging Applications Encryption Methods

Volume: 2 Number: 4 June 19, 2015
TR EN

Survey of Instant Messaging Applications Encryption Methods

Abstract

Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Realization (GSM), they are free to use and they only require internet connection which is the most common way of communication today. The critical point here is providing privacy of these messages in order to prevent any vulnerable points for hackers and cyber criminals. According to the latest research by PricewaterhouseCoopers, percentage of global cyber attacks is increased to 48% with 42.8 million detected incidents. Another report that is published by security company Postini indicates that 90% of instant messaging targeted threats are highly destructive worms. In this study, instant messaging applications encryption methods are comparatively presented. Instant messaging applications are investigated considering three different target platforms: (1) Desktop clients, (2) web clients, and (3) mobile phone clients. Instant messaging applications are compared through the critical criteria that most research studies emphasize: (1) Text conversation over internet, (2) text conversation after encryption, and (3) text conversation after enabling Secure Sockets Layer (SSL). Finally, authors highlight key requirements of a secure instant messaging application should provide.

Keywords

References

  1. Anglano, C., 2014. Forensic analysis of WhatsApp Messenger on Android smartphones. Digit. Investig. 11, 201–213. doi:10.1016/j.diin.2014.04.003.
  2. Barghuthi, N.B. Al, Said, H., 2013. Social Networks IM Forensics: Encryption Analysis. J. Commun. 8.
  3. Bodriagov, O., Buchegger, S., 2011. Encryption for peer-to-peer social networks, in: Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. pp. 1302–1309. doi:10.1109/PASSAT/SocialCom.2011.158.
  4. Bonneau, J., Morrison, A., n.d. Finite-State Security Analysis of OTR Version 2. Analysis 2–6. DB Browser for SQLite [WWW Document], n.d. URL http://sqlitebrowser.org (accessed 27.01.15).
  5. Global Information Security Survey: 2015 Results by Industry [WWW Document], 2015. PricewaterhouseCoopers. URL http://www.pwc.com/gx/en/consulting-services/information-security-survey/index.jhtml (accessed 27.01.15).
  6. Goldberg, I., 2006. Off-the-Record Messaging.
  7. Gupta, V., Gupta, S., Chang, S., Stebila, D., 2002. Performance analysis of elliptic curve cryptography for SSL, in: WiSE ’02: Proceedings of the 1st ACM Workshop on Wireless Security. pp. 87–94. doi:10.1145/570681.570691.
  8. Harvell, B., 2013. iConnected: Use AirPlay, iCloud, Apps, and More to Bring Your Apple Devices Together, 1st ed. Wiley.

Details

Primary Language

English

Subjects

Engineering

Journal Section

Research Article

Publication Date

June 19, 2015

Submission Date

February 15, 2015

Acceptance Date

May 29, 2015

Published in Issue

Year 2015 Volume: 2 Number: 4

APA
Kabakuş, A. T., & Kara, R. (2015). Survey of Instant Messaging Applications Encryption Methods. Avrupa Bilim Ve Teknoloji Dergisi, 2(4), 112-117. https://izlik.org/JA28PA79GY