Survey of Instant Messaging Applications Encryption Methods
Abstract
Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Realization (GSM), they are free to use and they only require internet connection which is the most common way of communication today. The critical point here is providing privacy of these messages in order to prevent any vulnerable points for hackers and cyber criminals. According to the latest research by PricewaterhouseCoopers, percentage of global cyber attacks is increased to 48% with 42.8 million detected incidents. Another report that is published by security company Postini indicates that 90% of instant messaging targeted threats are highly destructive worms. In this study, instant messaging applications encryption methods are comparatively presented. Instant messaging applications are investigated considering three different target platforms: (1) Desktop clients, (2) web clients, and (3) mobile phone clients. Instant messaging applications are compared through the critical criteria that most research studies emphasize: (1) Text conversation over internet, (2) text conversation after encryption, and (3) text conversation after enabling Secure Sockets Layer (SSL). Finally, authors highlight key requirements of a secure instant messaging application should provide.
Keywords
Kaynakça
- Anglano, C., 2014. Forensic analysis of WhatsApp Messenger on Android smartphones. Digit. Investig. 11, 201–213. doi:10.1016/j.diin.2014.04.003.
- Barghuthi, N.B. Al, Said, H., 2013. Social Networks IM Forensics: Encryption Analysis. J. Commun. 8.
- Bodriagov, O., Buchegger, S., 2011. Encryption for peer-to-peer social networks, in: Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. pp. 1302–1309. doi:10.1109/PASSAT/SocialCom.2011.158.
- Bonneau, J., Morrison, A., n.d. Finite-State Security Analysis of OTR Version 2. Analysis 2–6. DB Browser for SQLite [WWW Document], n.d. URL http://sqlitebrowser.org (accessed 27.01.15).
- Global Information Security Survey: 2015 Results by Industry [WWW Document], 2015. PricewaterhouseCoopers. URL http://www.pwc.com/gx/en/consulting-services/information-security-survey/index.jhtml (accessed 27.01.15).
- Goldberg, I., 2006. Off-the-Record Messaging.
- Gupta, V., Gupta, S., Chang, S., Stebila, D., 2002. Performance analysis of elliptic curve cryptography for SSL, in: WiSE ’02: Proceedings of the 1st ACM Workshop on Wireless Security. pp. 87–94. doi:10.1145/570681.570691.
- Harvell, B., 2013. iConnected: Use AirPlay, iCloud, Apps, and More to Bring Your Apple Devices Together, 1st ed. Wiley.
Ayrıntılar
Birincil Dil
İngilizce
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
19 Haziran 2015
Gönderilme Tarihi
15 Şubat 2015
Kabul Tarihi
29 Mayıs 2015
Yayımlandığı Sayı
Yıl 2015 Cilt: 2 Sayı: 4