Araştırma Makalesi

Survey of Instant Messaging Applications Encryption Methods

Cilt: 2 Sayı: 4 19 Haziran 2015
PDF İndir
TR EN

Survey of Instant Messaging Applications Encryption Methods

Abstract

Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Realization (GSM), they are free to use and they only require internet connection which is the most common way of communication today. The critical point here is providing privacy of these messages in order to prevent any vulnerable points for hackers and cyber criminals. According to the latest research by PricewaterhouseCoopers, percentage of global cyber attacks is increased to 48% with 42.8 million detected incidents. Another report that is published by security company Postini indicates that 90% of instant messaging targeted threats are highly destructive worms. In this study, instant messaging applications encryption methods are comparatively presented. Instant messaging applications are investigated considering three different target platforms: (1) Desktop clients, (2) web clients, and (3) mobile phone clients. Instant messaging applications are compared through the critical criteria that most research studies emphasize: (1) Text conversation over internet, (2) text conversation after encryption, and (3) text conversation after enabling Secure Sockets Layer (SSL). Finally, authors highlight key requirements of a secure instant messaging application should provide.

Keywords

Kaynakça

  1. Anglano, C., 2014. Forensic analysis of WhatsApp Messenger on Android smartphones. Digit. Investig. 11, 201–213. doi:10.1016/j.diin.2014.04.003.
  2. Barghuthi, N.B. Al, Said, H., 2013. Social Networks IM Forensics: Encryption Analysis. J. Commun. 8.
  3. Bodriagov, O., Buchegger, S., 2011. Encryption for peer-to-peer social networks, in: Proceedings - 2011 IEEE International Conference on Privacy, Security, Risk and Trust and IEEE International Conference on Social Computing, PASSAT/SocialCom 2011. pp. 1302–1309. doi:10.1109/PASSAT/SocialCom.2011.158.
  4. Bonneau, J., Morrison, A., n.d. Finite-State Security Analysis of OTR Version 2. Analysis 2–6. DB Browser for SQLite [WWW Document], n.d. URL http://sqlitebrowser.org (accessed 27.01.15).
  5. Global Information Security Survey: 2015 Results by Industry [WWW Document], 2015. PricewaterhouseCoopers. URL http://www.pwc.com/gx/en/consulting-services/information-security-survey/index.jhtml (accessed 27.01.15).
  6. Goldberg, I., 2006. Off-the-Record Messaging.
  7. Gupta, V., Gupta, S., Chang, S., Stebila, D., 2002. Performance analysis of elliptic curve cryptography for SSL, in: WiSE ’02: Proceedings of the 1st ACM Workshop on Wireless Security. pp. 87–94. doi:10.1145/570681.570691.
  8. Harvell, B., 2013. iConnected: Use AirPlay, iCloud, Apps, and More to Bring Your Apple Devices Together, 1st ed. Wiley.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Mühendislik

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

19 Haziran 2015

Gönderilme Tarihi

15 Şubat 2015

Kabul Tarihi

29 Mayıs 2015

Yayımlandığı Sayı

Yıl 2015 Cilt: 2 Sayı: 4

Kaynak Göster

APA
Kabakuş, A. T., & Kara, R. (2015). Survey of Instant Messaging Applications Encryption Methods. Avrupa Bilim ve Teknoloji Dergisi, 2(4), 112-117. https://izlik.org/JA28PA79GY