Analysis of Hardware Cryptography for Securing Instant Messaging Applications

Hemalatha R.*, Pooja K. **, Gayathri P. ***, K. Selva Bhuvaneswari ****
*-**** Department of Computer Science and Engineering, University College of Engineering Kancheepuram, Kancheepuram, Tamil Nadu, India.
Periodicity:December - February'2021
DOI : https://doi.org/10.26634/jcom.8.4.18082

Abstract

Software cryptography is a great utility for many applications. If properly implemented, it provides a good level of security. However, some applications may require a greater level of secrecy and privacy, in such cases hardware cryptography would be more adequate. This paper illustrates the integration of hardware cryptosystem and instant messaging desktop application. Today, people use online chat platforms for sharing their private and business information. Such information can be attacked by hackers. The present instant messenger systems lack authenticity, confidentiality and integrity, and such disadvantages can be collaboratively eliminated through this proposed idea. Results will be tested to check whether the proposed model is resistant to adversarial attacks and also by considering cryptographic test like Hamming distance and NIST SP800-22.

Keywords

Hardware Cryptography, Instant Messaging, Confidentiality, Authenticity, Integrity, Cryptosystem

How to Cite this Article?

Hemalatha, R., Pooja, K., Gayathri, P., and Bhuvaneswari, K. S. (2021). Analysis of Hardware Cryptography for Securing Instant Messaging Applications. i-manager's Journal on Computer Science, 8(4), 14-18. https://doi.org/10.26634/jcom.8.4.18082

References

[1]. Bolton, A., Murray, M., & Fluker, J. (2017, January). Transforming the workplace: Unified communications & collaboration usage patterns in a large automotive manufacturer. In Proceedings of the 50th Hawaii International Conference on System Sciences (pp. 5470- 5479).
[2]. Qin, H. B., & Xu, X. (2015, October). Solution to secure instant messaging based on hardware encryption. In 2015, IEEE 16th International Conference on Communication Technology (ICCT) (pp. 844-847). IEEE. https://doi.org/10. 1109/ICCT.2015.7399959
[3]. Rodrigues, G. A. P., Albuquerque, R. D. O., Alves, G. D. O., De Mendonça, F. L. L., Giozza, W. F., De Sousa, R. T., & Orozco, A. L. S. (2020). Securing instant messages with hardware-based cryptography and authentication in browser extension. IEEE Access, 8, 95137-95152. https:// doi.org/10.1109/ACCESS.2020.2993774
[4]. Schoen, I., & Boberski, M. (2003). Secure PKI proxy and method for instant messaging clients (U. S. Patent Application 10/133, 202). US Patent and Trademark Office. Retrieved from https://patents.google.com/patent/Us2003 0204741A1/en
[5]. Stallings, W. (2006). Cryptography and network security, (4th Ed.). Pearson Education India. Retrieved from https://uru.ac.in/uruonlinelibrary/Cyber_Security/Cryptogra phy_and_Network_Security.pdf
[6]. The Radicati Group (2015). Instant Messaging Statistics Report, 2015-2019. CA, USA: The Radicati Group. Retrieved from https://www.radicati.com/wp/wp-content/uploads/ 2015/02/Instant_Messaging_Statistics_Report_2015-2019_ Executive_Summary.pdf
[7]. Wang, S. (2014). The design and implementation of the Android oriented client for "Mixun"- A secure communication software [Postgraduate Dissertation]. Beijing Jiaotong University, China.
[ 8]. Yang, H., Zhao, W. T., & Zhang, N. Q. (2015). Design and implementation of independent controllable instant message communication system based on Android. Electronic Design Engineering, 23(6), 67-70.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.