Conference Paper

A Cryptographic Approach for Secure Client - Server Chat Application using Public Key Infrastructure (PKI)

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Nowadays, while the popularity of chat applications increases, this popularity brings some security problems with it. A variety of authentication mechanisms and encrypting methods are suggested and applied between server and client to minimize the increasing security problems in literature and marketing companies. In this study, various security measures have been considered for instant messaging applications, a java based client-server chat application developed by Professor Dan Boneh [1] and his assistants from Stanford University has been made secure and a secured chat application model which has three steps has been developed. At the first step, server has been identified itself to certificate authority and password authentication procedure has been performed to identify client itself to server. The second step is called as connection and client connects to chat room via ticket granting ticket (TGT) request in this step. Messages written by clients are sent to server cryptically through symmetric encryption method Advanced Encryption Standard (AES) in the third step which is called as encrypted messaging too. Source code of this application is accessible to everyone from the reference [9].

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... The system introduces a combined encryption algorithm and puts forth a study about the effectiveness and efficiency of the hybrid encryption system. Is¸ıl Karabey [2] et al. in their paper have proposed a system of client-server communication using Public Key In-frastructure(PKI). The system proposes a secure channel for communication between two uses asi in a chat application. ...
Conference Paper
The current internet ecosystem has a variety of applications growing at a very fast pace. There exists a requirement to secure these applications to preserve the privacy of the users that employ its usage. This paper proposes a system to secure text-based data sharing between users using a hybrid encryption methodology. On the other hand, encryption algorithms consume a significant amount of time for computation. This paper provides an evaluation of 6 different algorithmic combinations: AES+RSA, DES+RSA, 3DES+RSA, RC4+RSA, Blowfish+RSA, and Rabbit+RSA. A comparison study has been conducted for the different combinations by using files with different file sizes to determine which algorithmic combination is best for the proposed system. The simulation results have been published to demonstrate the effectiveness of the algorithmic combinations and suitability for the proposed system.
... Akhil K.M ,Praveen Kumar And MPushpa B.R [3] showed that AES based secure model for cloud data security provides increased security to data while being stored and transferred. Isji Karabey And Gamze Akman [4] Showed that In this encryption and identity authentication have been added to a simple chat application to let clients talk to each other instantly over a secure channel in the internet. Bharati Mishra and Debsish Jena. ...
Article
Full-text available
In today’s world, simply having the capacity to transfer a file from one location to another isn’t enough. Businesses today face multiple security threats and a highly competitive environment. So they need a secure file transfer system to protect and reliably transfer their sensitive, business-critical data. Secure file transfer is a method of data sharing via a secure, reliable delivery method. Also, we use this between a client and a server. Cryptography is a technique that we use for securing information and communication in the presence of third parties. We use this technique to ensure that only those persons to whom the information is intended can read this. By using cryptography, we can prevent unauthorized users from accessing the information which is shared privately. In this paper, the plan proposed is to overcome the issues regarding the data that are being stored by the users on the cloud should be encrypted rather than storing them in a plain form such that the data will be protected from the attackers who are trying to read, delete or manipulate the data. Our application is focused on securely authenticating the user, before storing and sharing files, To create an application that lets a user encrypt and decrypt any type of file without any changes in the size during encryption & decryption, store every user data in the encrypted form on the cloud, to provide a communication medium between users via the chat application, to give direct access to the file for CRUD operation only to the owner.
... Their approach aims at providing strong authentication for users and privacy with regards to confidentiality and the integrity of the message. Karabey and Akman [38] presented an approach of securing an IM system based on public key infrastructures and AES cryptosystem using a certificate and password-based authentication. ...
Article
Full-text available
In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of instant messaging systems and confounding the time and resources of malicious persons is presented. HE offers security beyond the brute-force bound by yielding plausible-looking but fake plaintext upon decryption with an incorrect key. Recent developments have seen the application of HE in the security of specific real-world systems, such as passwords and credit cards. However, applying the HE scheme to address other economic problems remains a daunting task as it requires modifying the HE algorithm to fit into the problem-in-view. For instance, applying the scheme for robust transmission of chat-messages upon decryption with an incorrect key will demand to generate contextually correct, valid-looking but fake chat-message which is indistinguishable from a human-generated message. This paper enhances the HE scheme by leveraging natural language processing techniques to build semantically plausible but fake chat-messages which will be served to the adversary during his attacks. Findings from evaluations reveal that the novel system is resilient to eavesdropping as an adversary is unable to distinguish decoy messages from the plaintext upon decryption with an incorrect key.
... Furthermore, possible password and number are expressed by log 2 and every characters creating password will be processed independently. Therefore, information entropy of optional password is estimated by following [25] H-formula: ...
... IT can guarantee the integrity, authenticity and nonrepudiation of the document that is exchanged in the system. Karabey I et al. designed and applied a cryptographic IM application that is based on the PKI and AES algorithms [19]. However, it's an online chat-room application and is not suitable for mainstream IM systems. ...
Article
Full-text available
Instant Messaging (IM) systems can be considered the most frequently used applications in mobile social networks. Nowadays, people are becoming increasingly concerned about data security and privacy protection with IM applications. Therefore, a comprehensive enhanced secure IM scheme was proposed in this paper, which is based on the Elliptic Curve Cryptosystem and the Advanced Encryption Standard (AES) algorithm. An offline key agreement process between users was designed under the Computational Diffie-Hellman (CDH) assumption by updating the ephemeral key periodically. The proposed scheme supports denial of replaying attack and denial of forgery attack by utilizing timestamps and the Elliptic Curve Digital Signature Algorithm (ECDSA). It supports multiple types of messages (such as document and multimedia messages) and prevents privacy leakage by storing sent and received messages with ciphertext. We proved the security of the proposed scheme under the Elliptic Curve Discrete Logarithm (ECDL) assumption and the CDH assumption. The comparison results of the proposed scheme with other schemes and the results of an experiment show that it is a comprehensive secure scheme with high security and good practicability.
Chapter
Communication has been a part and parcel of our daily life. The advent of technology has bolstered the quality of communication and thus made it effective. Consequently, chat applications have become the primary method of connecting and socializing with people. However, the rise of these applications has also led people to question the confidentiality of their services. In this paper, we are proposing a secure chat application along with a unique authentication system while simultaneously providing a methodology for End-to-End Encryption. Our solution fulfills a set of requirements that are required for a safe chatting experience. We will be presenting an in-depth procedure of our alternative approach for developing a well-rounded and end-to-end encrypted chat application.KeywordsAuthenticationEnd-to-end encryptionChat applicationCryptography
Article
Full-text available
The majority of studies in the field of developing identification and authentication protocols for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a relatively new approach in this field. EEG signal-based authentication algorithms typically use feature extraction algorithms that require high processing time. On the other hand, the dynamic nature of the EEG signal makes its use for identification/authentication difficult without relying on feature extraction. This paper presents an EEG-and fingerprint-based two-stage identification-authentication protocol for remote healthcare, which is fast, robust, and multilayer-based. A modified Euclidean distance pattern matching method is proposed to match the EEG signal in the identification stage due to its dynamic nature. The authentication stage is also an optimized method with the Genetic Algorithm (GA), which utilizes a modified Diffie–Hellman algorithm. Due to the vulnerability of the Diffie–Hellman algorithm to different types of attacks, the parameters used for this algorithm are extracted from the fingerprint and the EEG signal of the patient to provide a fast and robust authentication method. The proposed method is evaluated using data from patients with spinal cord injuries. Simulating results demonstrated high identification and authentication accuracy of the proposed method. Furthermore, it is extremely fast and efficient. © 2021 The Authors. IET Communications published by John Wiley & Sons Ltd on behalf of The Institution of Engineering and Technology
Article
Full-text available
Communication is essential for human beings and we communicate globally with the means of internet every day. Internet is an interconnected mesh of networks where our data is transferred through hundreds of nodes before reaching its destination. As the intermediary network node increases, the risk of losing confidentiality and integrity is also affected. Decentralized Chat (DChat) is a chat service on the Interplanetary File System (IPFS) peer-to-peer protocol where users can communicate with ephemeral chats under any anonymous alias. The users are not aware of real identity of each other and the chats are lost from the service once the node is disconnected. The data is tamper-resistant because to alter it would change the hash and invalidate it from the network. Here we aim to develop a secure chat service that provides anonymity and ephemeral chats using cost-effective IPFS technology.
Article
Full-text available
Communication security deals with attributes such as confidentiality, integrity and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does not prevent or discourage eavesdroppers from stealing and attempting to decrypt the encrypted messages using a brute-force attack or by randomly guessing the key. The probability of the eavesdropper acquiring the key and recovering the message is high as he/she can distinguish a correct key from incorrect keys based on the output of the decryption. This is because a message has some structure-texts, pictures, videos. Thus, an attempt at decrypting with a wrong key yields random gibberish that does not comply with the expected structure. Furthermore, the consistent increase in computational power implies that stolen encrypted data may gradually debilitate to a brute-force attack. Thus, causing the eavesdropper to learn the content of the message. To this end, the objective of this research is to reinforce the current encryption measures with a decoy-based deception model where the eavesdropper is discouraged from stealing encrypted message by confounding his resources and time. Our proposed model leverages its foundation from decoys, deception and artificial intelligence. An instant messaging application was developed and integrated with the proposed model as a proof of concept. Further details regarding the design, analysis and implementation of the proposed model are substantiated. The result shows that the proposed model reinforces state-of-the-art encryption schemes and will serve as an effective component for discouraging eavesdropping and curtailing brute-force attack on encrypted messages.
Conference Paper
Over the last few years, instant messaging and group chat applications have gained enormous popularity among recreational users. But with increase in popularity, the chat applications have simultaneously witnessed an abrupt rise in security threats from across the globe. Coping up with the various security requirements has always been challenging. To provide a secure communication, many researchers have designed chat applications under the canopy of public key infrastructure (PKI). But public key infrastructure poses a major drawback which may increase the communication overhead. In order to communicate using a PKI based chat application, a user must have a valid certificate signed by a valid Certificate Authority. This overhead will get costlier as more users register in to the chat system. To overcome this problem, a new security system for cross platform chat application based on Identity Based Encryption (IBE) is discussed in this paper. Here, we show how a suitable Chat Server and Client application can be developed utilizing Boneh-Franklin scheme of pairing based cryptography. The application is cross platform in nature. An analysis shows that this approach can resist security threats which the previous schemes are vulnerable to.
Network Security Foundations
  • M Strebe
M. Strebe, " Network Security Foundations ", SYBEX Inc., 1151 Marina Village Parkway, Alameda, CA 94501, San Francisco, London, 4th ed. 2004