Design of Secure Chatting Application with End to End Encryption for Android Platform
Journal Title: Iraqi Journal for Computers and Informatics - Year 2017, Vol 43, Issue 1
Abstract
In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has been proposed. This is achieved by the use of public key cryptography techniques. The proposed application used the Elliptic Curve Diffie Hellman Key Exchange (ECDH) algorithm to generate the key pair and exchange to produce the shared key that will be used for the encryption of data by symmetric algorithms. The proposed Application allows the users to communicate via text messages, voice messages and photos. For the text message security the standard AES algorithm with a 128 bit key are used. The generated key (160 bit) minimized to 128 bit length by selecting the first 128 bit of the generated key in order to be used by the AES algorithm. For the voice and image security processes the proposed application used the symmetric algorithm RC4 for this purpose.
Authors and Affiliations
Ammar Hammad Ali, Ali Makki Sagheer
Developing Energy Aware Distributed Aggregation Tree Technique for Wireless Sensor Networks
Wireless sensor network WSN consists of small sensor nodes with limited resources, which are sensing, gathering and transmitting data to base station. Sensors of various types are deployed ubiquitously and widely in vari...
Corners-based Image Information Hiding Method
Abstract: The huge explosion of information over World Wide Web forces us to use information security methods to keep it away from intruders. One of these security methods is information hiding method. Advantage of this...
Blended Learning Using Virtual Reality Environments
Immersive virtual reality isn’t just for gaming. It’s poised to have a big impact on education as well, giving students an opportunity to interact with content in three-dimensional learning environments. Blended learning...
Quadcopter Based Object Detection and Localization
Abstract: This paper presents the development and integration of an X-configuration quadcopter with an IP camera for object detection based on the color of an object. A KK2 microcontroller is used to control the quadcopt...
Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain
Abstract: With development, technology, computer science, computer networks and transmission of multimedia between two or more parts, a security of multimedia becomes an essential issue since most of the systems became e...