skip to main content
10.1145/3565387.3565412acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Research on the Secure Communication Model of Instant Messaging

Published:13 December 2022Publication History

ABSTRACT

People more and more concern about the security and usability of instant messaging applications as they have been widely used in our daily life and work. This paper analyzes the secure communication models of international popular instant messaging including message encryption as well as process of message sending and receiving in detail. For the aspect of usability, we present the principles of message forwarding in scenarios of group chat and multi-device online under different encryption modes. In addition, we design a secure communication model in the end-to-end encryption mode for multi-device online case, which effectively improves the security level of multi-device communication since the current encryption in this case only supports a weaker end-to-server mode. In fact, the secure communication model we designed is not limited to instant messaging, but also can be conveniently applied to communication scenarios with strict and necessary requirements for privacy protection, such as sensitive information of authorization and device configuration on multiple devices.

References

  1. X. Qu, X. Zhi. The Analysis and Research of Micro letter Encryption on the mobile client and Reverse Break Mode, Information security and Technology, 2014(1), pages 13-16.Google ScholarGoogle Scholar
  2. Y. Wan, Y. Gu, W. Qiu. Research on Interactive Protocol and Encryption Mode of Wechat, Microcomputer Applications, 2015(2), pages 31-34.Google ScholarGoogle Scholar
  3. M. Di Raimondo, R. Gennaro, and H. Krawczyk. Secure off-the-record messaging. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pages 81–89, New York, NY, USA, 2005. ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. C. Alexander and I. Goldberg. Improved user authentication in off-the-record messaging. Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pages 41–47, New York, NY, USA, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Bian, R. Seker, and U. Topaloglu. Off-the-record instant messaging for group conversation. IEEE International Conference on Information Reuse and Integration, pages 79–84, 8, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  6. K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, and D. Stebila. A formal security analysis of the Signal messaging protocol. IEEE European Symposium on Security and Privacy (EuroS&P) 2017, pages 451–466. IEEE, 4 2017.Google ScholarGoogle ScholarCross RefCross Ref
  7. T. Frosch, C. Mainka, C. Bader, F. Bergsma, J. Schwenk, and T. Holz. How secure is textsecure? IEEE European Symposium on Security and Privacy (EuroS&P), pages 457–472. IEEE, March 2016.Google ScholarGoogle Scholar
  8. N. Kobeissi, K. Bhargavan, and B. Blanchet. Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach. European Symposium on Security and Privacy (EuroS&P), pages 435–450, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  9. M. Marlinspike and T. Perrin. The X3DH Key Agreement Protocol. Open Whisper Systems, (November 04), 2016. https://whispersystems.org/docs/specifications/x3dh/.Google ScholarGoogle Scholar
  10. C. Johansen, A. Mujaj, H. Arshad, J. Noll, The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (author's version), ArXiv, abs/1807.07952, 2020.Google ScholarGoogle Scholar
  11. M. Abbasi, A. Shahraki, A. Taherkordi. Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey, Computer Communications, Vol 170, pages 19-41, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  12. A. Afzal, M. Hussain, S. Saleem, Shahzad MK, Ho ATS, Jung K-H. Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App. Applied Sciences. 2021; 11(17): 7789.Google ScholarGoogle Scholar
  13. A. Raza, M.B Hassan. Digital Forensic Analysis of Telegram Messenger App in Android Virtual Environment. Mobile and Forensics, Vol. 4, No. 1, pages 31-43, 2022.Google ScholarGoogle Scholar
  14. I. Riadi, H. Herman, N. Siregar. Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework. MATRIK: Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 21(3), 489-502, 2022.Google ScholarGoogle Scholar
  15. A. Ahmad, M. Hussain. A Forensic Analysis of Video Streaming Activities on Android Applications. Mobile and Forensics, Vol. 4, No. 1, pages 44-52, 2022.Google ScholarGoogle Scholar

Index Terms

  1. Research on the Secure Communication Model of Instant Messaging

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CSAE '22: Proceedings of the 6th International Conference on Computer Science and Application Engineering
      October 2022
      411 pages
      ISBN:9781450396004
      DOI:10.1145/3565387

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 December 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate368of770submissions,48%
    • Article Metrics

      • Downloads (Last 12 months)50
      • Downloads (Last 6 weeks)8

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format