ABSTRACT
People more and more concern about the security and usability of instant messaging applications as they have been widely used in our daily life and work. This paper analyzes the secure communication models of international popular instant messaging including message encryption as well as process of message sending and receiving in detail. For the aspect of usability, we present the principles of message forwarding in scenarios of group chat and multi-device online under different encryption modes. In addition, we design a secure communication model in the end-to-end encryption mode for multi-device online case, which effectively improves the security level of multi-device communication since the current encryption in this case only supports a weaker end-to-server mode. In fact, the secure communication model we designed is not limited to instant messaging, but also can be conveniently applied to communication scenarios with strict and necessary requirements for privacy protection, such as sensitive information of authorization and device configuration on multiple devices.
- X. Qu, X. Zhi. The Analysis and Research of Micro letter Encryption on the mobile client and Reverse Break Mode, Information security and Technology, 2014(1), pages 13-16.Google Scholar
- Y. Wan, Y. Gu, W. Qiu. Research on Interactive Protocol and Encryption Mode of Wechat, Microcomputer Applications, 2015(2), pages 31-34.Google Scholar
- M. Di Raimondo, R. Gennaro, and H. Krawczyk. Secure off-the-record messaging. Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pages 81–89, New York, NY, USA, 2005. ACM.Google ScholarDigital Library
- C. Alexander and I. Goldberg. Improved user authentication in off-the-record messaging. Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pages 41–47, New York, NY, USA, 2007.Google ScholarDigital Library
- J. Bian, R. Seker, and U. Topaloglu. Off-the-record instant messaging for group conversation. IEEE International Conference on Information Reuse and Integration, pages 79–84, 8, 2007.Google ScholarCross Ref
- K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, and D. Stebila. A formal security analysis of the Signal messaging protocol. IEEE European Symposium on Security and Privacy (EuroS&P) 2017, pages 451–466. IEEE, 4 2017.Google ScholarCross Ref
- T. Frosch, C. Mainka, C. Bader, F. Bergsma, J. Schwenk, and T. Holz. How secure is textsecure? IEEE European Symposium on Security and Privacy (EuroS&P), pages 457–472. IEEE, March 2016.Google Scholar
- N. Kobeissi, K. Bhargavan, and B. Blanchet. Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach. European Symposium on Security and Privacy (EuroS&P), pages 435–450, 2017.Google ScholarCross Ref
- M. Marlinspike and T. Perrin. The X3DH Key Agreement Protocol. Open Whisper Systems, (November 04), 2016. https://whispersystems.org/docs/specifications/x3dh/.Google Scholar
- C. Johansen, A. Mujaj, H. Arshad, J. Noll, The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications (author's version), ArXiv, abs/1807.07952, 2020.Google Scholar
- M. Abbasi, A. Shahraki, A. Taherkordi. Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey, Computer Communications, Vol 170, pages 19-41, 2021.Google ScholarCross Ref
- A. Afzal, M. Hussain, S. Saleem, Shahzad MK, Ho ATS, Jung K-H. Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App. Applied Sciences. 2021; 11(17): 7789.Google Scholar
- A. Raza, M.B Hassan. Digital Forensic Analysis of Telegram Messenger App in Android Virtual Environment. Mobile and Forensics, Vol. 4, No. 1, pages 31-43, 2022.Google Scholar
- I. Riadi, H. Herman, N. Siregar. Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework. MATRIK: Jurnal Manajemen, Teknik Informatika Dan Rekayasa Komputer, 21(3), 489-502, 2022.Google Scholar
- A. Ahmad, M. Hussain. A Forensic Analysis of Video Streaming Activities on Android Applications. Mobile and Forensics, Vol. 4, No. 1, pages 44-52, 2022.Google Scholar
Index Terms
- Research on the Secure Communication Model of Instant Messaging
Recommendations
Design of an Instant Messaging System Using Identity Based Cryptosystems
EIDWT '13: Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web TechnologiesThe rapid development of instant messaging changes the people's communication, collaboration and entertainment manner radically. Unfortunately, the existing instant messaging technology does not provide built-in support for security features. The ...
Awareness of presence, instant messaging and WebWho
We report from a study of how awareness of presence can affect instant messaging behavior. WebWho is a web based awareness system that visualizes where people are located in a large university computer lab. It allows students to virtually locate one ...
Communication characteristics of instant messaging: effects and predictions of interpersonal relationships
CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative workInstant Messaging is a popular medium for both social and work-related communication. In this paper we report an investigation of the effect of interpersonal relationship on underlying basic communication characteristics (such as messaging rate and ...
Comments