• Login
  • Help Guide
View Item 
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
  •   JOOUST IR Home
  • Journal Articles
  • School of Informatics & Innovative Systems
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Secure end point data security using java application programming interface

Thumbnail
View/Open
Nyakomitta_ Secure end point data security using java application programming interface.pdf (891.3Kb)
Nyakomitta_ Secure end point data security using java application programming interface.pdf (891.3Kb)
Publication Date
2017-02
Author
Nyakomitta, Peter S.
Ogara, Solomon
Abeka, Silvance O.
Type
Article
Metadata
Show full item record
Abstract/Overview

Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being transmitted and obtain the raw packets that are being relayed across the network. However, some of them like Whatsapp and Facebook Messenger have embraced end –to-end encryption. In so doing, this encryption protects this data as it is being passed from one device to another over communication channels. Effectively, this prevents potential eavesdroppers such as telecommunication service providers, Internet service providers or the provider of the communication service from being able to access the cryptographic keys needed to decrypt the conversation. However, most messaging applications encrypt data but only between the user and the companies' servers. The consequence of this is that the service providers can pry open the data being passed across their network data anytime and access the information being passed between the communicating parties. This paper sought to develop a port-based algorithm for packet encapsulation in instant messaging sessions. This is in realization of the fact that even with end to end encryption, the instant messages are in plain text at the communicating devices. This means that eavesdropping can still happen if these instant messages are read by people other than the ones for which the communication was meant. A prototype instant messenger application was developed with end to end encryption in place, as well as message encryption at the end devices. In this way, only a party that has a decryption key can read the transmitted messages.

Subject/Keywords
Instant Messaging; packets; Whatsapp; Facebook Massager; Skype; Eavesdroppers; Port-based algorithm
Publisher
IJSRSET
ISSN
23951990; 23944099
Series
Volume 3 , Issue 1;
Permalink
http://62.24.102.115:8080/xmlui/handle/123456789/1243
Collections
  • School of Informatics & Innovative Systems [119]

Browse

All of JOOUST IRCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

Contact Us

Copyright © 2023-4 Jaramogi Oginga Odinga University of Science and Technology (JOOUST)
P.O. Box 210 - 40601
Bondo – Kenya

Useful Links

  • Report a problem with the content
  • Accessibility Policy
  • Deaccession/Takedown Policy

TwitterFacebookYouTubeInstagram

  • University Policies
  • Access to Information
  • JOOUST Quality Statement