Secure end point data security using java application programming interface

Show simple item record

dc.contributor.author Nyakomitta, Peter S.
dc.contributor.author Ogara, Solomon
dc.contributor.author Abeka, Silvance O.
dc.date.accessioned 2018-02-21T08:09:22Z
dc.date.available 2018-02-21T08:09:22Z
dc.date.issued 2017-02
dc.identifier.issn 23951990
dc.identifier.issn 23944099
dc.identifier.uri http://62.24.102.115:8080/xmlui/handle/123456789/1243
dc.description.abstract Most of the current instant messaging applications such as Telegram Secret Chat transmit packets in plain text. This means that an intruder equipped with appropriate remote monitoring tools can sniff the packets being transmitted and obtain the raw packets that are being relayed across the network. However, some of them like Whatsapp and Facebook Messenger have embraced end –to-end encryption. In so doing, this encryption protects this data as it is being passed from one device to another over communication channels. Effectively, this prevents potential eavesdroppers such as telecommunication service providers, Internet service providers or the provider of the communication service from being able to access the cryptographic keys needed to decrypt the conversation. However, most messaging applications encrypt data but only between the user and the companies' servers. The consequence of this is that the service providers can pry open the data being passed across their network data anytime and access the information being passed between the communicating parties. This paper sought to develop a port-based algorithm for packet encapsulation in instant messaging sessions. This is in realization of the fact that even with end to end encryption, the instant messages are in plain text at the communicating devices. This means that eavesdropping can still happen if these instant messages are read by people other than the ones for which the communication was meant. A prototype instant messenger application was developed with end to end encryption in place, as well as message encryption at the end devices. In this way, only a party that has a decryption key can read the transmitted messages. en_US
dc.language.iso en en_US
dc.publisher IJSRSET en_US
dc.relation.ispartofseries Volume 3 , Issue 1;
dc.subject Instant Messaging en_US
dc.subject packets en_US
dc.subject Whatsapp en_US
dc.subject Facebook Massager en_US
dc.subject Skype en_US
dc.subject Eavesdroppers en_US
dc.subject Port-based algorithm en_US
dc.title Secure end point data security using java application programming interface en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account