Abstract
The increase in usage of smartphones and the ubiquity of Internet access have made mobile communications services very attractive to users. Messaging services are among the most popular services on the Internet. In recent years, this services started to support confidentiality and anonymity. A recurrent problem with the existing messaging solutions is their lack of resistance to impersonation attacks. The proposed solution addresses the impersonation problem, without neglecting user confidentiality and anonymity, by forcing users to exchange the required cryptographic material among themselves. Moreover, this exchange must use a proximity communication technology, forcing the users to physically meet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Calderbank, M.: The RSA Cryptosystem: History, Algorithm, Primes (2007)
Demircioglu, M., Taskın, H.K., Sarımurat, S.: Security analysis of the encrypted mobile communication applications (2014)
Electronic Frontier Foundation: Secure messaging scorecard. Which apps and tools actually keep your messages safe?. Accessed 11 Sept 2016
Electronic Frontier Foundation, Julia, A., Joseph, B.: Secure Messaging Scorecard. https://www.eff.org/secure-messaging-scorecard (2014)
Gaurav, R.: How WhatsApp Works. http://digitalperiod.com/explore-whatsapp-clock-sign-and-tick/ (2015)
Greenberg, A.: Hacker Lexicon: What Is End-to-End Encryption?. In: WIRED (2015). Accessed 17 Mar 2016
Inc, W.: How Wickr’s Encryption Works. https://www.wickr.com/security/how-it-works. Accessed 17 Feb 2016
Pedersen, C., Dahl, D.: Crypton: Zero-Knowledge Application Framework (2014). Accessed 2 Mar 2016
Play, G.: TextSecure Private Messenger. Accessed 17 Feb 2016
Sun, L.: Facebook Inc.’s WhatsApp Hits 900 Million Users: What Now?. The Motley Fool. http://www.fool.com/investing/general/2015/09/11/facebook-incs-whatsapp-hits-900-million-users-what.aspx (2015)
Systems, O.W.: Advanced cryptographic ratcheting. https://whispersystems.org/blog/advanced-ratcheting/. Accessed 28 Sept 2016
Tactical Technology Collective and Front Line Defenders: TextSecure for Android, security in-a-box. https://securityinabox.org/en/guide/textsecure/android (2009)
TechCrunch. AOL: Talk Private to Me: Free, Worldwide, Encrypted Voice Calls with Signal for iPhone. Accessed 13 Sept 2016
Telegram: Mtproto mobile protocol
The Zfone Project: Exactly how does Zfone and ZRTP protect against a man-in-the-middle (MiTM) attack?. Accessed 13 Sept 2016
Threema GmbH: Threema
Threema GmbH: Threema Cryptography Whitepaper. https://threema.ch/en/faq. Accessed 10 Sept 2016
Tilman, F., Christian, M., Christoph, B., Florian, B., Jorg, S., Thorsten, H.: How Secure is TextSecure? (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Fernandes, P., Pinto, A. (2017). Online Conversation Application with Confidentiality, Anonymity, and Identity Requirements. In: De Paz, J., Julián, V., Villarrubia, G., Marreiros, G., Novais, P. (eds) Ambient Intelligence– Software and Applications – 8th International Symposium on Ambient Intelligence (ISAmI 2017). ISAmI 2017. Advances in Intelligent Systems and Computing, vol 615. Springer, Cham. https://doi.org/10.1007/978-3-319-61118-1_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-61118-1_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61117-4
Online ISBN: 978-3-319-61118-1
eBook Packages: EngineeringEngineering (R0)