Skip to main content

Off-the-Record (OTR) Security Protocol Application in Cloud Environment

  • Conference paper
  • First Online:
Communication and Intelligent Systems (ICCIS 2019)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 120))

Included in the following conference series:

Abstract

The Pretty Good Privacy protocol is the most preferred choice for a safe and encrypted communication between two or more parties since it uses encrypted messages for the communication. However, the Off-the-Record (OTR) protocol fits better than PGP protocol as it does not fit well due to some of its characteristics. In the real world, physical communication has some characteristics that do not match with nature of PGP protocol. That offset in aspects was the stimulus to create a new kind of communication protocol: OTR. As the name says, “Off-the-Record” protocol tries to create distance from the message and its sender. When this distance is created, every message sent is unofficial and the sender can negate his correlation to it. The sender can make a statement and, in the future, deny any relations with it. Although this is the main premise of OTR, there is a list of additional characteristics that we are addressed in this paper. We also address the differences between OTR and some of the most used protocols in Internet of things (IoT) sector and why should IoT network use it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perrig A., Canetti R., Tygar, J.D., Song, S.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Security and Privacy Symposium (2000)

    Google Scholar 

  2. Mujaj. A.: A comparison of secure messaging protocols and implementations. Master’s thesis, Department of Informatics at the Faculty of Mathematics and Natural Sciences of the University of Oslo (2017)

    Google Scholar 

  3. Diffie, W., Hellman, M.: New directions in cryptography. In: IEEE Transactions on Information Theory, pp. 74–84 (1977)

    Google Scholar 

  4. Bruce, S.: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company (2015). ISBN-13: 978-0393352177

    Google Scholar 

  5. Johansen, C., Mujaj, A., Arshad, H., Noll, J.: Comparing implementations of secure messaging protocols (long version). Technical Report 475, Department of Informatics, University of Oslo, Nov 2017

    Google Scholar 

  6. McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the tor network. In: Privacy Enhancing Technologies, pp. 63–76. Springer, New York (2008)

    Google Scholar 

  7. Migdal, D., Johansen, C. and Jøsang, A.: DEMO: OffPAD—Offline personal authenticating device with applications in hospitals and e-Banking. In: 23rd Conference Computer and Communication Security, pp. 1847–1849. (ACM, 2016)

    Google Scholar 

  8. Boyd, C., Mathuria, A.: Protocols for authentication and key establishment. In: Information Security and Cryptography. Springer, pp. 1–321 (2003). ISBN: 978-3-662-09527-0

    Google Scholar 

  9. Alexander, C., Goldberg, I.: Improved user authentication in off-the-record messaging. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society (WPES ’07), pp. 41–47

    Google Scholar 

  10. Marlinspike, M., Perrin, T.: The double ratchet algorithm. In: Open Whisper Systems (2016)

    Google Scholar 

  11. Migdal, D., Johansen, C. and Jøsang, A.: Offline trusted device and proxy architecture based on a new tls switching technique. In: International Workshop on Secure Internet of Things (SIOT). (IEEE, 2017)

    Google Scholar 

  12. Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use pgp. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 77–84. (ACM, 2004)

    Google Scholar 

  13. Seker, B.R., Topaloglu, U..: Off-the-record instant messaging for group conversation. In: IEEE International Conference on Information Reuse and Integration, pp. 79–84 (2007)

    Google Scholar 

  14. Black, J., Halevi, S., Krawczyk, H., Krovetz, T. and Rogaway, P.: UMAC: Fast and secure message authentication. In: Annual International Cryptology Conference, pp. 216–233. Springer, New York (1999)

    Google Scholar 

  15. Marlinspike, M., Perrin, T.: The X3DH key agreement protocol. Open Whisper Systems (2016)

    Google Scholar 

  16. Liu, H., Vasserman, E.Y., Hopper, N.: Improved group off-the-record messaging. In: Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society, pp. 249–254 (ACM, 2013)

    Google Scholar 

  17. Auchard. Go ahead, make some free, end-to-end encrypted video calls on Wire. Reuters, 11 March 2016. Available at: http://www.reuters.com/article/us-dataprotection-messaging-wire-idUSKCN0WC2GM

  18. Goulet, G.D., Appelbaum, J., van Bergen, J.: Off-the-record messaging protocol version 3. Technical report. University of Waterloo, 2012

    Google Scholar 

  19. Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, pp. 451–466 (2017)

    Google Scholar 

  20. Black, J., Rogaway, P.: Cbc macs for arbitrary-length messages: the three-key constructions. In: Annual International Cryptology Conference, pp. 197–215. Springer, New York (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leo Mrsic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mrsic, L., Adamek, J., Cicek, I. (2020). Off-the-Record (OTR) Security Protocol Application in Cloud Environment. In: Bansal, J., Gupta, M., Sharma, H., Agarwal, B. (eds) Communication and Intelligent Systems. ICCIS 2019. Lecture Notes in Networks and Systems, vol 120. Springer, Singapore. https://doi.org/10.1007/978-981-15-3325-9_15

Download citation

Publish with us

Policies and ethics