A Secure Chat Application Based on Pure Peer-to-Peer Architecture

Chat application is increasingly used as an alternative to older communication technologies such as telephony and telegraph. Equipped with advanced features, people can use it for education, business and socialize. Basic requirement for chatting is an ability to exchange text messages, however, recent releases include support for audio and video communications. For some reasons, peer-to-peer now turned out to be a popular architecture and as such, it becomes a choice for developing chat applications such as Skype. Skype however, makes use of centralized server for user registration, login and buddy list. Indeed, this idea could be disastrous in the event of a compromise. In this study, we proposed a chat application that is based on pure peer-to-peer architecture that totally rid of centralized or third party elements. The system is controlled by the users and its security is autonomously managed by the communicating parties. Each user will have their own database for peer's profiles and communication parties authenticate among each other before exchanging messages. The main contribution of this paper is a state-of-the-art chat application having completely been designed with build in security measures.

[1]  Mikko Vestola Security Issues in Structured P 2 P Overlay Networks , 2010 .

[2]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[3]  A. Kundu Decentralised indexed based peer to peer chat system , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).

[4]  Constantinos E. Goutis,et al.  Novel high throughput implementation of SHA-256 hash function through pre-computation technique , 2005, 2005 12th IEEE International Conference on Electronics, Circuits and Systems.

[5]  Hector Garcia-Molina,et al.  Open Problems in Data-Sharing Peer-to-Peer Systems , 2003, ICDT.

[6]  Zhong-Wen Li,et al.  Efficient and secure certificateless authentication and key agreement protocol for hybrid P2P network , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[7]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[8]  Rüdiger Schollmeier,et al.  First and Second Generation of Peer-to-Peer Systems , 2005, Peer-to-Peer Systems and Applications.

[9]  R. Layton,et al.  Characterising Network Traffic for Skype Forensics , 2012, 2012 Third Cybercrime and Trustworthy Computing Workshop.

[10]  Konstantinos Ntaikos,et al.  Design of a secure chat application based on AES cryptographic algorithm and key management , 2008 .

[11]  Jian Liu,et al.  Authentication in Peer-to-Peer Network: Survey and Research Directions , 2009, 2009 Third International Conference on Network and System Security.