Public Key Encryption Techniques Provide Extreme Secure Chat Environment

A secure chat scheme is readily accessible and very useful to communicate with people that might be anywhere in the world. Internet chat service provides the convenience of communicate with the people in real time. The objective of this work is to build a secure chat server utilizing public key encryption to send secure chat messages across the internet. It provides a technical implementation of a new structural design for encrypting the database in the network. This paper shows results that what security features should implement to accomplish a highly secured chat present a standalone system that can be implemented on any legacy systems with efficiently. This work classifies the protocol used by servers to talk with each other.

[1]  Antoine Joux,et al.  Fault Attacks on RSA Signatures with Partially Unknown Messages , 2009, CHES.

[2]  Michael Backes,et al.  Cryptographically sound security proofs for basic and public-key Kerberos , 2006, International Journal of Information Security.

[3]  V. Vaidehi,et al.  VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 , 2010, CNSA.

[4]  Emmanuel Bresson,et al.  Password-Based Group Key Exchange in a Constant Number of Rounds , 2006, Public Key Cryptography.

[5]  Lixia Zhang,et al.  Implementing instant messaging using named data , 2010, AINTEC.

[6]  Maheswara Rao Valluri,et al.  Authentication Schemes Using Polynomials Over Non-Commutative Rings , 2013, ArXiv.

[7]  D. Goldfeld,et al.  An algebraic method for public-key cryptography , 1999 .

[8]  Hung-Min Sun,et al.  SPATE: Small-Group PKI-Less Authenticated Trust Establishment , 2010, IEEE Transactions on Mobile Computing.

[9]  G. Anjaneyulu,et al.  Secured Directed Digital Signature over Non-Commutative Division Semirings and Allocation of Experimental Registration Number , 2012 .

[10]  Constantinos Patsakis,et al.  Number Theoretic SETUPs for RSA Like Factoring Based Algorithms , 2012, J. Inf. Hiding Multim. Signal Process..

[11]  Mohd Kamir Yusof,et al.  A Secure and Reliable Chat Room Application via Embedded Chaotic Encryption , 2012, Smart Comput. Rev..

[12]  Claude Crépeau,et al.  Simple Backdoors for RSA Key Generation , 2003, CT-RSA.

[13]  Mohd Kamir Yusof,et al.  Designing a Secure Architecture for Private Instant Messenger Application , 2011 .

[14]  Birgit Pfitzmann,et al.  Relating symbolic and cryptographic secrecy , 2005, IEEE Transactions on Dependable and Secure Computing.

[15]  Bo-Yin Yang,et al.  GAnGS: gather, authenticate 'n group securely , 2008, MobiCom '08.

[16]  Jung Hee Cheon,et al.  New Public-Key Cryptosystem Using Braid Groups , 2000, CRYPTO.

[17]  Khaled Elleithy,et al.  COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION , 2010 .

[18]  David Snogles PERSONAL ENCRYPTED TALK - SECURING INSTANT MESSAGING WITH A JAVA APPLICATION , 2005 .

[19]  John C. Mitchell,et al.  Key Exchange Protocols: Security Definition, Proof Method and Applications , 2006, IACR Cryptol. ePrint Arch..

[20]  Manoj Kumar,et al.  Rectified Differential Cryptanalysis of 16 Round Present , 2012 .

[21]  Michael D. Smith,et al.  Implementing public-key infrastructure for sensor networks , 2008, TOSN.