Survey of Instant Messaging Applications Encryption Methods

Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Realization (GSM), they are free to use and they only require internet connection which is the most common way of communication today. The critical point here is providing privacy of these messages in order to prevent any vulnerable points for hackers and cyber criminals. According to the latest research by PricewaterhouseCoopers, percentage of global cyber attacks is increased to 48% with 42.8 million detected incidents. Another report that is published by security company Postini indicates that 90% of instant messaging targeted threats are highly destructive worms. In this study, instant messaging applications encryption methods are comparatively presented. Instant messaging applications are investigated considering three different target platforms: (1) Desktop clients, (2) web clients, and (3) mobile phone clients. Instant messaging applications are compared through the critical criteria that most research studies emphasize: (1) Text conversation over internet, (2) text conversation after encryption, and (3) text conversation after enabling Secure Sockets Layer (SSL). Finally, authors highlight key requirements of a secure instant messaging application should provide.

[1]  Douglas Stebila,et al.  Performance analysis of elliptic curve cryptography for SSL , 2002, WiSE '02.

[2]  Michael Owens Embedding an SQL database with SQLite , 2003 .

[3]  Sonja Buchegger,et al.  Encryption for Peer-to-Peer Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[4]  Mohd Kamir Yusof,et al.  A secure private instant messenger , 2011, The 17th Asia Pacific Conference on Communications.

[5]  Joseph Bonneau,et al.  Finite-State Security Analysis of OTR Version 2 , 2006 .

[6]  Nedaa Al Barghouthy,et al.  Social Networks IM Forensics: Encryption Analysis , 2013, J. Commun..

[7]  Kris Kendall,et al.  Practical Malware Analysis , 2012, Netw. Secur..

[8]  Cosimo Anglano,et al.  Forensic analysis of WhatsApp Messenger on Android smartphones , 2014, Digit. Investig..

[9]  Aditya Mahajan,et al.  Forensic Analysis of Instant Messenger Applications on Android Devices , 2013, ArXiv.