CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS

2022-8-22
Dinçer, Hilal
Instant messaging applications have replaced classical messaging in recent years. The fact that instant messaging applications transmit messages over the internet, therefore, being free and fast, played a major role in this rise. However, being internet-based has brought disadvantages as well as advantages. There are risks such as obtaining the message, changing the message, etc. by third parties. To avoid these risks, messages are encrypted, the sender is authenticated and their integrity is shown. However, with the developing quantum technology, it turned out that these algorithms will be broken in the near future. Now, studies are being made to make these algorithms resistant to post-quantum. In this thesis study, the key generation, key exchange, and encryption mechanisms used by the Signal Protocol in one-to-one communications, which is one of the most secure systems, are explained in detail. It is explained how open source Linphone, Xabber, Wire, and Element applications developed on the basis of Signal Protocol use Signal Protocol. In addition, in this thesis, the parameters used by Signal and Wire applications, but not specified in their documents, were obtained from open sources and added. Finally, the methods used to make the Signal Protocol quantum resistant are presented.

Suggestions

BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications
Ozcan, Ahmet Talha; Gemicioglu, Can; Onarlioglu, Kaan; Weissbacher, Michael; Mulliner, Collin; Robertson, William; Kirda, Engin (2015-01-30)
Internet-based mobile messaging applications have become a ubiquitous means of communication, and have quickly gained popularity over cellular short messages (SMS). Unfortunately, from a security point of view, free messaging services do not guarantee the privacy of users. For example, free messaging providers can record and store exchanged messages indefinitely to collect information about specific users. Moreover, these messages can be accessed by criminals who gain access to social media accounts. In thi...
Data Delivery in Wireless Multimedia Sensor Networks: Challenging and Defying in the IoT Era
Al-Turjman, Fadi; Radwan, Ayman (2017-10-01)
The vision of wireless multimedia sensor networks (WMSNs) nowadays is to afford real-time multimedia applications using the pervasive wireless sensors around us. This necessitates strict QoS conditions, which have led to new emerging challenges in terms of data delivery in the Internet of Things era. Accordingly, multipath routing protocols with multi-constraints are recommended in WMSNs. In this article, a comprehensive overview of both best effort and real-time multipath routing protocols for WMSNs is per...
Message Scheduling for the FlexRay Protocol: The Static Segment
Schmidt, Klaus Verner; Schmidt, Şenan Ece (Institute of Electrical and Electronics Engineers (IEEE), 2009-06-01)
In recent years, time-triggered communication protocols have been developed to support time-critical applications for in-vehicle communication. In this respect, the FlexRay protocol is likely to become the de facto standard. In this paper, we investigate the scheduling problem of periodic signals in the static segment of FlexRay. We identify and solve two subproblems and introduce associated performance metrics: 1) The signals have to be packed into equal-size messages to obey the restrictions of the FlexRa...
Speech recognition on mobile devices in noisy environments
Yurtcan, Yaser; Günel Kılıç, Banu (2018-05-05)
The use of speech recognition on mobile devices has been possible with the development of cloud systems and has been used for about 10 years. However, in noisy environments, the problem of speech recognition with low error rate still persists. In this study, different speech samples have been recorded using a compact microphone array in noisy environments and a data set has been created by processing them with a real-time noise cancellation algorithm. Speech recognition performance has been tested on the ge...
Energy efficient wireless unicast routing alternatives for machine-to-machine networks
Tekbiyik, Neyre; Uysal, Elif (Elsevier BV, 2011-09-01)
Machine-to-machine (M2M) communications is a new and rapidly developing technology for large-scale networking of devices without dependence on human interaction. Energy efficiency is one of the important design objectives for machine-to-machine network architectures that often contain multihop wireless subnetworks. Constructing energy-efficient routes for sending data through such networks is important not only for the longevity of the nodes which typically depend on battery energy, but also for achieving a...
Citation Formats
H. Dinçer, “CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS,” M.S. - Master of Science, Middle East Technical University, 2022.