Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS
Download
CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS.pdf
Date
2022-8-22
Author
Dinçer, Hilal
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
278
views
195
downloads
Cite This
Instant messaging applications have replaced classical messaging in recent years. The fact that instant messaging applications transmit messages over the internet, therefore, being free and fast, played a major role in this rise. However, being internet-based has brought disadvantages as well as advantages. There are risks such as obtaining the message, changing the message, etc. by third parties. To avoid these risks, messages are encrypted, the sender is authenticated and their integrity is shown. However, with the developing quantum technology, it turned out that these algorithms will be broken in the near future. Now, studies are being made to make these algorithms resistant to post-quantum. In this thesis study, the key generation, key exchange, and encryption mechanisms used by the Signal Protocol in one-to-one communications, which is one of the most secure systems, are explained in detail. It is explained how open source Linphone, Xabber, Wire, and Element applications developed on the basis of Signal Protocol use Signal Protocol. In addition, in this thesis, the parameters used by Signal and Wire applications, but not specified in their documents, were obtained from open sources and added. Finally, the methods used to make the Signal Protocol quantum resistant are presented.
Subject Keywords
Cryptography, Cryptographic protocols, Signal, Double Ratchet, Protocols of Instant Messaging Applications, Key Exchange, Encryption, Post-quantum, Quantum
URI
https://hdl.handle.net/11511/98791
Collections
Graduate School of Applied Mathematics, Thesis
Suggestions
OpenMETU
Core
BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications
Ozcan, Ahmet Talha; Gemicioglu, Can; Onarlioglu, Kaan; Weissbacher, Michael; Mulliner, Collin; Robertson, William; Kirda, Engin (2015-01-30)
Internet-based mobile messaging applications have become a ubiquitous means of communication, and have quickly gained popularity over cellular short messages (SMS). Unfortunately, from a security point of view, free messaging services do not guarantee the privacy of users. For example, free messaging providers can record and store exchanged messages indefinitely to collect information about specific users. Moreover, these messages can be accessed by criminals who gain access to social media accounts. In thi...
Data Delivery in Wireless Multimedia Sensor Networks: Challenging and Defying in the IoT Era
Al-Turjman, Fadi; Radwan, Ayman (2017-10-01)
The vision of wireless multimedia sensor networks (WMSNs) nowadays is to afford real-time multimedia applications using the pervasive wireless sensors around us. This necessitates strict QoS conditions, which have led to new emerging challenges in terms of data delivery in the Internet of Things era. Accordingly, multipath routing protocols with multi-constraints are recommended in WMSNs. In this article, a comprehensive overview of both best effort and real-time multipath routing protocols for WMSNs is per...
Message Scheduling for the FlexRay Protocol: The Static Segment
Schmidt, Klaus Verner; Schmidt, Şenan Ece (Institute of Electrical and Electronics Engineers (IEEE), 2009-06-01)
In recent years, time-triggered communication protocols have been developed to support time-critical applications for in-vehicle communication. In this respect, the FlexRay protocol is likely to become the de facto standard. In this paper, we investigate the scheduling problem of periodic signals in the static segment of FlexRay. We identify and solve two subproblems and introduce associated performance metrics: 1) The signals have to be packed into equal-size messages to obey the restrictions of the FlexRa...
Speech recognition on mobile devices in noisy environments
Yurtcan, Yaser; Günel Kılıç, Banu (2018-05-05)
The use of speech recognition on mobile devices has been possible with the development of cloud systems and has been used for about 10 years. However, in noisy environments, the problem of speech recognition with low error rate still persists. In this study, different speech samples have been recorded using a compact microphone array in noisy environments and a data set has been created by processing them with a real-time noise cancellation algorithm. Speech recognition performance has been tested on the ge...
Energy efficient wireless unicast routing alternatives for machine-to-machine networks
Tekbiyik, Neyre; Uysal, Elif (Elsevier BV, 2011-09-01)
Machine-to-machine (M2M) communications is a new and rapidly developing technology for large-scale networking of devices without dependence on human interaction. Energy efficiency is one of the important design objectives for machine-to-machine network architectures that often contain multihop wireless subnetworks. Constructing energy-efficient routes for sending data through such networks is important not only for the longevity of the nodes which typically depend on battery energy, but also for achieving a...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
H. Dinçer, “CRYPTOGRAPHIC PROTOCOLS OF SIGNAL AND SIGNAL BASED INSTANT MESSAGING APPLICATIONS,” M.S. - Master of Science, Middle East Technical University, 2022.