MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION

Page 1

MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION

Abstract: Theinvolvementofgenerationinourexistence makes it more boost and affords get right of entry to our fingertip.Itprovidesuswiththecapabilitytogetconnected withhumanbeingsanddiscoverthedataonthetopicswhich couldbeveryusefulfortheeaseofexistence.Henceourlives are dependent on numerous mobile chatting applications which offer exclusive protection to user and chatting informationbutleadstoboominvulnerabilitiesandthreat of attack on facts. As in sensitive enterprise and prison conversation records safety is maximum important for stoppingfromundesirablehackingactivities.Toovercome thisformofstateofaffairs,it'smilesproposedanencrypted messaging protocol for secure conversation. Inside the International messaging, there is lots of encrypted messagingapplications,howeverallthosearebasedtotally onasoftwaregeneratedencryptionkeyinconjunctionwith SQLite database which is used to keep the message of respective customers which are now not comfy and the messagesofanyconsumercanbeobtainedbya3rd party. TheproposedsoftwareusedtheEllipticCurveDiffieHellman Keychange(ECDH)setofrulestogeneratetheimportant thingpairandalternatetosupplythesharedkeytobeable to be used for the encryption of statistics by symmetric algorithms.Theproposedutilityletsinthecustomerstotalk viatextualcontentmessages,voicemessagesandsnapshots. ForthetextmessageprotectionthesameoldAESalgorithm with a 128 bit key are used. The generated key (160 bit) minimizedto128bitperiodviadecidingontheprimary128 littlebitofthegeneratedkeyinordertobeusedbytheAES setofrules.Forthevoiceandphotoprotectionprocedures theproposedutilityusedthesymmetricsetofrulesRC4for thispurpose.

Keyword: Android, Chatting Application, ECDH (Elliptic Curve Diffie Hellman Key Exchange), AES (Advanced Encryption Standard), RC4 (Rivest Cipher 4).

I. INTRODUCTION

Themobileimmediatelymessageapplicationshavebeaten the fast Message service (SMS) operated through cell networkproviders,with19billionmessagesdespatchedfor eachdaycontrastedandextrathan17billionSMSmessages immediatemessagewillanticipateancrucialcomponentina while enterprise territories, which might be prevalently knownasmobiletrade,mobilebanking,administrativeuse, and everyday life correspondence. moreover, instant messagehasbecomeawell knownwi fiprovideralloverthe world as it encourages a purchaser to keep up a correspondence with any cellular smartphone subscriber

whereveronearth.Withtheincreasinglymoredeveloping dependence on cell chat gadget in a single hand, and the growing number of vulnerabilities and attacks however, theremaybeanundeniablyhobbyforthesafetysolutions. Therearelikewisesomeextraprotectiontroublesinsidethe wi fimediathatarenotthescenarioinastressedframework in this way, awesome secure protocols are required for collectionmobilechatgadgetplatformsclientsutilizeacell chatservicetocommunicatewitheachother,amannerthat couldincorporaterelayingindividualfacts.Thesecurityand safety of such communications ought to be considered important. Anyways, past due scenes of powerlessness insidetheenormouschatofferingsfindthattheywon'tbe robustlyactualizingprotectionandsafetyhighlights.Thelate years, statistics Confidentiality, Authentication, Integrity, Nonrepudiation, get right of entry to manipulate, and Availabilityarethemostimperativesafetyofferingsinthe securitystandardsthatmustbeconsideredincomfortable programs and frameworks. However, there may be no associationforsuchprotectionofferingsinthecellularchat structures. each mobile chat system client and cell chat system server are defence against each passive and lively attacks. Passive risks be a part of arrival of message substance, and visitors examination whilst active risks consolidateadjustmentofmessagesubstance,masquerade, replay,anddenialofprovider(DoS)realitybeadvised,allof the designated risks are appropriate to the cell chatting communicationsthesecurityandprotectionsavingadditives ofdistinctversatileapplicationshavelonggoneunderthe highlight.Therearediversesafetyandprotectionhighlights givenbydifferentcellchatprograms,yettherearen'tvery many transportable talk packages that provide a stop to stopencryptionadministrationssafetytotheircustomers

II. LITERATURE SURVEY

Righthereforourmissionwe'vecarriedoutmanystudies paperanumberofthemaregivenbeneath:

EncryptionsoftwaretheusageofCeasarCipherandVigner Cipher which was published on IEEE in 2016 It became posted by means of Ferri Fahrianto, Siti ummi Mashruroh Thereproposedpaintingschangedintototestwhichofthe following algorithms paintings satisfactory for safety in androidapplicationandthattheyobservedthattoenhance records safety by means of encrypting the text by way of merging the two encryption technique which are ceasar cipherandvignercipher.[1]

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page152
Mr. Anas Dange1 , Mr. Danish Memon2 , Mr. Avinash Sahu3, Mr. Brijesh Menon4, Mr. Gaurav Datt5 1,2,3,4,5Department of Computer Engineering Universal College of Engineering Vasai, India ***

Implementation software internal Chat Messenger using AndroidgadgetwhichturnedintopostedonIEEEin2017 with the aid of Robi Sanjaya Abba Suganda Girsang their proposedworkbecometoanalysesystemrequirementand personrequirementtomakethemessengergreaterfeasible and user pleasant and they founded that Its basically approximately how api works in android running device howonthespotmessaging worksandthewayprototype model

Androidworks.[2]Forensics

analysis: Non public Chat on Social MessengerwhichbecamepublishedonIEEEin2016byway of G. B. SatryaP. T. Daelyd S.Y. Shin.Their proposed work changed into to find what are the distinction among the publicandprivatechatutilityandtheirfindings.Todiscover difference between private chat and normal chat and the wayit'sfarveryeffective.[3]

Group based totally conversation in WhatsApp which changed into published on IEEE in 2019 with the aid of Michael Seufer Tobias Hobfeld. Their proposed work changed into discover how the organization chats and messaging works and their finding changed into how the mediaissharedinsidethegroupsandwhichtypefrecords base is used to store the messages and how can we make thatrecordsbasecomfortable.[4]

Green records security for cellular immediate messenger whichturnedintopublished onIEEEin2018 bymeansof RitawondaHougIJie.Theirproposedpaintingsbecameto check whether the approach produce green time in authentication and encrypt method while applying in applicationandtheirfindingchangedintohowthestorage isuueissolvedinlatestandmaximumpopularchatappand whatfeaturesthechatapphavetoincorporate.[5]

Exploringuser’sbeliefofstoragecontrolcapabilitiesinon the spot Messaging applications: A Case on WhatsApp Messenger become posted on IEEE in 2019 by Mashael M.AlsulamiandArwaYAlAaama.TheirProposedpaintings changed into To cure the problem of garage control and protectionmanagementofthepersonineffectivewayand theirlocatingchangedintohowthegarageisuueissolvedin recentandmaximumfamouschatappandwhatfunctions thechatappshouldincorporate.[7]

III. SECURITY AND PRIVACY CHAT APPLICATION

Before we present the info of the proposed structure for mobile chat applications, this phase provides a brief requirementsthatthesortofideaneedtomeet:

Req1:Thesign upsystem must requireminimumrecords associated with the consumer. The account introduction procedureneedtonolongerdependcloselyonnon public identificationrecords(PII).

Req2:Theimportantthingtrademannermustberelaxed, seamlessandaido linechat.

Req3: properotReq5:theReq4:requireEncryption/decryptionofmessagesoughttonolongeruserinteraction(i.e.leastinterplay).Comfyonemessagescanbecommunicatedsecurelyatsideofpotentialkeyshare.Customershaveamechanismtoauthenticateeveryher,assuringthemselvestheyarespeakingwiththecharacter

Req6:Communicationsaren'tsavedonthechatserver.One’s chatisstoredonuser’scell.

Req7:Nearbychatstoragemustbeappropriatelycovered. Req8:Toprotecttheprivatenessofthecustomersandtheir chat,themessage serveroughttonownotbeabletoretrieve themessages.

IV. MESSAGE COMMUNICATION

On this segment, we talk how character messages are constructed and the way shared grasp secrets used to generatemessagekeys.The keysarethenusedtoencrypt and decrypt the messages. every message send by using character customers is encrypted with the aid of a key, generated the usage of the shared grasp key and four random numbers. To generate message keys, we use the ofthemessagesharedgeneration(four)PseudorandomvarietyGenerator(PRNG)design.Thesharedrandomnumbersaretakenastheseedle:foreacharandomwidevariety(n)isencryptedusingthemasterkey.Theoutputisusedbecauseofthekey.Theoutputisoncemoreencryptedtheuseofsharedmasterkey,theoutputisXORwithn.TheoutputtheXORoperationthenreplacesthefeeofninsideit.

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page153

V. PROPOSED ProposedEncryptionMethod

2. TheoryofourEncryption

InourprojectwearebasicallyusingtheAESalgorithm because it’s the one of the most powerful encryption algorithm.Wearetryingtoovercomeoneofthedrawbackof thepresentAESalgorithmthatItalwaysencryptthemessage in a same way. Now here we are trying to overcome this drawbackandmakethisAlgorithmmorestrong.Nowletus considerthereare2usersthatisuserAandUserBBoththe users will be having their unique id now when the user A wantstosendthemessagetouserBandthemessagesended bytheuserAwilltriggertotheAESalgorithmintheformof SecretkeyNowthenitwillbepassedtotheservernowthe serverwillcheckwhethertheUserBisonlineornot.[1]

IftheuserBisonlinetheserverwillSendtheCiphertext thatisthesecretkeytotheuserBanditwillbestoreinthe localDatabasenowletusconsiderthattheuserBisoffline NowthismessagewillbestoreintheDatabaseDBSeverwill trytocontacttheuserBWhenevertheuserBcomesonlineit willbeconnecttotheuserandtheserverwillcontacttothe databasewherethemessageforuserBisStoredinEncrypted formthenitwillgiveittoUserBandthemessageintheform OfCiphertextwill bestoreinthelocal databaseThenThe user B will Able to Decrypt this message with the help of SecretkeyafterthatthemessagewillbePassedThroughAES algorithmForDecryptionAndtheUserBwillAbletoseethe

discussabouthowSecretkeyisgenerated: ConsidertheaboveexamplethatsupposethereAre2Users thatisAandBnowuserAwantstomessageuserBWhenthe userAclicksontheSendbuttonwewilltriggertheDateand TimeofThatinstantusingsomefunctionnowUserAandB havetheiruniqueidrespectivelynowwewilltaketimeand

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page154
SYSTEM 1.
message.[2]Herewewill

theuniqueidofuserAandthenconvertthisintotheHash codeThiswillbeourSecretkeywhichwillbeusedtoencrypt and Decrypt The message Through out. Here We are consideringthevariantparameterstoprotectthemessage fromtheThirdParty.Timewhichwillbealwaysdifferentfor different messages. Like we can use Ip address which is differentfordifferentdevices.[3]

VI. PROPOSED ALGORITHM

Message(“Hi”)+send.button=>Secret_key=hash(Date + Mesaage//apiAES//messageuser2.UID);ecn.(message,secret)Data={:encrypt_message;Date:date //user}DBData.save() //generationofsecretkeySecret_key =hash(Date+user2.UID);

VII. MAIN CHAT SCREEN

In this part the user can see the another user in our chat screen. whenever the user click on another user profile he/she can see the chat UI where the user can send the messageandreceivethemessage.

Usercanmakeanaccountbyaddinghis/hermobilenoand can click on verify then the OTP will be generated that is knownasTwofactorauthentication.[4]

VIII. CONCLUSION

Inthispaper,wesuppliedanopenspecificationforacomfy and privacy maintaining chat service. We defined the fundamental necessities, structure and implementation reveal in in deploying this kind of service. The aim of the paper is to broaden cell chat offerings and discover any ability complexities worried in this type of service presenting privateness protection to its clients. In these papers, we explored the theoretical foundations and technical challenges confronted if privacy safety is

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page155

constructedintoachatservice.Wefoundthatmaximumof the theoretical and technical components are already available. With a few minor changes, a strongly privacy basedchatprovidercanbeconstructed.We'veproventhata securedandprivacy preservingchatsoftwareistechnically feasible. In the course of the implementation of the framework, we did no longer face any severe issues regardingthegenerationorperformancethatwouldmake thisthoughtinfeasible.Whetherit'sfarafeasibleenterprise its a distinctive aspect of this sort of provider. In destiny research, we would love to test with the scalability and performance of the chat server: this might screen a few bottlenecks in building and preserving a privateness primarilybasedchatserver.Someotherpotentialfactoris investigationofthewaythetextchatcarrierproposedinthis papercouldbeextendedtoavoiceandvideochatcarrier. Thedemandingsituationssuppliedinofferingasecureand privacy preserving voice and/or video chat carrier is probablyextrathanthosepre sendedbyatextualcontent primarilybasedchatcarrier.Thiswilldeliveramuchbetter insightintothedevelopmentofsecureandprivacy keeping services,theirchargesandusabilitynecessities,supplying andpossibilitytounderstandtheunderlyingreasonswhy suchofferingsarenolongerregularlyoccurringorwidely adoptedbytheusers.

IX. REFERENCES

[1] Ferri Fahrianto, Siti ummi Masruroh. “Encryption Application using Ceaser Cipher and Vigener Cipher”,2016.

[2] Robi Sanjaya, Abba Suganda Girsang. “ImplementationApplicationInternalChatMessengerUsing AndroidSystem”,2017

[3] G.B.Satrya, P.T.Daely d S.Y.Shin. “Android ForensicsAnalysis:PrivateChatonSocialMessenger”,2016

[4]MichaelSeufert,TobiasHobfeld.“Group Based CommunicationinWhatsApp”,2018

[5]RitaWonda,HougIJie.“EfficientDataSecurity ForMobileInstantMessenger”,2018.

[6] Mashael M.Alsulami, Arwa Y. Al Aama. “Exploring user’s Perception of Storage Management FeaturesinInstantMessaging Applications”:ACaseon WhatsAppMessenger.

International Research Journal of Engineering and Technology (IRJET) e ISSN: 2395 0056 Volume: 09 Issue: 04 | Apr 2022 www.irjet.net p ISSN: 2395 0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page156

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.