Securing Instant Messages With Hardware-Based Cryptography and Authentication in Browser Extension

被引:0
作者
Pimenta Rodrigues, Gabriel Arquelau [1 ]
De Oliveira Albuquerque, Robson [1 ]
De Oliveira Alves, Gabriel [1 ]
Lopes De Mendonca, Fabio Lucio [1 ]
Ferreira Giozza, William [1 ]
Timoteo De Sousa Jr, Rafael [1 ]
Sandoval Orozco, Ana Lucila [1 ,2 ]
机构
[1] Univ Brasilia UnB, Technol Coll, Cybersecur INCT Unit 6, Elect Engn Dept ENE,Decis Technol Lab LATITUDE, BR-70910900 Brasilia, DF, Brazil
[2] Univ Complutense Madrid, Fac Comp Sci & Engn, Dept Software Engn & Artificial Intelligence DISI, GASS, Madrid 28040, Spain
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Instant messaging; Encryption; Authentication; Browsers; Computer architecture; Cryptography; authentication; instant messaging security; XMPP; browser extension;
D O I
10.1109/ACCESS.2020.2993774
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Instant Messaging (IM) provides near-real-time communication between users, which has shown to be a valuable tool for internal communication in companies and for general-purpose interaction among people. IM systems and supporting protocols, however, must consider security aspects to guarantee the messages' authenticity, confidentiality, and integrity. In this paper, we present a solution for integrating hardware-based public key cryptography into Converse.js, an open-source IM client for browsers enabled with the Extensible Messaging and Presence Protocol (XMPP). The proposal is developed as a plugin for Converse.js, thus overriding the original functions of the client; and a browser extension that is triggered by the plugin and is responsible for calling the encryption and decryption services for each sent and received message. This integrated artifact allowed the experimental validation of the proposal providing authenticity of IM users with digital certificates and protection of IM messages with hardware-based cryptography. Results also shows the proposed systems is resistent to adversarial attacks against confidentiality and integrity and it is secure when considering cryptrographic tests like the Hamming distance and the NIST SP800-22.
引用
收藏
页码:95137 / 95152
页数:16
相关论文
共 57 条
[1]   An Android-based Trojan Spyware to Study the NotificationListener Service Vulnerability [J].
Abualola, Huda ;
Alhawai, Hessa ;
Kadadha, Maha ;
Otrok, Hadi ;
Mourad, Azzam .
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 :465-471
[2]  
Andre P. S., 2011, 6120 RFC
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], 2011, 6202 RFC
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], [No title captured]
[8]  
[Anonymous], [No title captured]
[9]  
[Anonymous], [No title captured]
[10]  
[Anonymous], [No title captured]