Pregled bibliografske jedinice broj: 1165483
Securing Communication in Chatter Application
Securing Communication in Chatter Application // Proceedings of the 32nd International DAAAM Virtual Symposium "Intelligent Manufacturing & Automation", 32(1) / Katalinić, Branko (ur.).
Beč: DAAAM International Vienna, 2021. str. 90-97 doi:10.2507/32nd.daaam.proceedings.013 (poster, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
CROSBI ID: 1165483 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Securing Communication in Chatter Application
Autori
Morić, Zlatan ; Pinjuh, Jure ; Kurelić, Sanjin
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni
Izvornik
Proceedings of the 32nd International DAAAM Virtual Symposium "Intelligent Manufacturing & Automation", 32(1)
/ Katalinić, Branko - Beč : DAAAM International Vienna, 2021, 90-97
ISBN
978-3-902734-33-4
Skup
32nd DAAAM International Symposium
Mjesto i datum
Beč, Austrija; online, 28.10.2021. - 29.10.2021
Vrsta sudjelovanja
Poster
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
secure message exchange ; substitution cipher ; asymmetric algorithm ; hash ; man-in-the-middle attack
Sažetak
Chatter is an Angular web application that offers registered users' ability to chat with other registered users. Users can chat with multiple users in a secure fashion. The main problem in designing a good backend for the Chatter application is dealing with message exchange security. In this paper, we will present a few security protocols and suggestions for exchanging secure messages. From single substitution ciphers (Caesar and Atbash) and multi-alphabet substitution ciphers (Vigenère and Playfair) to more complex like symmetric (XOR stream cipher and DES block ciphers) and asymmetric algorithms (using private and public key mechanisms with Diffie-Hellman key exchange and RSA algorithm with hash functions - SHA). We will present the pros and cons of using each algorithm by using man-in- the-middle attack and choose a secure asymmetric algorithm as the main security for exchanging messages at the end.
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo, Informacijske i komunikacijske znanosti
Citiraj ovu publikaciju:
Časopis indeksira:
- Scopus