0% found this document useful (0 votes)
5 views4 pages

A Secure Web-Based Android Chat Application Using The AES Encryption Algorithm

The document presents a secure web-based Android chat application utilizing the AES encryption algorithm to ensure secure communication among users. It highlights the importance of security in mobile chat systems due to increasing vulnerabilities and proposes a system that allows users to send and receive encrypted messages while managing multiple accounts. The application aims to enhance user experience by enabling features like message filtering and a favorites list for recipient IDs.

Uploaded by

abinash220304
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

A Secure Web-Based Android Chat Application Using The AES Encryption Algorithm

The document presents a secure web-based Android chat application utilizing the AES encryption algorithm to ensure secure communication among users. It highlights the importance of security in mobile chat systems due to increasing vulnerabilities and proposes a system that allows users to send and receive encrypted messages while managing multiple accounts. The application aims to enhance user experience by enabling features like message filtering and a favorites list for recipient IDs.

Uploaded by

abinash220304
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)

A Secure Web-Based Android Chat Application


Using The AES Encryption Algorithm
2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) | 979-8-3503-3086-1/23/$31.00 ©2023 IEEE | DOI: 10.1109/ICAC3N60023.2023.10541852

Vishwakarma Singh Janarthanan.S Ujjwal Kumar Roshan


Department of Computer Science and Department of Computer Science and Department of Computer Science and
Engineering Engineering Engineering
Galgotias University Galgotias University Galgotias University
Greater Noida, India Greater Noida, India Greater Noida, India
[email protected] [email protected] [email protected]

Nandan Vaid
Department of Computer Science
and Engineering
Galgotias University
Greater Noida, India
[email protected]

Abstract—The major goal is to create an android chat application anywhere in the earth can subscribe [3][4]. There is
that allows numerous users to communicate securely. This is a undeniable interest in security solutions given the growing
cutting-edge encryption and decryption system that targets SMS reliance on mobile chat systems on the one hand and the
for mobile Android users. The user has the ability to transmit growing number of security flaws and assaults on the other.
encrypted messages and decrypt encrypted messages. The System Additionally, there are certain additional security concerns
uses the SMS that are visible in your inbox, but it filters out the with wireless media that do not apply to wired systems. In this
encrypted SMS and displays them in your Personal Inbox in the way, various mobile chat system platforms demand very
Application. Only the user id, which is automatically encrypted secure Customers connect with one another through mobile
in the message, has to be entered because the Shared Private Key
chat services, which may also be used to send personal
is already established in the application. Therefore, anytime a
user sends a message, he or she should be aware of the recipient's
information. Such communications' security and protection
ID since it is added to the message so that, if the intended should be given consideration. However, recent scenes of
recipient logs in, the messageis already decrypted. The recipient's helplessness in the major chat services show that they won't be
id may only be saved in a separate column marked "Favorites" fully implementing security and protection features [5].
and contains the recipient's id, name, and mobile number. The id The most important security services to be taken into
is automatically created and cannot be modified. Given that a account in secure applications and frameworks nowadays are
single user may have many accounts, logging in is required here’s
Data Confidentiality, Authentication, Integrity, Non-
with different ids so that he can maintain each account for
repudiation, Access control, and Availability. However, the
various reasons without combining them. The communications
are encrypted and decrypted by this system using the AES mobile chat platforms do not have a plan for such security
encryption algorithm. The front end of this app is Android services. Customers and servers of mobile chat systems are
Studio, while the back end is SQLite. equally unprotected against passive and aggressive assaults.
Passive risks include message content arrival and traffic
Keywords—recipient; chat; security; cryptography; AES inspection, whereas active risks include message content
encryption, confidentiality
modification, masquerade, replay, and denial of service (DoS).
I. INTRODUCTION In actuality, all of the concerns listed apply to mobile chat
interactions [6]. Different flexible apps' security and
With 19 billion messages exchanged daily, the mobile protection- saving features have come under scrutiny.
instant messaging apps have surpassed the Short Message Different mobile chat programmes provide a variety of
Service (SMS) run by cellular network companies in usage.in security and protection features, but there are not many mobile
comparison to the over 17 billion SMS texts [1][2]. Later, chat applications that offer their users End-to-End encryption
instant messaging will become increasingly important. services security [7].
Business domains—commonly referred to as m commerce,
mobile banking, administrative usage, and everyday use—and II. LITERATURE SURVEY
life communication Additionally, instant messaging became a Ekta Agrawal and colleagues 2019 [8] In order to create
well-known wireless service throughout the globe as it invites the symmetric approach, which focuses enhancing the
clients to communicate with them via any mobile phone

ISBN: 979-8-3503-3086-1/23/$31.00©2023 IEEE 1329


Authorized licensed use limited to: Zhejiang University. Downloaded on February 11,2025 at 16:52:19 UTC from IEEE Xplore. Restrictions apply.
2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)

traditional way of encryption by utilizing a substitution its introduction, the RSA calculation has been employed
cypher, this work supports the use of the 8-bit code value of and is the basis for several advanced encryption computations
the alphabet and executes certain straightforward that use 1024 bit encryption to convey the messages.
computations like logical NOT and basic binary division. The
alphabet has been utilized in substitution methods for TM Zaw and others (2019) [12] In this study, the author
ciphertext. The raw text is initially translated into the suggested a method for ensuring secrecy by combining AES
matching ASCII code value for each letter in this symmetric and ECC encryption with the six forms of element-level
procedure. It makes use of a number of symmetric key encryption. This method is applied to more reliably save and
algorithms, including DES, RC2, RC4, and IDEA, to depict retrieve database data. A 256-bit key encrypted using ECC
various techniques in depth before introducing a brand-new offers the same level of availability, validity, and secrecy as a
symmetric key algorithm for encryption and decryption. Using 3072-bit key encrypted with RSA. The author employs 256-bit
encryption methods, short message communications may be AES encryption for rows-level, column-level, and element-
transmitted using this approach safely. level encryption for each element key in the database, which
offers a good, effective, and efficient way to prevent
(2013) [9] Kuldeep Chouhan et al. The primary goal of the unauthorized users from accessing the sensitive data in the
mandated paper is to include an acceptable encryption method database.
into the chat area interface (CAI). Because it sends a brief and
secure conversation message, a chaotic was picked. It is Sreedhar C. Iyer and others (2020) [13][14] In order to
discovered that chat encryption in this system prohibits a provide a far more reliable and quick method of video
message from an unauthorized individual from being seen or encryption, the author has presented a hybrid strategy that
modified. Through the use of chaotic encryption, CAI has combines both symmetric and asymmetric algorithms. This
improved in terms of security and dependability. It uses system divides the video file into several sets of frames and
public-key encryption to deliver secure chat messages over the uses symmetric cyphers to apply the algorithm to each frame
internet, executing SEC provides an opportunity to utilise the for both encryption and decryption. While bit conversion uses
software design abilities to construct a secure chat server. In AES 128 bit keys, video conversion uses ECC 160 bit keys.
order to establish a highly protected conversation, it The Peak Signal to Noise Ratio (PSNR), which graphically
implements a novel structural architecture for encrypting contrasts grey- level video streams, is used to produce these
keys. The Mean Square Error (MSE), which depicts lossless
databases in networks and illustrates the security aspects that
should be used. decryption by obtaining the AES symmetric key, is used to
calculate PSNR.
A.H. Ali and others (2019) [10] The goal of the project is
to secure messaging services for Android- powered devices A. Existing System
with end-to-end encryption. Public-key cryptography is • The current online marketplaces where products and
employed. Elliptic Curve Diffie Hellman Key Exchange prices are exchanged and sold at auction. For instance,
(ECDH), an asymmetric technique used to encrypt data, was traders4acause.org
utilized by the system to construct the key pair and exchange it • These websites don't provide customers with the
in order to create the shared key. Users of the programme may gratification they expect.
communicate by sending each other text messages, audio
messages, and photos. The AES standard technique with a • The system doesn't provide a conventional means of
128-bit key is used to encrypt text messages for security. the bargain the product in online mode to haggle the
Users may rest easy knowing that nobody can read their price of anything. • Some websites sell product
communications, not even the service provider. Nothing is duplication and other faulty items, deterring buyers
saved in the phone's physical memory; all shared data is solely from acquiring goods online.
stored on the server. Text messages are encrypted using the
AES standard to increase security, while voice and B. Implications Of The CurrentSystem
image communications are encrypted using the RC4 algorithm • They forbid product adjustments, discourage even
since it is one of the quickest methods for encrypting huge minor ones, and don't take price haggling into account.
volumes of data. • Some e-commerce websites lose clients because they
Shubhankar Chaudhary and associates (2020) [11] In this can't meet their wants and specifications.
system, RSA encryption is used to provide a communication • Difficulties in meeting consumer demands since
channel between the Client/Server environment. RSA consumers may have varying opinions about various
cryptosystem developed a secure messaging transmission products.
system that employs this method. In this study, client-to-client
communication is secured using client/server architecture • They don't account for price bargaining, ban product
without letting the server decipher the message. In this case, a modifications, discourage even small ones.
first layer of encryption is utilized between clients and the
• Some e-commerce websites lose customers because
server, and a second layer is used between clients in the chat
they are unable to satisfy their needs and requirements.
room. Since
• Difficulties in addressing customer requests given that
consumers' opinions on diverse items may differ.

1330

Authorized licensed use limited to: Zhejiang University. Downloaded on February 11,2025 at 16:52:19 UTC from IEEE Xplore. Restrictions apply.
2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)

III. THE PROPOSED SYSTEM option of choosing a profile photo. The user list presently
Before By assembling a team of advisors that will serve as registered with the system is available after logging into the
our website's representatives and be able to negotiate pricing chat application. The user has the option to see if they are
that will please clients using chat applications, we minimize online or not. The user can send a message after choosing the
the cost of the product. By using the command box, clients individual with whom they wish to interact.
may input their specifications and have products edited or B. Methodology And Implementation
adjusted to their specifications. Our website has a feature
a) System Tools
named "Design Page" where consumers may post their ideas
as an inventive concept. By uploading the necessary goods, Neat beans have been employed as a testing ground.
which will be shared with or supplied to the designer, these Languages for programming and scripting included Java, JSP,
designs will be chosen and put into practice. and HTML. A database management system has been
implemented using MySql. The localhost uses the WAMP and
Apache Tomcat servers. Additionally, CSS is utilized as a
scripting language for look and layout.
b) key encryption and decryption
Decryption in public key encryption, also known as public
key uses a one-way problem-based algorithm. While the
private key decrypts the ciphertext, the public key encrypts the
plain text based on asymmetric key techniques, where the
message can only be decrypted by the receiver holding the
private key; other recipients are unable to do so. The main
advantage of this technique is that the sender is not required to
manually transfer the symmetric key over a risky connection.

Fig. 1. System Architecture

A. Architecture of Bargaining Chat system (BCS)


The transmitter and receiver are the two components that
make up the BCS architecture. To access the chat system, the
sender must first log in using its current email address and
password. If a person is not already registered, they may do so
by entering their name, email address, and password in order
to establish a new account. The user has the

Fig. 3. Secure Chat Process

IV. CONCLUSION
In this study, we introduce a novel method for recognizing
shifting customer needs in the e- commerce sector that are
more challenging to meet with current products that offer less
satisfaction, and for bargaining with consumers as a result.
Fig. 2. Chat area interface application The demands of each user who has registered with this can
submit their own design, which is displayed to the user and the
administrator. It takes less time and money to assess their

1331

Authorized licensed use limited to: Zhejiang University. Downloaded on February 11,2025 at 16:52:19 UTC from IEEE Xplore. Restrictions apply.
2023 5th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)

appeal to the buyer and vendor. By using this tactic, the buyer [8] S. Kumar, M. Girimondo, A. Weimerskirch, C. Paar, A. Patel, and A. S.
will receive their less time to use and is simple. The buyer was Wander, “Embedded End- to-End Wireless Security with ECDH Key
Exchange”, 2003 46th Midwest Symposium on Circuits and Systems.
happy to purchase a good while making their own demands
[9] S. Kumar, M. Girimondo, A. Weimerskirch, C. Paar, A. Patel, and A. S.
known through haggling. The customer's own design can be Wander, “Embedded End- to-End Wireless Security with ECDH Key
uploaded and listed in the marketplace. Customers may haggle Exchange”, 2003 46th Midwest Symposium on Circuits and Systems
with sellers by conversing with them. Using cryptography [10] S. Kumar, M. Girimondo, A. Weimerskirch, C. Paar, A. Patel, and A. S.
methods like AES, which use asymmetric cryptography and Wander, “Embedded End- to-End Wireless Security with ECDH Key
can be used to authenticate the sender and receiver by both Exchange”, 2003 46th Midwest Symposium on Circuits and Systems.
agreeing on a key from symmetric encryption, the chat list of [11] Suchita Tayde and Seema Siledar. “File Encryption, Decryption Using
the user and seller has been encrypted with authorization. AES Algorithm in Android Phone”, International Journal of Advanced
[12] Research in Computer Science and Software Engineering, Vol. 5(5), pp.
550-554, 2015.
William Stallings, “Cryptography and Network Security: Principles and
REFERENCES Practice”, Prentice Hall, Boston, Koblitz, N.. Elliptic curve
[1] Li Zhang, Chao Xu, Parth H. Pathak, and Prasant Mohapatra, cryptosystems. Mathematics of Computation 1987;48(177):203– 209.
“Characterizing Instant Messaging Apps on Smartphones”, Passive and Statista, . Market share of mobile operating systems in indonesia from
Active Measurement Lecture Notes in Computer Science, pp. 83-95, january 2012 to december 2017. 2018.
2015.
[2] Medani1, A. Gani1, O. Zakaria, A. A. Zaidan, and B. B. Zaidan,
“Review of mobile short message service security issues and techniques
towards the solution”, Scientific Research and Essays Vol. 6(6), pp.
1148- 1165, March 2011.
[3] Hsing-Chung Chen, Jyh-Horng Wen and Cheng- Ying Yang, “A Secure
End-to-End Mobile Chat Scheme”, Ninth International Conference on
Broadband and Wireless Computing, Communication and Applications,
2014
[4] Raja Naeem Akram, and Ryan K. L. Ko. “End- to-End Secure and
Privacy Preserving Mobile Chat Application”, Information Security
Theory and Practice. Securing the Internet of Things Lecture Notes in
Computer Science, pp.124-139, 2014.
[5] Ali Makki Sagheer, Ayoob Abdulmunem Abdulhameed and Mohammed
Adeeb AbdulJabbar, “SMS Security for Smartphone”, Sixth
International Conference on Developments in eSystems Engineering,
2013.
[6] H.C. Chen and A.L.V. Epa, “A Rotation Session KeyBased
Transposition Cryptosystem Scheme Applied to Mobile Text Chatting”,
Proceedings of The 28th IEEE International Conference on Advanced
Information Networking and Applications (AINA2014), pp. 497 - 503,
Victoria, Canada.
[7] Pejman Dashtinejad,” Security System for Mobile Messaging
Applications “, Thesis, KTH University, Jan 2015.

1332

Authorized licensed use limited to: Zhejiang University. Downloaded on February 11,2025 at 16:52:19 UTC from IEEE Xplore. Restrictions apply.

You might also like