|Paper title:||Towards Preserving the Confidentiality of Information in a Local Area Network (LAN) Messaging System|
|Published in:||Issue 1, (Vol. 7) / 2013Download|
|Author(s):||THOMPSON Aderonke Favour-Bethy , IYARE Otasowie, ALESE Boniface Kayode|
|Abstract.||Messaging system remains preeminent as the medium of official communication. The fear of confidentiality being breached has led many organizations in developing various ways in checking the excesses of unwanted users. In the messaging system designed, users are allowed to send and receive messages with the options of either encrypting the data or not. The Substitution Permutation Network (SPN), an AES encryption algorithm, implemented in the messaging system makes information sent over the network 'useless' when compromised so as to reduce the damage done whenever sensitive and classified information gets to the wrong hands. The application was implemented and tested and was found to be effective|
|Keywords:||Messaging System, Encryption, SPN, LAN|
1. EDL. Educause Learning Initiative, “7 Things You Should Know About Instant Messaging”, A Technical report by Educause Learning Initiative, retrieved from http://www.educause.edu/ELI/7ThingsYouShouldKnowA boutInsta/156811, 2005.
2. S.S. Azoum, “Secure Real-Time Conversations”, M.Sc Thesis work at College of Arts and Sciences, Florida State University, USA, 2008.
3. J.A. Pirani, and M. C.Sheehan, "Spreading the Word: Messaging and Communications in Higher Education-Key Findings" (Key Findings). Boulder, CO: EDUCAUSE Center for Applied Research, available from http://www.educause.edu/ecar, 2009.
4. K. Komathy, P.Vivekanadan and V. Ramanchandran, “Data Security Model for XML using Advanced Encryption Standard” in the proceedings of SCI, Orlando, USA, July 2002, Vol-IV.
5. B. Scheneir, J. Kelsey, D. Whiting, C. Wagner, N. Ferguson, “Performance Comparison of AES Submission” Retrieved from http://www.schneier.com/paper-aesperformance.pdf, 1999. 6. L. Hathaway, “National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information”, Retrieved from http://www.cnss.gov/Assets/pdf/cnssp_15_fs.pdf, 2003.
7. Mohd Zaid W., Mohd Zulkilli, “Evolution of Cryptography”, Retrieved from http://idazuwaika.files.wordpress.com/2008/06/evolution_ of_cryptorgarphy.pdf, 2007.
8. M. Slaveiro, “Symmetric Encryption” Retrieved from http://www.simple-talk.com/author/matteo-slaviero, 2010.
9. S. Bunn, “Data Encryption”, A POSTNOTE article of October 2001, volume 270, available at http://www.parliament.uk/documents/post/postpn270.pdf.
10. H.E. Khulood, B. M. A. Ibtehaj, M. I. M. Raed, “Design of a Practical Substitution Permutation Network Cryptosystem”, Journal of Al-Aqsa University, 10 (S.E), 2006, pp 462-475.
|Back to the journal content|
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.