Paper title: Towards Preserving the Confidentiality of Information in a Local Area Network (LAN) Messaging System
Published in: Issue 1, (Vol. 7) / 2013Download
Publishing date: 2013-04-16
Pages: 27-33
Author(s): THOMPSON Aderonke Favour-Bethy , IYARE Otasowie, ALESE Boniface Kayode
Abstract. Messaging system remains preeminent as the medium of official communication. The fear of confidentiality being breached has led many organizations in developing various ways in checking the excesses of unwanted users. In the messaging system designed, users are allowed to send and receive messages with the options of either encrypting the data or not. The Substitution Permutation Network (SPN), an AES encryption algorithm, implemented in the messaging system makes information sent over the network 'useless' when compromised so as to reduce the damage done whenever sensitive and classified information gets to the wrong hands. The application was implemented and tested and was found to be effective
Keywords: Messaging System, Encryption, SPN, LAN

1. EDL. Educause Learning Initiative, “7 Things You Should Know About Instant Messaging”, A Technical report by Educause Learning Initiative, retrieved from boutInsta/156811, 2005.

2. S.S. Azoum, “Secure Real-Time Conversations”, M.Sc Thesis work at College of Arts and Sciences, Florida State University, USA, 2008.

3. J.A. Pirani, and M. C.Sheehan, "Spreading the Word: Messaging and Communications in Higher Education-Key Findings" (Key Findings). Boulder, CO: EDUCAUSE Center for Applied Research, available from, 2009.

4. K. Komathy, P.Vivekanadan and V. Ramanchandran, “Data Security Model for XML using Advanced Encryption Standard” in the proceedings of SCI, Orlando, USA, July 2002, Vol-IV.

5. B. Scheneir, J. Kelsey, D. Whiting, C. Wagner, N. Ferguson, “Performance Comparison of AES Submission” Retrieved from, 1999. 6. L. Hathaway, “National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information”, Retrieved from, 2003.

7. Mohd Zaid W., Mohd Zulkilli, “Evolution of Cryptography”, Retrieved from of_cryptorgarphy.pdf, 2007.

8. M. Slaveiro, “Symmetric Encryption” Retrieved from, 2010.

9. S. Bunn, “Data Encryption”, A POSTNOTE article of October 2001, volume 270, available at

10. H.E. Khulood, B. M. A. Ibtehaj, M. I. M. Raed, “Design of a Practical Substitution Permutation Network Cryptosystem”, Journal of Al-Aqsa University, 10 (S.E), 2006, pp 462-475.

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2020