Paper
8 March 2023 Encryption methods on major telecommunication applications and thoughts
Zhen Liu
Author Affiliations +
Proceedings Volume 12586, Second International Conference on Green Communication, Network, and Internet of Things (CNIoT 2022); 1258606 (2023) https://doi.org/10.1117/12.2668018
Event: Second International Conference on Green Communication, Network, and Internet of Things (CNIoT 2022), 2022, Xiangtan, China
Abstract
Ever since the invention and massive implementation of telecommunication invited themselves during wartime, it is crucial to keep the message as secret as possible from adversaries. Back in time, the leak of messages meant thousands of potential casualties whereas now enormous costs on fortune and confidential secrets. In this paper, we will dive into the comparison of modern communication apps such as WhatsApp, Messengers, and WeChat with their encryption methods including AES encryption and RSA encryption. Then, we build a front-to-end message app using the RSA encryption method and an easy version of a random number generator to increase the security level. We will discuss the utility of the three apps and their complexity in terms of the input, algorithm, and pros and cons of the features they provide objectively to the average consumer, regardless of occupation or special personalized need. In addition, throughout the studies of the three apps and their flow of design on how to keep the consumers safe during their sharing of messages, we will discover a trend of evolution in how the society treats the idea of information security and what improvements can be done from time to time.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhen Liu "Encryption methods on major telecommunication applications and thoughts", Proc. SPIE 12586, Second International Conference on Green Communication, Network, and Internet of Things (CNIoT 2022), 1258606 (8 March 2023); https://doi.org/10.1117/12.2668018
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Telecommunications

Algorithm development

Forensic science

Symmetric-key encryption

Data storage

Design and modelling

RELATED CONTENT

A novel hash scheme for high elastic grid blockchain
Proceedings of SPIE (March 28 2023)
Blockchain-based ciphertext access control for data sharing
Proceedings of SPIE (October 20 2023)
Constructing a secure HIPACS with structured reporting
Proceedings of SPIE (May 18 2000)
Quantum unicity distance
Proceedings of SPIE (May 04 2012)

Back to Top