Survey of secure anonymous peer to peer Instant Messaging protocols

  title={Survey of secure anonymous peer to peer Instant Messaging protocols},
  author={Rakan Alkhulaiwi and Abdulhakim Sabur and Khalid Aldughayem and Osama Almanna},
  journal={2016 14th Annual Conference on Privacy, Security and Trust (PST)},
Secure end-to-end communication has become a necessity for many people. In this research paper we survey the most popular and widely used secure anonymous Instant Messaging (IM) services and protocols, study them from a security and anonymity point of view, and investigate how these services or protocols could be compromised. 
Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems
The comparison results of the proposed scheme with other schemes and the results of an experiment show that it is a comprehensive secure scheme with high security and good practicability.


Improved group off-the-record messaging
This work proposes an improved group OTR (GOTR) protocol that provides unconditional repudiability, and shows how to obtain data origin authentication given this level of repudiability.
Secure off-the-record messaging
A security analysis of OTR is presented showing that, while the overall concept of the system is valid and attractive, the protocol suffers from security shortcomings due to the use of an insecure key-exchange protocol and other problematic design choices.
Off-the-record communication, or, why not to use PGP
This paper presents a protocol for secure online communication, called "off-the-record messaging", which has properties better-suited for casual conversation than do systems like PGP or S/MIME.
Kerberos: an authentication service for computer networks
The authors concentrate on authentication for real-time, interactive services that are offered on computer networks, which includes remote login, file system reads and writes, and information retrieval for applications like Mosaic.
Anonymous connections and onion routing
Anonymous connections and their implementation using onion routing are described and several application proxies for onion routing, as well as configurations of onion routing networks are described.
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
A peer-to-peer distributed hash table with provable consistency and performance in a fault-prone environment is described using a novel XOR-based metric topology that simplifies the algorithm and facilitates the proof.
Remote timing attacks are practical
This work devise a timing attack against OpenSSL that can extract private keys from an OpenSSL-based web server running on a machine in the local network.
Peer-to-peer systems
Within a decade, P2P has proven to be a technology that enables innovative new services and is used by millions of people every day.
The Security Impact of a New Cryptographic Library
This paper introduces a new cryptographic library, NaCl, and explains how the design and implementation of the library avoid various types of cryptographic disasters suffered by previous
Handbook of Peer-to-Peer Networking
This handbook addresses current issues as well as emerging concepts and applications, including P2P architectures, search and queries, incentive mechanism, multimedia streaming, service- oriented architectures, collaboration to share non-storage resources, mobile P1P, theory and analysis, and P2p databases.