Loading

WhatsApp Encryption- A Research
Vamsi Krapa1, S. Prayla Shyry2, M. Rahul Sai Krishna3

1Vamsi Krapa, Third Year, Department of CSE, Sathyabama, Chennai (Tamil Nadu), India.
2Dr. S. Prayla Shyry, Associate Professor, Department of CSE, Sathyabama, Chennai (Tamil Nadu), India.
3M. Rahul Sai Krishna, Third Year, Department of CSE, Sathyabama, Chennai (Tamil Nadu), India.
Manuscript received on 19 July 2019 | Revised Manuscript received on 03 August 2019 | Manuscript Published on 10 August 2019 | PP: 522-523 | Volume-8 Issue-2S3 July 2019 | Retrieval Number: B10930782S319/2019©BEIESP | DOI: 10.35940/ijrte.B1093.0782S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In the recent years, battle between national security and a person’s privacy has become prime conflict. Governments and secret services are asking encrypted messaging services such as WhatsApp to allow them access to user’s data. After the March attack at Westminster(2017), UK home secretary, stated that accessibility of WhatsApp’s data is mandatory to authorize the legitimate user since the government couldn’t smell the encrypted messages of suspected terrorists. But in turn such access to messages will allow authorities to thwart future terror attacks. In this paper, novel enhanced End to end encryption technique is proposed to identify the breaches and mitigate the terror attacks. Also different encryption techniques are compared with respect to their performance and the best encryption technique is revealed.
Keywords: End to end Encryption Technique, Breaches.
Scope of the Article: Encryption Methods and Tools