On Privacy Protection in the Internet Surveillance Era

Dijana Vukovic, Danilo Gligoroski, Zoran Djuric

2014

Abstract

Snowden's whistleblower from the last year made people more aware of the fact that we are living in the Internet surveillance era. Privacy of Internet communication has been disrupted. In this paper, application for privacy protection in chat communication, named CryptoCloak, is presented. CryptoCloak provides privacy protection for chat communication. Encrypted communication is masked with dynamic cheap chat conversation. Communication made this way is not point of interest for mass surveillance spying engines. For implementation of the CryptoCloak, Facebook Messenger API is used. Diffie-Hellman key exchange is done in clandestine manner - instead of sending uniform sequence of numbers, sentences are sent. Current version provides encryption/decryption mechanism for the chat communication using strong symmetric algorithm AES in CBC mode. 256 bits of Diffie-Hellman exchanged key are used for AES-CBC.

References

  1. Hattem J., 2014. "Many say NSA news changed their behavior", The Hill.
  2. Ashford W., 2014, "Yahoo encrypts users' data to boost security and privacy after NSA revelations", The ComputerWeekly.
  3. Gidda M., 2013. "Edward Snowden and the NSA files - timeline", The Guardian.
  4. Harding L., 2014, "The Snowden Files: The Inside Story of the World's Most Wanted Man", Guardian Books & Faber and Faber, UK, first edition.
  5. Kamdar A., 2014. "Today We Fight Back Against Mass Surveillance", EFF.
  6. Schneier B., 2013. "The US government has betrayed the internet. We need to take it back.", The Guardian.
  7. Regalado A., 2013. "Cryptographers Have an Ethics Problem", MIT Technology Review.
  8. ACM Council, 1992. "Code of Ethics", ACM.
  9. Martin B., 2010. “Opposing Surveillance”, IEEE Technology and Society Magazine, 29 (2), pp. 26-32.
  10. Mazurczyk W., Szczypiorski K., Lubacz J., 2013. "4 New Ways to Smuggle Messages Across the Internet", IEEE Spectrum.
  11. Weinberg Z., et.al, 2012. “StegoTorus: a camouflage proxy for the Tor anonymity system”, in Proceedings of ACM CCS 7812, pp. 109-120.
  12. Callaham J., 2013. "Skype to retire Desktop API support by end of 2013", Neowin.
  13. CryptoCat, 2014. https://crypto.cat/.
  14. Jive Software, 2014, http://www.igniterealtime.org/projects/smack/.
  15. Gutenberg, 2014. http://www.gutenberg.org/.
  16. Khudayer A., Abdulsalam R., Alshaibani S., Bin Ibrahim J., 2014. "Impact of NSA-PRISM to National Information Security Strategy & Policy", International Journal of Information and Communication Technology Research, Volume 4 No. 1, January 2014, ICT Journal.
  17. Bouncy Castle, 2014. https://www.bouncycastle.org/.
  18. Fort A., 2014. "Why Average Typing Speed is Important?", eLearning Industry.
Download


Paper Citation


in Harvard Style

Vukovic D., Gligoroski D. and Djuric Z. (2014). On Privacy Protection in the Internet Surveillance Era . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 261-266. DOI: 10.5220/0005043002610266


in Bibtex Style

@conference{secrypt14,
author={Dijana Vukovic and Danilo Gligoroski and Zoran Djuric},
title={On Privacy Protection in the Internet Surveillance Era},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={261-266},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005043002610266},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - On Privacy Protection in the Internet Surveillance Era
SN - 978-989-758-045-1
AU - Vukovic D.
AU - Gligoroski D.
AU - Djuric Z.
PY - 2014
SP - 261
EP - 266
DO - 10.5220/0005043002610266