Ammar H. Ali

Work place: University of Anbar/ Department of Computer Science, Baghdad, 10013, Iraq

E-mail: p.a.alfahad@gmail.com

Website:

Research Interests: Computer systems and computational processes, Systems Architecture, Information Security, Coding Theory, Cryptographic Coding, Source Coding

Biography

Ammar H. Ali has received his B.Sc. in Computer Science (2013) from the University of Anbar, Iraq. He is a master student (2015, till now) in the Computer Science Department, College of Computer Sciences and Information Technology at Al-Anbar University. He is interested in the following fields; Mobile Computing, Information Security, Coding Systems.

Author Articles
Design of an Android Application for Secure Chatting

By Ammar H. Ali Ali M. Sagheer

DOI: https://doi.org/10.5815/ijcnis.2017.02.04, Pub. Date: 8 Feb. 2017

Smart phones have become an essential part in the life of the individuals and their priorities at the present time. The most prominent uses are in chatting and conversation applications. Most of these applications do not provide the required protection and privacy of the data exchanged between users. Yet there are very few mobile chat applications that provides an End-to-End (E2E) security and privacy-preserving service to their clients. In this paper, a secure chatting application with end to end encryption for smart phones that use the android OS has been proposed. The proposed application uses the ECDH algorithm to generate the key pair and exchange to produce the shared key that will be used for the encryption of data by symmetric algorithms. The proposed Application allows the users to communicate via text messages, voice messages, as well as exchange photos. For the text message security the standard AES algorithm with a 128 bit key is used. The generated key (160 bit) minimized to 128 bit length in order to be used by the AES algorithm. For the voice and image security processes the proposed application uses the symmetric algorithm RC4 for this purpose. RC4 provides less security than AES, but it performs faster and this is required for such types and sizes of data.

[...] Read more.
Other Articles