End-to-End Encrypted Messaging System for Social Media Platforms
- Version
- Download 2
- File Size 408.28 KB
- File Count 1
- Create Date 17 May 2025
- Last Updated 17 May 2025
End-to-End Encrypted Messaging System for Social Media Platforms
Shirshendu Dutta1, Srishti Shaw2, Sani Kumar Dusad3, Abhijeet Mandol4, Abhishek Kumar5
1Assistant Professor, Dept. of CSE, JIS College of Engineering, Kalyani, India
2345UG Student, Dept. of CSE, JIS College of Engineering, Kalyani, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - End-to-End Encryption (E2EE) is essential for secure social media communication so that only intended recipients are able to read message content. E2EE secures users against unauthorized access by service providers, cyber attackers, and surveillance authorities. Although necessary, implementations of E2EE vary between social media platforms such as WhatsApp, Signal, Facebook Messenger, and Telegram, with implications for security and usability. A few platforms, like Telegram and Facebook Messenger, don't support E2EE out of the box, exposing users to data interception. Existing authentication techniques like fingerprinting or scanning a QR code are too technical for ordinary users, raising the risk of Man-in-the-Middle (MitM) attacks.
Usability is another issue—most users bypass important verification processes, compromising communication integrity. Moreover, most platforms do not encrypt metadata, which can still disclose user relationships and communication patterns.
This article suggests enhancements like a Multi-Key Authentication Model (MKAM), automated authentication, default E2EE activation, metadata encryption, and blockchain-based key management [14]. These methods will enhance privacy and make secure communication more user-friendly. With changing digital threats, it is important to embrace sophisticated, accessible, and strong encryption solutions to protect user data and maintain digital privacy.
Key Words: End-to-End Encryption (E2EE), Social Media Security, Authentication Methods, Metadata Protection, Man-in-the-Middle (MitM) Attacks, Blockchain Key Management
Download