Secure Text Conferencing System Using Multiple Layer Encryptions


 Najmadin Wahid Boskany

Faculty of Science and Science Education, University of Sulaimani  



Abstract
             The coding theory becomes increasingly important over the decades. There are some different works that have been dedicated to the problems of cryptography. In the present paper, the design and implementation of a secure text conferencing system have been proposed and implemented. Also explained how plaintext can be encrypted in three levels before sending it to the destination has been explained. Later, how ciphered text decrypted from destination side to its origin plaintext has been described.  
 
Keywords: Secure Text Conferencing, Plaintext, Cipher Text, Promiscuous Mode, Windows Sockets, Network Security, Client-Server Networks

References 
 
1-A.Chandra Sekhar, K.R. Sudha, and Prasad Reddy P V G D,” Data Encryption technique using Random number generator”,  IEEE, 2007. 
2-Holger kruse and Amar Mukherjee , “DATA COMPRESSION USING TEXT ENCRYPTION”, 1068-0314, IEEE, 1997. 
3-Aamer Nadeem, Dr M. Younus Javed, “A Performance Comparison of Data         Encryption Algorithms, IEEE, 2005. 
4-Liakot Ali, Nurul Amziah Md Yunus, Haslina Jaafar, Rahman Wagiran, Evanna Low “Implementation of Triple Data Encryption  Algorithm Using VHDL” ICSE2004, Proc. 2004, Kuala Lumpur, Malaysia. 
5-Subbarao V. Wunnava and Ernesto Rassi;”Data Encryption Performance and    Evaluation Schemes”, Proceedings IEEE  Southeastcon 2002. 
6-A; Ammar, A. El Sherbini, I. Ashour, M. Shiple, “Random Data Encryption Algorithm (RDEA)”, Twenty Second National Radio  Science Conference (NRSC 2010) March 1517,2005, CaikEgypt. 
7-Zon-Yin Shae1, Dinesh Garg2 , Rajarshi Bhose2, Ritabrata Mukherjee3, Sinem Güven1, Gopal Pingali ”Efficient Internet Chat  Services for Help Desk Agents” 2007 IEEE International Conference on Services Computing (SCC 2007). 
8-Behrouz A. Forouzan, “Data Communication and Networking” fourth edition, ISBN: 978-0-07-296775-3, 2007 
9-Dr. V.K. Govindan and B.S. Shajee mohan, “AN INTELLIGENT TEXT DATA ENCRYPTION AND COMPRESSION FOR HIGH  SPEED AND SECURE DATA TRANSMISSION OVER INTERNET”, 2004. 
10-Lynn Anderson and Kathy McCarthy, “Text-based Conferencing Features vs. functionality”, ERR-ODL journal, Vol. 6, No.  3, 2005 
11-Malhotra, A., Sharma, V., Gandhi, P. And Purohit, N., “UDP based chat application” Journal: 2010 2nd International  Conference on Computer Engineering and Technology Year: 2010 Volume: 6 Pages: V6-374-V6-377 Provider: IEEE Publisher:  IEEE DOI: 10.1109/ICCET.2010.5486192. 
12-David C. Uthus, David W. Aha, “Multiparticipant chat analysis: A survey”,NRC/NRL Postdoctoral Fellow, Washington, DC  20375, United States, Navy Center for Applied Research in Artificial Intelligence, Naval Research Laboratory (Code 5514);  Washington, DC 20375, United States, 2013. 
13-Özcan Özyurt *, Cemal Köse, “Chat mining: Automatically determination of chat conversations”, topic in Turkish text  based chat mediums, Karadeniz Technical University, Department of Computer Engineering, Faculty of Engineering, 61080  Trabzon, Turkey, 2010.