Abstract
The Pretty Good Privacy protocol is the most preferred choice for a safe and encrypted communication between two or more parties since it uses encrypted messages for the communication. However, the Off-the-Record (OTR) protocol fits better than PGP protocol as it does not fit well due to some of its characteristics. In the real world, physical communication has some characteristics that do not match with nature of PGP protocol. That offset in aspects was the stimulus to create a new kind of communication protocol: OTR. As the name says, “Off-the-Record” protocol tries to create distance from the message and its sender. When this distance is created, every message sent is unofficial and the sender can negate his correlation to it. The sender can make a statement and, in the future, deny any relations with it. Although this is the main premise of OTR, there is a list of additional characteristics that we are addressed in this paper. We also address the differences between OTR and some of the most used protocols in Internet of things (IoT) sector and why should IoT network use it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Perrig A., Canetti R., Tygar, J.D., Song, S.: Efficient authentication and signing of multicast streams over lossy channels. In: IEEE Security and Privacy Symposium (2000)
Mujaj. A.: A comparison of secure messaging protocols and implementations. Master’s thesis, Department of Informatics at the Faculty of Mathematics and Natural Sciences of the University of Oslo (2017)
Diffie, W., Hellman, M.: New directions in cryptography. In: IEEE Transactions on Information Theory, pp. 74–84 (1977)
Bruce, S.: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company (2015). ISBN-13: 978-0393352177
Johansen, C., Mujaj, A., Arshad, H., Noll, J.: Comparing implementations of secure messaging protocols (long version). Technical Report 475, Department of Informatics, University of Oslo, Nov 2017
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the tor network. In: Privacy Enhancing Technologies, pp. 63–76. Springer, New York (2008)
Migdal, D., Johansen, C. and Jøsang, A.: DEMO: OffPAD—Offline personal authenticating device with applications in hospitals and e-Banking. In: 23rd Conference Computer and Communication Security, pp. 1847–1849. (ACM, 2016)
Boyd, C., Mathuria, A.: Protocols for authentication and key establishment. In: Information Security and Cryptography. Springer, pp. 1–321 (2003). ISBN: 978-3-662-09527-0
Alexander, C., Goldberg, I.: Improved user authentication in off-the-record messaging. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society (WPES ’07), pp. 41–47
Marlinspike, M., Perrin, T.: The double ratchet algorithm. In: Open Whisper Systems (2016)
Migdal, D., Johansen, C. and Jøsang, A.: Offline trusted device and proxy architecture based on a new tls switching technique. In: International Workshop on Secure Internet of Things (SIOT). (IEEE, 2017)
Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use pgp. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 77–84. (ACM, 2004)
Seker, B.R., Topaloglu, U..: Off-the-record instant messaging for group conversation. In: IEEE International Conference on Information Reuse and Integration, pp. 79–84 (2007)
Black, J., Halevi, S., Krawczyk, H., Krovetz, T. and Rogaway, P.: UMAC: Fast and secure message authentication. In: Annual International Cryptology Conference, pp. 216–233. Springer, New York (1999)
Marlinspike, M., Perrin, T.: The X3DH key agreement protocol. Open Whisper Systems (2016)
Liu, H., Vasserman, E.Y., Hopper, N.: Improved group off-the-record messaging. In: Proceedings of the 12th ACM Workshop on Privacy in the Electronic Society, pp. 249–254 (ACM, 2013)
Auchard. Go ahead, make some free, end-to-end encrypted video calls on Wire. Reuters, 11 March 2016. Available at: http://www.reuters.com/article/us-dataprotection-messaging-wire-idUSKCN0WC2GM
Goulet, G.D., Appelbaum, J., van Bergen, J.: Off-the-record messaging protocol version 3. Technical report. University of Waterloo, 2012
Cohn-Gordon, K., Cremers, C., Dowling, B., Garratt, L., Stebila, D.: A formal security analysis of the signal messaging protocol. In: IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, pp. 451–466 (2017)
Black, J., Rogaway, P.: Cbc macs for arbitrary-length messages: the three-key constructions. In: Annual International Cryptology Conference, pp. 197–215. Springer, New York (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mrsic, L., Adamek, J., Cicek, I. (2020). Off-the-Record (OTR) Security Protocol Application in Cloud Environment. In: Bansal, J., Gupta, M., Sharma, H., Agarwal, B. (eds) Communication and Intelligent Systems. ICCIS 2019. Lecture Notes in Networks and Systems, vol 120. Springer, Singapore. https://doi.org/10.1007/978-981-15-3325-9_15
Download citation
DOI: https://doi.org/10.1007/978-981-15-3325-9_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-3324-2
Online ISBN: 978-981-15-3325-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)