Constructing a Model Combining Zalo and End-to-End Encryption for Application in Digital Transformation

Authors

  • Cao Thanh Vinh
  • Pham Van Huong

DOI:

https://doi.org/10.54654/isj.v3i20.1012

Keywords:

Zalo API, end-to-end encrption, digital transformation

Tóm tắt

Abstract—This paper proposes and implements a model combining Zalo and end-to-end encryption to apply in digital transformation. The main idea is to promote the strengths of the Zalo social network to exchange information and manage work but ensure information confidentiality for both the server and man-in-the-middle attacks based on the end-to-end encryption model. End-to-end encryption is right at the client, so only the encrypted data is stored on the server and therefore the server cannot decrypt it. This solution can use international standard cryptographic algorithms or those of the Vietnam Government Information Security Commission. The solution model has been developed, deployed, and tested at the Academy of Cryptography Techniques. Our proposed system serves as an end-to-end encryption and adapter used to encrypt text data and files in various social networks. Within the scope of this paper, we deploy a test solution with Zalo.

Downloads

Download data is not yet available.

References

Statista Research. (2023). Leading active social media apps among internet users in Vietnam as of 1st quarter of 2023. https://www.statista.com/statistics/941843/vietnam-leading-social-media-platforms.

Zalo. (2023). Zalo digital transformation. URL: https://oa.zalo.me/chuyendoiso.

Zalo. (2023). Zalo for Developers. https://developers.zalo.me.

Van, T. M. (2005). “Information security”.

Felipe, G. Spring Boot Messaging. Apress.

Peter, L. (2013). Simple Steps to Data Encryption. https://doi.org/10.1016/C2012-0-06008-5.

Khánh, T. V., & Vinh, N. T. (2020). Giải pháp bảo mật đầu cuối cho điện thoại di động. Journal of Science and Technology on Information Security, 9(01), 37-48. https://doi.org/10.54654/isj.v9i01.41.

Phong, T. Q., Chi, D. D., Huy , T. D., & Diep, N. N. (2023). On some issues affecting the security of RSA and ECDSA digital signature schemes. Journal of Science and Technology on Information Security, 1(18), 38-46. https://doi.org/10.54654/isj.v1i18.884.

Thuc, H.V & Tien, D.Q. (2023). A review of security levels for RSA key length. Journal of Science and Technology on Information Security.

Elaine, B. & John, K. (2014). Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST Special Publication 800-90A.

Downloads

Abstract views: 342 / PDF downloads: 59

Published

2023-12-31

How to Cite

Vinh, C. T., & Huong, P. V. (2023). Constructing a Model Combining Zalo and End-to-End Encryption for Application in Digital Transformation. Journal of Science and Technology on Information Security, 3(20), 95-108. https://doi.org/10.54654/isj.v3i20.1012

Issue

Section

Papers