“Letter sealing”: Feature to rejoice for hidden chat users!

Author: Jack  Chopin   Release time: December 6, 2016   Category: LINE Chat

There is a buzz regarding Letter Sealing facility which can be used by LINE hidden chat user. This feature is added keeping in mind of users’ interests and respecting their secrets and privacy. This feature is a reason to rejoice because of really good technical reason which we will discuss in this article.

LINE_LetterSealing_top.png

Above all, LINE has utilized a safe calculation to permit safe key trades between a sender and a beneficiary. Letter Sealing utilizes the Diffie-Hellman (DH) technique for key trade rather than the RSA strategy. With this technique, every client has an open key and a private key. Every client clutches their private keys and just trade the general population keys with different clients. At the point when two open keys are traded, muddled information is made between the two clients. This keeps any outsider from blocking the messages..


At the point when the qualities are traded, clients can trade shared mystery information without the danger of introduction. While the RSA strategy likewise had a comparative framework, it was supplanted with the DH technique since it was more productive than putting away every individual RSA key on client gadgets.


The DH strategy utilizes discrete logarithm and elliptic bend count. Among the two, Letter Sealing utilizes the Elliptic Curve Diffie-Hellman (ECDH) strategy. As it is known as a standout amongst the most secure cryptosystems. The ECDH techniques permits more grounded encryption with a littler measure of information contrasted with the discrete logarithm strategy or the RSA strategy. Letter Sealing has both better security and productivity by utilizing the ECDH strategy.


Under the present strategy, the message is scrambled and just sends the base obliged data to the beneficiary client. The encryption calculation utilized is AES-CBC-256, known as the most developed encryption calculation accessible today. The main issue with this encryption technique was that the gadget encoding the information and the gadget unscrambling the information needed to have indistinguishable keys. Our answer was to utilize the DH strategy.


In the wake of sharing the settled upon regular esteem, (shared mystery) the message information is scrambled. LINE utilizes the ECDH strategy to make a 256-piece (32-byte) shared esteem that is then used to make an encryption key. The key information is likewise exchanged alongside the scrambled message, yet just encoding a message does not make it totally secure. While the genuine message can't be seen, it is conceivable to make the message incomprehensible or to change the substance.


To keep these sorts of assaults, we have included a component called Message Authentication Code (MAC) to Letter Sealing. At the point when messages are sent, they are outlined in a cryptographic frame. Once the beneficiary gets the message it will be contrasted with the MAC esteem with check whether there was any altering included.


Letter Sealing is additionally practically not the same as existing strategies, utilizing the advances that were clarified previously. One key distinction is that with Letter Sealing, encryption is performed by the sender rather than the server. This actually keeps any potential outcomes of messages being unscrambled and re-encoded, furthermore ensures messages are never uncovered in plain content on the server. Furthermore, the message keys used to trade messages are securely put away on the gadgets of the sender and beneficiary rather than the server. This dispenses with the likelihood of an outsider, including the LINE servers, from expelling the seal on messages.


Past encryption techniques risked bargaining messages if there was an immediate assault on hold servers, however Letter Sealing will now make those worries a relic of past times. Like how the wax seals of the past had shielded messages from prying eyes, this new strategy for advanced fixing will secure your messages until it securely touches base to your planned beneficiary.



You may also want to read How to use 2 LINE accounts on the same phone simultaneously



Tags: , ,

Prev:  

Leave a Reply

Your email address will not be published.