Survey Paper On Communication System Using Blockchain and Cryptography
Survey Paper On Communication System Using Blockchain and Cryptography
https://doi.org/10.22214/ijraset.2022.42442
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
Abstract: Decentralized application make use of peer-to-peer networks, this ensures that no network failure can occur due to
central node failure. Blockchain serves as a ledger which allows messaging to take place in a decentralized manner.
Decentralized application for the communication and resource sharing is need in today’s world, where keeping data on a
centralized server can be risky and a very expensive experience. With the help of some consensus, we can implement different
ways to share resources and communicate. Together with Blockchain and Decentralized Applications, we can create a secure
and very reliable messaging application that overcomes the drawbacks of traditional messaging applications.
Keywords: Blockchain, Cryptography, Communication System, Secure Hash Algorithm, Encryption and Decryption
I. INTRODUCTION
As we all know, traditional chat applications are centralized i.e., all the data is stored on a centralized server. Therefore major
problem of this structure is, if the central server fails then whole network collapses. For example , WhatsApp server stores all the
data on a central server, if in case that server is destroyed then there can be a loss of user data, or they can even leak the user
information stored on the server. To overcome this, our project makes the use of decentralized Application approach. In our
application all the user data is stored on a block which is connected to other blocks forming a chain. As the name suggests, a
decentralized application does not have a centralized server. It is basically a peer-to-peer network. Also the data that is stored in
block is almost impossible to view as a very secure encryption and hashing functions(256 bits) are used. Also if a hacker tries to
make changes to the information in block then, they will have to make changes to all the copies of that block on whole blockchain
network and that can be quite impossible.
II. OBJECTIVE
To develop more secure and transparent communication System.
To provide more efficient system that works even if a node in the network fails. To provide more secure environment for chatting.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4023
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
V. SCOPE
To develop software that can provide not only the features provided by currently available chat applications but also be able to
overcome the drawbacks that they have. The resultant software will be more secure and reliable than the currently available ones.
A. Cryptography Algorithm
Cryptography is a method of developing techniques and protocols to prevent a third part from accesing and gaining knowledge of
the data from the private messages during a communication process.
B. AES Algorithm
The AES algorithm (also known as the Rijndael algorithm) is a symmetrical block cipher algorithm that takes plain text in blocks of
128 bits and converts them to ciphertext using keys of 128, 192, and 256 bits. Since the AES algorithm is considered secure, it is in
the worldwide standard.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4024
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue V May 2022- Available at www.ijraset.com
A. Advantages
1) Immutability: Since records are stored on a large number of participants, it is nearly impossible to tamper transactions in a
public blockchain.
2) Efficiency: It takes plenty of time to propagate transactions and blocks as there are a large number of nodes on public
blockchain network.
3) Decentralization: Consensus algorithms in blockchain are used to maintain data consistency in decentralized network.
REFERENCES
[1] Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang, ―An Overview of Blockchain Technology: Architecture, Consensus, and
Future Trends‖, 2017 IEEE 6th International Congress on Big Data.
[2] S. Nakamoto, ―Bitcoin: A peer-to-peer electronic cash system,‖ 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
[3] G. W. Peters, E. Panayi, and A. Chapelle, ―Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective,‖ 2015.
[Online]. Available: http://dx.doi.org/10.2139/ssrn. 2646618
[4] G. Foroglou and A.-L. Tsilidou, ―Further applications of the blockchain,‖ 2015.
[5] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, ―Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,‖ in
Proceedings of IEEE Symposium on security and Privacy (SP), San Jose, CA, USA, 2016, pp. 839–858.
[6] Technical White Paper: WhatsApp Encryption Overview,http://www.cdn.whatsapp.net/security/WhatsApp-Security- Whitepaper.pd, Accessed on 23-02-2021.
[7] P. Rosler, C. Mainka and J. Schwenk, “More is less: On the end-to-end security of group chats in Signal, WhatsApp, and Threema”, IEEE European
Symposium on Security and Privacy (EuroS&P), pp. 415-429.
[8] https://faq.whatsapp.com/general/security-and-privacy/were-updating-our-terms-and-privacy-policy/, Accessed on 09-03-2021.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 4025