secure chat application total doc

Download Secure Chat application Total Doc

Post on 24-Nov-2014

107 views

Category:

Documents

3 download

Embed Size (px)

TRANSCRIPT

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CA PROJECT REPORT ON

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C***************Title of the Project*************** Submitted to ******************** University for the partial fulfillment of the Requirement for the

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CAward of Degree for ***********Course Name************* Done By

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CMr. /Miss ********************************************* **************Institute of Management and Computer Science

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CCERTIFICATE

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CThis is to certify that Mr., /Miss ****************** bearing Roll No. ********************** have developed software project Titled **************** For ********************* Software

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CSolutions as Partial fulfillment for the award of the Degree of ************** Head of the Department Principal

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C******College Name******

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CExternal

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CACKNOWLEDGEMENT At every outset I express my gratitude to almighty lord for showering his grace and blessings upon me to complete this project.

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CAlthough our name appears on the cover of this book, many people had contributed in some form or the other form to this project Development. We could not done this project without the assistance or support of each of the following we thank you all. I wish to place on my record my deep sense of gratitude to my project guide, Mr. Express my gratitude to Mr. ******, Director of ******* ******, ***** Software Solutions, for his constant motivation and valuable help through the project work. Institute of Management & Computer Sciences for his valuable suggestions and

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE Cadvices throughout the ***** course. I also extend my thanks to other Faculties for their Cooperation during my Course. Finally I would like to thank my friends for their cooperation to complete this project. *******Your Name*********

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CABSTRACT

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CIn this project, you will develop a secure chat program that lets users send short messages to each other via an encrypted, authenticated channel. The project is deliberately

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE Copen-ended to give you the opportunity to develop the features you find most compelling. For example, you may develop a chat program with a GUI (in DOT NET), as you see fit. You may include a rendezvous server in your chat system . There are also several optional security extensions to the base project. Connection Initiation. If Alice and Bob are both running your chat application, then Alice can use her program to initiate a connection to Bob. If you have a rendezvous server,

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE Cthen she may just click on a name in a list, or you may have Alice specify Bob's current IP address or hostname, e.g. GM@gre.ac.ck Basic Security Handshake. Once Alice and Bob's chat applications are connected via a TCP connection, they should perform a Diffie-Hellman key agreement to establish a shared secret key, k. The exact format of the messages exchanged in this step is up to you.

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CKey Setup. The actual chat messages should be encrypted using an encryption algorithm(RSA), mode-of-operation, and algorithm of your choice. You will have to derive encryption keys, etc. from the shared secret k. Chatting. Once the key setup is complete, channel. users can exchange chat messages, and the program will transmit these over the encrypted

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE C

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CPreface Table of Contents INTRODUCTION

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CINTRODUCTION TO PROJECT ORGANIZATION PROFILE PURPOSE OF THE SYSTEM PROBLEMS IN EXISTING SYSTEM SOLUTION OF THESE PROBLEMS

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CSYSTEM ANALYSIS INTRODUCTION STUDY OF THE SYSTEM HARDWARE AND SOFTWARE REQUIRMENTS PROPOSED SYSTEM

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CINPUT AND OUTPUT PROCESS MODULES USED WITH JUSTIFICATION FEASIBILITY REPORT TECHNICAL FEASIBILITY OPERATIONAL FEASIBILITY

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CECONOMICAL FEASIBILTY SOFTWARE REQUIREMENT SPECIFICATIONS FUNCTIONAL REQUIREMENTS PERFORMANCE REQUIREMENTS SELECTED SOFTWARE

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CINTRODUCTION TO .NET FRAME WORK VC#.NET SYSTEM DESIGN INTRODUCTION SYSTEM WORK FLOW

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CUML DIAGRAMS OUTPUT SCREENS SYSTEM TESTING AND IMPLEMENTATION INTRODUCTION STRATEGIC APPROACH OF SOFTWARE TESTING

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CUNIT TESTING SYSTEM SECURITY INTRODUCTION SECURITY IN SOFTWARE CONCLUSION

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CFUTURE ENHANCEMENTS BIBLOGRAPHY

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CINTRODUCTION TO PROJECT

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CFrom the days of development of public-key cryptography, the RSA cryptography has gained utmost popularity. It is believed that there is certain difficulty encountered in of this difficulty, this method is widely secure for large N.RSA can be processed by computing eth roots modulo N, where n is the product of two large unknown primes.Inspite factorization of N.But the security of RSA is often based on the integer factorization problem, which is and continues to be a well-studied problem. At present, for the RSA to be

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE Cconsidered secure, the suggested bit length of N is at least 1024.Using the popular factoring algorithms, the expected workload of factoring a 1024-bit modulus is 2 powers 80 which are currently believed to be impracticable. A workload of 280 is the current cryptographic benchmark used for security. The foremost reason for the RSA to be popular lies in its simplicity. Only one modular exponentiation is enough for both encryption and decryption. However, computing an

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE Cexponentiation modulo N is very costly because the RSA modules are much larger than other module of public key cryptosystems such as those based on elliptic curves. The size of the key pairs is the other main limitation in using RSA. For instance, the RSA key size must be much larger than that of elliptic curve based cryptosystems to offer the same level of security as a given symmetric key cryptosystem. Furthermore, as the security level is increased the RSA key size grows at a much faster rate than the keys in an elliptic curve cryptosystem.

Secure Chat application using RSA

Project Titl

A Survey on C System Appro Journal: IEEE CIn this project, you will develop a secure chat program that lets users send short messages to each other via an encrypted, authenticated channel. The proje

Recommended

View more >