SlideShare une entreprise Scribd logo
1  sur  29
Whatscrypt Messenger Application
Team Members:-
M. Muthukumaran(513117621307)
A.Vinothkumar(513117621319)
Guided By:- D. Sandheep(513117621315)
Mr.N.Santhosh,M.C.A., Asst.prof., T. Santhosh kumar(513117621329)
Project Scope
• Privacy
• Secure
• Purpose of Encryption
• What is Encryption
Requirements
• Hardware
– Processor : i3 or above.
– Processer speed : 3.00GHz
– Hard disk : 300GB
– RAM : 4 GB or above
– Monitor : super VGA(17 inch)
– Keyboard : Logitech (103 keys)
– Mouse : Logitech or Optical
• Software
– IDE : Android Studio 3.4.1 (Stable)
– DB : Firebse
– OS : Windows 7,8,10, Linux.
– Mobile Os : Kitkat or above Versions
– Virtual Box : Genymotion 6.0
Abstract
• Whatscrypt application design which protects its users with better
integrity, confidentiality and privacy.
• The purpose of the Whatscrypt application is to allow users to
communicate and chat securely with each other, to use advanced
Encryption algorithoms.
• The users will be able to chat with each other, most likely from
user to user. Also one user can send one message to many users by
forming a group so that all the contacts can receive same message.
Existing System
• Privacy of a user is related to and based on a metadata that an
application can collect and send to a second or third party.
• Unfortunately privacy is one of the factors that is getting sacrificed in
the current mobile application environment. Many applications are free
of charge, but the service providers grab metadata of the user and send
these information to their servers even sometimes without the
knowledge of the users.
• Metadata means any type of data which includes different information
about a user, such as location, name, contact information, creator of
data, contact list, type of operating system, etc….
Disadvantage of Existing Systems
• It not secured privacy issues
• Encrypted data can store and retrieve in that system accessing
offline
• Encrypt algorithms are commonly used
• It less integrity
• Encryption plays a major role, but decryption plays not match
Proposed system
• The proposed system suggests a new method of how the messages
are stored.
• This proposed system aims to fill this gap by providing an
advanced level of chatting protection algorithms.
• This algorithm works with both private key and public key. Only
the encrypted file will be uploading to the server.
• In this application have protect spams, malware attacks,
advertisement.
Advantages of Proposed Systems
• It is more secured for protect spams, advertisement, malware
attacks.
• Encrypted Data not store and retrieve in that system, save in online
Database.
• It is more integrity.
• ‘N’ no.of users connected with stable performance.
• Using new encryption algorithm.
• Encryption and Decryption is plays main role.
Modules
1. Server Module
2. Client Module
3. Authentication Module
4. Discover Friends Module
5. Request Module
6. Conversation Module
Server Modules:-
– A Server is a specially equipped Mobiles connected to the internet that
allowsusers with chat clients to converse with one another via typed
messages in real time.
Client Modules:-
– A Client is a Software program that allows users to connected to chat
servers and communicate with other users via a chat room.
Authentication Module
• Authentication is one of the most important aspects of security.
• This avoids any type of attack or malicious activity by which a
malicious user impersonates the user and identifies himself as the real
user to the server.
• There are different practices to perform such authentication such as
one-time passwords (OTP) and certificate-based authentication (CBA).
• In one-time password, a shared secret key is stored on a device that the
entity has, and the system issues one-time passwords based on this
shared secret key.
Discover Friends Module
• The Discover Friends Module is to show all users id and profiles.
• The user can who wants to chat when give the request to that user,
and also who wants to block chat when user can then remove user
from contact list.
• User have already request then user can accept that request.
Request’s Module
• The Request’s module is shows who wants to send request and
also who wants to user receive requests list are shown.
• If user interest to chat that user when accept the request other wise
user can cancel requests.
Conversation Module
• The Conversation module is to show the chat contacts. Here we
choose who wants to chat (private) to select on the contact.
• Once you select contact when instantly create a page and ready to
connection chat with that user.
• In this page user can type text message and the key for encryption
that message will encrypted and sent it. Receiver can decrypt that
message using the same key.
• Here the another way to secure, don’t have take screenshot or
screen recorder at this module.
Architecture of Whatscrypt Messenger
Use-Case Diagrams
Sequence Diagram
Class Diagram
Screenshots
Signup page Login Page Forgot Password
Account Settings Home Page Options
Find Friends Page Profile Page Request sent to others
Request from others Chat Page Individual Chat
Decrypt Message Using Key View message
Feedback Page
Conclusion
• Users can be confident that nobody can read their messages; even
provider of the service also cannot read their messages.
• Even the mobile phone reaches to wrong hands, no readable
information can be extracted from the physical memory of the
phone.
Future Enhancement
• In future this project can be developed to share the documents,
images, audio and video in a secure way and also to provide
advanced encryption algorithms to encrypt those multimedia files
which has to share securely.
• The next level to develop the video conference call and voice
conference call will also be included.
References
• [1]Barry A. Burd ,‟Android Application Development All in One”,
Wiley, 2015.
• [2] Ed Burnette,‟Hello, Android: Introducing Google‟s Mobile
Development Platform‟ third edition‟ Pragmatic
Programmers,2013.
• [3] https://developer.android.com/guide
• [4] https://developer.android.com/design
• [5] https://developer.android.com/reference

Contenu connexe

Tendances

What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYNishant Pawar
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principalsnewbie2019
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1Swagato Dey
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordNirzar Bhaidkar
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuiritySarath K
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationMarketingArrowECS_CZ
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 

Tendances (20)

Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
3D password
3D password 3D password
3D password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
3D password
3D password3D password
3D password
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authentication
 
Malwares
MalwaresMalwares
Malwares
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3D-Password
3D-Password 3D-Password
3D-Password
 

Similaire à Whatscrypt Messenger for android project

Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Adz91 Digital Ads Pvt Ltd
 
Client server chat
Client server chatClient server chat
Client server chatFreelancer
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
Security on android
Security on androidSecurity on android
Security on androidpk464312
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYDEEPAK948083
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaSusmitha Reddy
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...Akhil Kumar Pappula
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationArun S M
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudINFOGAIN PUBLICATION
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptxkamalakantas
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hackingbegmohsin
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4Mr Smith
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 

Similaire à Whatscrypt Messenger for android project (20)

Arbina project
Arbina projectArbina project
Arbina project
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Client server chat
Client server chatClient server chat
Client server chat
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
Security on android
Security on androidSecurity on android
Security on android
 
Paper2
Paper2Paper2
Paper2
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong Authentication
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 

Dernier

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Whatscrypt Messenger for android project

  • 1. Whatscrypt Messenger Application Team Members:- M. Muthukumaran(513117621307) A.Vinothkumar(513117621319) Guided By:- D. Sandheep(513117621315) Mr.N.Santhosh,M.C.A., Asst.prof., T. Santhosh kumar(513117621329)
  • 2. Project Scope • Privacy • Secure • Purpose of Encryption • What is Encryption
  • 3. Requirements • Hardware – Processor : i3 or above. – Processer speed : 3.00GHz – Hard disk : 300GB – RAM : 4 GB or above – Monitor : super VGA(17 inch) – Keyboard : Logitech (103 keys) – Mouse : Logitech or Optical
  • 4. • Software – IDE : Android Studio 3.4.1 (Stable) – DB : Firebse – OS : Windows 7,8,10, Linux. – Mobile Os : Kitkat or above Versions – Virtual Box : Genymotion 6.0
  • 5. Abstract • Whatscrypt application design which protects its users with better integrity, confidentiality and privacy. • The purpose of the Whatscrypt application is to allow users to communicate and chat securely with each other, to use advanced Encryption algorithoms. • The users will be able to chat with each other, most likely from user to user. Also one user can send one message to many users by forming a group so that all the contacts can receive same message.
  • 6. Existing System • Privacy of a user is related to and based on a metadata that an application can collect and send to a second or third party. • Unfortunately privacy is one of the factors that is getting sacrificed in the current mobile application environment. Many applications are free of charge, but the service providers grab metadata of the user and send these information to their servers even sometimes without the knowledge of the users. • Metadata means any type of data which includes different information about a user, such as location, name, contact information, creator of data, contact list, type of operating system, etc….
  • 7. Disadvantage of Existing Systems • It not secured privacy issues • Encrypted data can store and retrieve in that system accessing offline • Encrypt algorithms are commonly used • It less integrity • Encryption plays a major role, but decryption plays not match
  • 8. Proposed system • The proposed system suggests a new method of how the messages are stored. • This proposed system aims to fill this gap by providing an advanced level of chatting protection algorithms. • This algorithm works with both private key and public key. Only the encrypted file will be uploading to the server. • In this application have protect spams, malware attacks, advertisement.
  • 9. Advantages of Proposed Systems • It is more secured for protect spams, advertisement, malware attacks. • Encrypted Data not store and retrieve in that system, save in online Database. • It is more integrity. • ‘N’ no.of users connected with stable performance. • Using new encryption algorithm. • Encryption and Decryption is plays main role.
  • 10. Modules 1. Server Module 2. Client Module 3. Authentication Module 4. Discover Friends Module 5. Request Module 6. Conversation Module
  • 11. Server Modules:- – A Server is a specially equipped Mobiles connected to the internet that allowsusers with chat clients to converse with one another via typed messages in real time. Client Modules:- – A Client is a Software program that allows users to connected to chat servers and communicate with other users via a chat room.
  • 12. Authentication Module • Authentication is one of the most important aspects of security. • This avoids any type of attack or malicious activity by which a malicious user impersonates the user and identifies himself as the real user to the server. • There are different practices to perform such authentication such as one-time passwords (OTP) and certificate-based authentication (CBA). • In one-time password, a shared secret key is stored on a device that the entity has, and the system issues one-time passwords based on this shared secret key.
  • 13. Discover Friends Module • The Discover Friends Module is to show all users id and profiles. • The user can who wants to chat when give the request to that user, and also who wants to block chat when user can then remove user from contact list. • User have already request then user can accept that request.
  • 14. Request’s Module • The Request’s module is shows who wants to send request and also who wants to user receive requests list are shown. • If user interest to chat that user when accept the request other wise user can cancel requests.
  • 15. Conversation Module • The Conversation module is to show the chat contacts. Here we choose who wants to chat (private) to select on the contact. • Once you select contact when instantly create a page and ready to connection chat with that user. • In this page user can type text message and the key for encryption that message will encrypted and sent it. Receiver can decrypt that message using the same key. • Here the another way to secure, don’t have take screenshot or screen recorder at this module.
  • 19.
  • 21. Screenshots Signup page Login Page Forgot Password
  • 22. Account Settings Home Page Options
  • 23. Find Friends Page Profile Page Request sent to others
  • 24. Request from others Chat Page Individual Chat
  • 25. Decrypt Message Using Key View message
  • 27. Conclusion • Users can be confident that nobody can read their messages; even provider of the service also cannot read their messages. • Even the mobile phone reaches to wrong hands, no readable information can be extracted from the physical memory of the phone.
  • 28. Future Enhancement • In future this project can be developed to share the documents, images, audio and video in a secure way and also to provide advanced encryption algorithms to encrypt those multimedia files which has to share securely. • The next level to develop the video conference call and voice conference call will also be included.
  • 29. References • [1]Barry A. Burd ,‟Android Application Development All in One”, Wiley, 2015. • [2] Ed Burnette,‟Hello, Android: Introducing Google‟s Mobile Development Platform‟ third edition‟ Pragmatic Programmers,2013. • [3] https://developer.android.com/guide • [4] https://developer.android.com/design • [5] https://developer.android.com/reference