1. SMT K.G. MITTAL COLLEGE OF ARTS & COMMERCE
Project Synopsis
Title: Sendingasecure Message overNetworkUsinganyEncryptionAlgorithm.
Team:
Team Member: AvadheshGupta (13)
MukeshYadav (50)
Introduction
Data communicationisan importance aspectof our living. A cryptosystemdefinesapairof data
transformcalled encryptionanddecryption.Encryptionisappliedtothe plaintexti.e.the datatobe
communicatedtoproduce cipher texti.e.encrypteddatausingencryption key.Decryption usesthe
decryptionkeytoconvertciphertexttoplain texttoplaintexti.e.the original data. Now,if the
encryptionkeyandthe decryptionkeyisthe same orone can be derivedfromthe otherthenitissaidto
be SymmetricCryptography.Itusesa pairof relatedkeysone forencryptionandotherfordecryption.
One keywhichiscalledthe private key,iskeptsecretandotherone know as publickeyisdisclosed.The
message isencryptedwithpublickeyandcan onlybe decryptedbyusingthe private key. Here, we are
analysesthe frequencyof sendingandreceivingof the massage fromboth side.
Objective/Aim
Thisprojectaimsto developinghighlysimple andsecretwaytosenda message overa internet. Many
timesusersendthe message overthe network, there are manyhackerare active onthe internetin
eavesdroppingg. Inthistime hackercan create trafficandtheycan anonymously observemessage
type. Thisinformation mightbe useful inguessingthe nature of the communicationthatwastaking
place.If we had encryptionprotection place, anopponentmightstillbe able toobserve the patternof
these message. We cansay itcan be a Passive Attack. Because the passive attacksare verydifficultto
detectbecause theydonotinvolve anyalterationof the data. To preventthe successof theirattacks,
usually bymeansof encryption.
YOur mainreasonto make thisprojectisto preventthe data they are travel overthe internetis tobe
secure andpreventthe accessof Hacker.Here,we are encryptingthe message usingthe verypopular
and powerful algorithm“Mono-Alphabetic“.
2. Module
1. Here, userina senderandanotheruserisan receiver.
2. The exchangesof message orchat are done overa LAN (Local AreaNetwork).
3. Here,we are using“Mono-Alphabetic”algorithmforencryptionanddecryption both.
4. Algorithmsare basedonJavalanguage.
Technical Details
Windows7
1 GB RAM
50 GB ROM(HDD)
Innovativeness&Usefulness
Helpto choose betterCryptographyalgorithm. Dependuponrequirementsandneedof the enduser
and customerisbetteroptiontochoose.
CurrentStatusof Development
DesigningGUI
ChoosingAlgorithmforEncryptionandDecryption
ConfiguringOperation System..OS
LAN NetworkConfiguring
Anything elsewhich onemay wantto add on ……