SlideShare a Scribd company logo
1 of 29
Whatscrypt Messenger Application
Team Members:-
M. Muthukumaran(513117621307)
A.Vinothkumar(513117621319)
Guided By:- D. Sandheep(513117621315)
Mr.N.Santhosh,M.C.A., Asst.prof., T. Santhosh kumar(513117621329)
Project Scope
• Privacy
• Secure
• Purpose of Encryption
• What is Encryption
Requirements
• Hardware
– Processor : i3 or above.
– Processer speed : 3.00GHz
– Hard disk : 300GB
– RAM : 4 GB or above
– Monitor : super VGA(17 inch)
– Keyboard : Logitech (103 keys)
– Mouse : Logitech or Optical
• Software
– IDE : Android Studio 3.4.1 (Stable)
– DB : Firebse
– OS : Windows 7,8,10, Linux.
– Mobile Os : Kitkat or above Versions
– Virtual Box : Genymotion 6.0
Abstract
• Whatscrypt application design which protects its users with better
integrity, confidentiality and privacy.
• The purpose of the Whatscrypt application is to allow users to
communicate and chat securely with each other, to use advanced
Encryption algorithoms.
• The users will be able to chat with each other, most likely from
user to user. Also one user can send one message to many users by
forming a group so that all the contacts can receive same message.
Existing System
• Privacy of a user is related to and based on a metadata that an
application can collect and send to a second or third party.
• Unfortunately privacy is one of the factors that is getting sacrificed in
the current mobile application environment. Many applications are free
of charge, but the service providers grab metadata of the user and send
these information to their servers even sometimes without the
knowledge of the users.
• Metadata means any type of data which includes different information
about a user, such as location, name, contact information, creator of
data, contact list, type of operating system, etc….
Disadvantage of Existing Systems
• It not secured privacy issues
• Encrypted data can store and retrieve in that system accessing
offline
• Encrypt algorithms are commonly used
• It less integrity
• Encryption plays a major role, but decryption plays not match
Proposed system
• The proposed system suggests a new method of how the messages
are stored.
• This proposed system aims to fill this gap by providing an
advanced level of chatting protection algorithms.
• This algorithm works with both private key and public key. Only
the encrypted file will be uploading to the server.
• In this application have protect spams, malware attacks,
advertisement.
Advantages of Proposed Systems
• It is more secured for protect spams, advertisement, malware
attacks.
• Encrypted Data not store and retrieve in that system, save in online
Database.
• It is more integrity.
• ‘N’ no.of users connected with stable performance.
• Using new encryption algorithm.
• Encryption and Decryption is plays main role.
Modules
1. Server Module
2. Client Module
3. Authentication Module
4. Discover Friends Module
5. Request Module
6. Conversation Module
Server Modules:-
– A Server is a specially equipped Mobiles connected to the internet that
allowsusers with chat clients to converse with one another via typed
messages in real time.
Client Modules:-
– A Client is a Software program that allows users to connected to chat
servers and communicate with other users via a chat room.
Authentication Module
• Authentication is one of the most important aspects of security.
• This avoids any type of attack or malicious activity by which a
malicious user impersonates the user and identifies himself as the real
user to the server.
• There are different practices to perform such authentication such as
one-time passwords (OTP) and certificate-based authentication (CBA).
• In one-time password, a shared secret key is stored on a device that the
entity has, and the system issues one-time passwords based on this
shared secret key.
Discover Friends Module
• The Discover Friends Module is to show all users id and profiles.
• The user can who wants to chat when give the request to that user,
and also who wants to block chat when user can then remove user
from contact list.
• User have already request then user can accept that request.
Request’s Module
• The Request’s module is shows who wants to send request and
also who wants to user receive requests list are shown.
• If user interest to chat that user when accept the request other wise
user can cancel requests.
Conversation Module
• The Conversation module is to show the chat contacts. Here we
choose who wants to chat (private) to select on the contact.
• Once you select contact when instantly create a page and ready to
connection chat with that user.
• In this page user can type text message and the key for encryption
that message will encrypted and sent it. Receiver can decrypt that
message using the same key.
• Here the another way to secure, don’t have take screenshot or
screen recorder at this module.
Architecture of Whatscrypt Messenger
Use-Case Diagrams
Sequence Diagram
Class Diagram
Screenshots
Signup page Login Page Forgot Password
Account Settings Home Page Options
Find Friends Page Profile Page Request sent to others
Request from others Chat Page Individual Chat
Decrypt Message Using Key View message
Feedback Page
Conclusion
• Users can be confident that nobody can read their messages; even
provider of the service also cannot read their messages.
• Even the mobile phone reaches to wrong hands, no readable
information can be extracted from the physical memory of the
phone.
Future Enhancement
• In future this project can be developed to share the documents,
images, audio and video in a secure way and also to provide
advanced encryption algorithms to encrypt those multimedia files
which has to share securely.
• The next level to develop the video conference call and voice
conference call will also be included.
References
• [1]Barry A. Burd ,‟Android Application Development All in One”,
Wiley, 2015.
• [2] Ed Burnette,‟Hello, Android: Introducing Google‟s Mobile
Development Platform‟ third edition‟ Pragmatic
Programmers,2013.
• [3] https://developer.android.com/guide
• [4] https://developer.android.com/design
• [5] https://developer.android.com/reference

More Related Content

What's hot

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
Sarath K
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 

What's hot (20)

Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
INFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITYINFORMATION AND CYBER SECURITY
INFORMATION AND CYBER SECURITY
 
3D password
3D password 3D password
3D password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
Computer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOVComputer Security Primer - Eric Vanderburg - JURINNOV
Computer Security Primer - Eric Vanderburg - JURINNOV
 
3D password
3D password3D password
3D password
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Multi Factor Authentication using 3D password
Multi Factor Authentication using 3D passwordMulti Factor Authentication using 3D password
Multi Factor Authentication using 3D password
 
Location based authentication new words approch secuirity
Location based authentication new words approch secuirityLocation based authentication new words approch secuirity
Location based authentication new words approch secuirity
 
Welcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authenticationWelcome to the 3rd generation in user authentication
Welcome to the 3rd generation in user authentication
 
Malwares
MalwaresMalwares
Malwares
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
3D-Password
3D-Password 3D-Password
3D-Password
 

Similar to Whatscrypt Messenger for android project

Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
Adz91 Digital Ads Pvt Ltd
 
Security on android
Security on androidSecurity on android
Security on android
pk464312
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
DEEPAK948083
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
Susmitha Reddy
 

Similar to Whatscrypt Messenger for android project (20)

Arbina project
Arbina projectArbina project
Arbina project
 
Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...Shared authority based privacy preserving authentication protocol in cloud co...
Shared authority based privacy preserving authentication protocol in cloud co...
 
Client server chat
Client server chatClient server chat
Client server chat
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
Security on android
Security on androidSecurity on android
Security on android
 
Paper2
Paper2Paper2
Paper2
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITYMOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
 
Internet security evaluation system documentation nikitha
Internet security evaluation system documentation nikithaInternet security evaluation system documentation nikitha
Internet security evaluation system documentation nikitha
 
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
A NETWORK CODING AND DES BASED DYNAMIC ENCRYPTION SCHEME FOR MOVING TARGET DE...
 
Single Sign-On & Strong Authentication
Single Sign-On & Strong AuthenticationSingle Sign-On & Strong Authentication
Single Sign-On & Strong Authentication
 
finale.ppt.pptx
finale.ppt.pptxfinale.ppt.pptx
finale.ppt.pptx
 
enhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloudenhanced secure multi keyword top k retrieval in cloud
enhanced secure multi keyword top k retrieval in cloud
 
Cyber security workshop talk.pptx
Cyber security workshop talk.pptxCyber security workshop talk.pptx
Cyber security workshop talk.pptx
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Enumeration and system hacking
Enumeration and system hackingEnumeration and system hacking
Enumeration and system hacking
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Computer Networks 4
Computer Networks 4Computer Networks 4
Computer Networks 4
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Whatscrypt Messenger for android project

  • 1. Whatscrypt Messenger Application Team Members:- M. Muthukumaran(513117621307) A.Vinothkumar(513117621319) Guided By:- D. Sandheep(513117621315) Mr.N.Santhosh,M.C.A., Asst.prof., T. Santhosh kumar(513117621329)
  • 2. Project Scope • Privacy • Secure • Purpose of Encryption • What is Encryption
  • 3. Requirements • Hardware – Processor : i3 or above. – Processer speed : 3.00GHz – Hard disk : 300GB – RAM : 4 GB or above – Monitor : super VGA(17 inch) – Keyboard : Logitech (103 keys) – Mouse : Logitech or Optical
  • 4. • Software – IDE : Android Studio 3.4.1 (Stable) – DB : Firebse – OS : Windows 7,8,10, Linux. – Mobile Os : Kitkat or above Versions – Virtual Box : Genymotion 6.0
  • 5. Abstract • Whatscrypt application design which protects its users with better integrity, confidentiality and privacy. • The purpose of the Whatscrypt application is to allow users to communicate and chat securely with each other, to use advanced Encryption algorithoms. • The users will be able to chat with each other, most likely from user to user. Also one user can send one message to many users by forming a group so that all the contacts can receive same message.
  • 6. Existing System • Privacy of a user is related to and based on a metadata that an application can collect and send to a second or third party. • Unfortunately privacy is one of the factors that is getting sacrificed in the current mobile application environment. Many applications are free of charge, but the service providers grab metadata of the user and send these information to their servers even sometimes without the knowledge of the users. • Metadata means any type of data which includes different information about a user, such as location, name, contact information, creator of data, contact list, type of operating system, etc….
  • 7. Disadvantage of Existing Systems • It not secured privacy issues • Encrypted data can store and retrieve in that system accessing offline • Encrypt algorithms are commonly used • It less integrity • Encryption plays a major role, but decryption plays not match
  • 8. Proposed system • The proposed system suggests a new method of how the messages are stored. • This proposed system aims to fill this gap by providing an advanced level of chatting protection algorithms. • This algorithm works with both private key and public key. Only the encrypted file will be uploading to the server. • In this application have protect spams, malware attacks, advertisement.
  • 9. Advantages of Proposed Systems • It is more secured for protect spams, advertisement, malware attacks. • Encrypted Data not store and retrieve in that system, save in online Database. • It is more integrity. • ‘N’ no.of users connected with stable performance. • Using new encryption algorithm. • Encryption and Decryption is plays main role.
  • 10. Modules 1. Server Module 2. Client Module 3. Authentication Module 4. Discover Friends Module 5. Request Module 6. Conversation Module
  • 11. Server Modules:- – A Server is a specially equipped Mobiles connected to the internet that allowsusers with chat clients to converse with one another via typed messages in real time. Client Modules:- – A Client is a Software program that allows users to connected to chat servers and communicate with other users via a chat room.
  • 12. Authentication Module • Authentication is one of the most important aspects of security. • This avoids any type of attack or malicious activity by which a malicious user impersonates the user and identifies himself as the real user to the server. • There are different practices to perform such authentication such as one-time passwords (OTP) and certificate-based authentication (CBA). • In one-time password, a shared secret key is stored on a device that the entity has, and the system issues one-time passwords based on this shared secret key.
  • 13. Discover Friends Module • The Discover Friends Module is to show all users id and profiles. • The user can who wants to chat when give the request to that user, and also who wants to block chat when user can then remove user from contact list. • User have already request then user can accept that request.
  • 14. Request’s Module • The Request’s module is shows who wants to send request and also who wants to user receive requests list are shown. • If user interest to chat that user when accept the request other wise user can cancel requests.
  • 15. Conversation Module • The Conversation module is to show the chat contacts. Here we choose who wants to chat (private) to select on the contact. • Once you select contact when instantly create a page and ready to connection chat with that user. • In this page user can type text message and the key for encryption that message will encrypted and sent it. Receiver can decrypt that message using the same key. • Here the another way to secure, don’t have take screenshot or screen recorder at this module.
  • 19.
  • 21. Screenshots Signup page Login Page Forgot Password
  • 22. Account Settings Home Page Options
  • 23. Find Friends Page Profile Page Request sent to others
  • 24. Request from others Chat Page Individual Chat
  • 25. Decrypt Message Using Key View message
  • 27. Conclusion • Users can be confident that nobody can read their messages; even provider of the service also cannot read their messages. • Even the mobile phone reaches to wrong hands, no readable information can be extracted from the physical memory of the phone.
  • 28. Future Enhancement • In future this project can be developed to share the documents, images, audio and video in a secure way and also to provide advanced encryption algorithms to encrypt those multimedia files which has to share securely. • The next level to develop the video conference call and voice conference call will also be included.
  • 29. References • [1]Barry A. Burd ,‟Android Application Development All in One”, Wiley, 2015. • [2] Ed Burnette,‟Hello, Android: Introducing Google‟s Mobile Development Platform‟ third edition‟ Pragmatic Programmers,2013. • [3] https://developer.android.com/guide • [4] https://developer.android.com/design • [5] https://developer.android.com/reference