In this project is to communicate with people with a secure End-to-End Encryption and secure way to communicate.
We have discover to how to implement miniproject into ppt documentation.
1. Whatscrypt Messenger Application
Team Members:-
M. Muthukumaran(513117621307)
A.Vinothkumar(513117621319)
Guided By:- D. Sandheep(513117621315)
Mr.N.Santhosh,M.C.A., Asst.prof., T. Santhosh kumar(513117621329)
3. Requirements
• Hardware
– Processor : i3 or above.
– Processer speed : 3.00GHz
– Hard disk : 300GB
– RAM : 4 GB or above
– Monitor : super VGA(17 inch)
– Keyboard : Logitech (103 keys)
– Mouse : Logitech or Optical
4. • Software
– IDE : Android Studio 3.4.1 (Stable)
– DB : Firebse
– OS : Windows 7,8,10, Linux.
– Mobile Os : Kitkat or above Versions
– Virtual Box : Genymotion 6.0
5. Abstract
• Whatscrypt application design which protects its users with better
integrity, confidentiality and privacy.
• The purpose of the Whatscrypt application is to allow users to
communicate and chat securely with each other, to use advanced
Encryption algorithoms.
• The users will be able to chat with each other, most likely from
user to user. Also one user can send one message to many users by
forming a group so that all the contacts can receive same message.
6. Existing System
• Privacy of a user is related to and based on a metadata that an
application can collect and send to a second or third party.
• Unfortunately privacy is one of the factors that is getting sacrificed in
the current mobile application environment. Many applications are free
of charge, but the service providers grab metadata of the user and send
these information to their servers even sometimes without the
knowledge of the users.
• Metadata means any type of data which includes different information
about a user, such as location, name, contact information, creator of
data, contact list, type of operating system, etc….
7. Disadvantage of Existing Systems
• It not secured privacy issues
• Encrypted data can store and retrieve in that system accessing
offline
• Encrypt algorithms are commonly used
• It less integrity
• Encryption plays a major role, but decryption plays not match
8. Proposed system
• The proposed system suggests a new method of how the messages
are stored.
• This proposed system aims to fill this gap by providing an
advanced level of chatting protection algorithms.
• This algorithm works with both private key and public key. Only
the encrypted file will be uploading to the server.
• In this application have protect spams, malware attacks,
advertisement.
9. Advantages of Proposed Systems
• It is more secured for protect spams, advertisement, malware
attacks.
• Encrypted Data not store and retrieve in that system, save in online
Database.
• It is more integrity.
• ‘N’ no.of users connected with stable performance.
• Using new encryption algorithm.
• Encryption and Decryption is plays main role.
11. Server Modules:-
– A Server is a specially equipped Mobiles connected to the internet that
allowsusers with chat clients to converse with one another via typed
messages in real time.
Client Modules:-
– A Client is a Software program that allows users to connected to chat
servers and communicate with other users via a chat room.
12. Authentication Module
• Authentication is one of the most important aspects of security.
• This avoids any type of attack or malicious activity by which a
malicious user impersonates the user and identifies himself as the real
user to the server.
• There are different practices to perform such authentication such as
one-time passwords (OTP) and certificate-based authentication (CBA).
• In one-time password, a shared secret key is stored on a device that the
entity has, and the system issues one-time passwords based on this
shared secret key.
13. Discover Friends Module
• The Discover Friends Module is to show all users id and profiles.
• The user can who wants to chat when give the request to that user,
and also who wants to block chat when user can then remove user
from contact list.
• User have already request then user can accept that request.
14. Request’s Module
• The Request’s module is shows who wants to send request and
also who wants to user receive requests list are shown.
• If user interest to chat that user when accept the request other wise
user can cancel requests.
15. Conversation Module
• The Conversation module is to show the chat contacts. Here we
choose who wants to chat (private) to select on the contact.
• Once you select contact when instantly create a page and ready to
connection chat with that user.
• In this page user can type text message and the key for encryption
that message will encrypted and sent it. Receiver can decrypt that
message using the same key.
• Here the another way to secure, don’t have take screenshot or
screen recorder at this module.
27. Conclusion
• Users can be confident that nobody can read their messages; even
provider of the service also cannot read their messages.
• Even the mobile phone reaches to wrong hands, no readable
information can be extracted from the physical memory of the
phone.
28. Future Enhancement
• In future this project can be developed to share the documents,
images, audio and video in a secure way and also to provide
advanced encryption algorithms to encrypt those multimedia files
which has to share securely.
• The next level to develop the video conference call and voice
conference call will also be included.
29. References
• [1]Barry A. Burd ,‟Android Application Development All in One”,
Wiley, 2015.
• [2] Ed Burnette,‟Hello, Android: Introducing Google‟s Mobile
Development Platform‟ third edition‟ Pragmatic
Programmers,2013.
• [3] https://developer.android.com/guide
• [4] https://developer.android.com/design
• [5] https://developer.android.com/reference