SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5080
Corporate Message Filtration & Security via 3-DES
Nischal Jakhar1, Puranjai Mendiratta2, Vinay Singh3, Utsav Chadha4, Varsha Sharma5
1,2,3,4Department of Information Technology, Bhagwan Parshuram Institute of Technology, New Delhi, India
5Assistant Professor, Department of Information Technology, Bhagwan Parshuram Institute of Technology,
New Delhi, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today's corporate world loyalty has becomea
necessity. This can't be purchased but can be monitored. This
system is developed to monitor the communication between
different employees by the manager. This system filters the
unwanted and inappropriate messages which are against the
corporate policies and gives manager the power to take
actions against the defaulters using a defaulter score matrix
which is maintained for all the employees working in the
organization. This application respects the privacy and the
presence of sensitive data and hence uses a good encryption
and decryption system which is 3-DES triple key version. This
system prevents the flow of spam, sensitive data within the
organization.
Key Words: 3-DES, Corporate, Message Filtration,
Privacy, Security
1.INTRODUCTION
This system is going to help the corporates maintain a loyal
environment within the organization. Since communication
within the organization is the backbone of effective
functioning of any corporate, preserving integrity and
confidentiality of messages is paramount. Without a proper
communication system, corporate world can't survive the
battle. There is a need of a secure, safe, system that can
facilitate the manager with the features that include
monitoring the employee’s communication. This system
allows filtration of messages based on blocked words list.
Any dubious content that is being sent will be blocked and
the employee will be assigned defaulter points in the
defaulter score matrix. Messages in the inbox are given
priority rating. Thissystem uses 3-DES encryptionalgorithm
to enhance the security of communication.
1.1 3-DES TRIPLE KEY ALGORITHM
3-DES has two-key and three-key versions. In the two-key
version, the same algorithm runs three times,butusesK1for
the first and last steps where K means key. In other words,
K1 = K3. Note that if K1 = K2 = K3, then Triple DES is Single
DES.
We use three-key version of Triple DES.
Triple DES operates in three steps: Encrypt-Decrypt-Encrypt
(EDE).
It works by taking three 56-bit keys (K1, K2 and K3), and
encrypting first with K1, decrypting next with K2 and
encrypting a last time with K3.
Two-key Triple DES (which is no longer approved for
encryption due to its susceptibility to brute force attacks)
thus has 112 bits of strength (56 multiplied bytwo).Because
of meet-in-the-middle attacks, Double DES is only one bit
stronger than Single DES. So, we are using Three-key
version.
Triple DES is stronger than 112 bits. It is somewhere
between 113 and 167.
Due to its Feistel structure and uncomplicated logic, DES is
relatively easy to implement. However, it uses eight distinct
S-Boxes, which increases its footprint. DES is broken but
3DES is safe and cracking it would be very time consuming
and tuff.
2. PROPOSED SYSTEM
"Corporate Message Filtration & Security via 3-DES"
provides an effectiveway ofcommunicationwhichpreserves
integrity and confidentiality of the message. Messages
containing suspicious contents will be blocked and can be
viewed by the admin/manager. Triple-DES encryption
technique is used to encrypt message contents for secure
communication. An employee feed is provided similar to a
discussion forum. Other basic functionalities related to
messaging are provided.
2.1 Functions
 Monitoring and filtration of messages.
 Provides secure communication between admin
and employee.
 Maintain a Defaulter Score Matrix.
 Provides an employee feed which acts a discussion
forum within the organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5081
2.2 Important Features
 Login and registration system is provided where
employees can register and login into the system
 Employee feed is provided where employees can
post, comment and like. These posts can be viewed
by all the other employees
 This system helps managers to see the blocked
messages and gives them power to act against that
employee (e.g. terminating employee’s account)
 A Defaulter Score Matrix is created and updated
based on the professional behavior of the
employees
 This system uses 3-DES triple key algorithm to
encrypt and decrypt the communication.
3. IMPLEMENTATION
3.1 Authorization & Authentication Module
 One step authentication is used to determine the
identity of employee or admin/manager.
 Login credentials are read from input text field and
the record with same credentials is fetched via SQL
query from database.
 If the credentials match, then identity of the user is
confirmed and the now the user is granted access.
 User registration functionality is embedded in the
system which takes necessary user information to
create an account.
 In case user forgets password he/she can answer
the security question to set the password again.
 There are two types of user entities: employee and
admin (manager).Functionalities provided tothem
after authorizationand authenticationareprovided
as follows
Fig -1: Log In Panel
The figure above is login panel screenshot which is asking
for Username and Password.
Fig -2: New Employee Registration Panel
The figure shows the registration page for new employees.
3.2 Employee Module
 Each employee is assigned a unique employee id.
 Compose message – employee name is selected
from the drop-down list and subject, message body
is composed and message is sent.
 Message inbox – A list of received messages appear
with subject, message body, sender, message idand
any message can be viewed/deleted upon selection.
Eachmessage isassigned a priorityrating.Messages
received from admin needs to be decryptedwiththe
help of a key.
 Sent Messages - A list of send messages appearwith
subject, message body,recipient,messageidandany
message can be deleted upon selection.
 Employee feed – can be accessed by employees
where any registered user can create a post, view
likes, view comments, like, comment on the post. It
can be used as a discussion forum within an
organization.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5082
Fig -3: Employee message area
The above figure shows that employee can send and access
messages.
3.3 Admin/Manager Module
 Blocked Messages - A list of blocked messages is
displayed with sender name, recipient name,
message id and message contents. Blocked
messages can be viewed and deleted from the list.
 Add blocked words/phrases - Words orphrasescan
be added to the blocked words list. Messages
containing these words will be blocked.
 Blocked words - Alist of blocked words isdisplayed
where words can be deleted upon selection.
 Employee list – A list of registered employees is
displayed with their username, email id, address
and employee id. Admin is authorized to delete any
user from the list whichwould result In termination
of that user’s account.
 Compose secure message - A secure message is
composed with the help of triple DES encryption
where the sensitive information sent by admin to
other employees is encrypted. Employee name is
selected from the drop-down list and subject,
message body is composed. Appropriate key is
chosen by admin for encryption.
Fig -4: Admin Panel
The above figure shows the admin panel menu.
3.4 Message Flow
 Employee to Employee – Employee to Employee
messages are sent via the admin. Admin monitors
the content of the message. A search algorithm is
applied on the message, if any dubious content
(which matches the content in ‘blockedwordslist’is
found, message is blocked.
 Admin to Employee – 3-DES encryptionalgorithmis
used to encrypt the message sent by admin to an
employee. Employee decrypts via a key to view
message received from admin. MIME, SSL, SMTP
protocols are used via javax.mail.package.
Fig -5: Level-1 Data flow diagram
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5083
The figure above shows the flow of data in our system.
3.5 Triple DES Encryption
 Classes from javax.crypto and javax.crypto.spec
package are used to design 3-DES encrypt and
decrypt methods.
 Both the methods take message and key as the
parameters.
 Encryption is done on the admin module.
Decryption is done on the employee module. Same
key is used by both the entities for encryption and
decryption. Admincan send sensitiveinformationto
an employee easily.
Fig -6: Message Encrypt and decrypt panel
The figure shows the decrypt option in employee module.
3.6 Defaulter Score Matrix
 A defaulter score matrix is created to track an
employee's professional behavior.
 An Employee x Points matrix is created where each
employee is assigned some points.
 Points are assigned based on how frequently an
employee uses words from blocked words list.
 An algorithm is designed in such a way that it maps
blocked words used per message to the defaulter
points.
 Input given to the algorithm is number of blocked
words used per message.
 Output is the number of defaulter points which is
added to the final tally of the employee.
 Higher defaulter score means an employee is
susceptible to disciplinary actions (stripping off
perks, sacking).
4. CONCLUSION
Our approach of developing “Corporate message Filtration
Using Triple DES” will prove successful and practical, as it
will demonstrate its suitability for solving many issues
among employees and avoid creating terrific problemdueto
bad messages. From this Message system, we can obtain
useful information for future work. Further development
includes Triple DES algorithm for security problem of more
than one department at same time. Also, improving problem
modeling and searchtechnique, reducingexecutiontimeand
enhancinggraphical user interface. More research is needed
to complete our interactive, automatic message system. The
methods, techniques and concepts developed will be tested
on more datasets and applications. This application avoids
the manual work and the problems concerned with it. In
future, we can add more security algorithms to increase the
security of the messages. Functionalities such as generating
automatic notification and scheduling of messages can be
added. 2-step or 3-step authentication can bolster the
security of the system preventing brute force attacks.
REFERENCES
[1] "A Detailed Description of DES and 3DES Algorithms
(Data Encryption Standard and Triple DES) |
CommonLounge", Commonlounge.com, 2019. [Online].
Available:
https://www.commonlounge.com/discussion/5c7c282
8bf6b4724b806a9013a5a4b99. [Accessed: 01- Jan-
2019]
[2] "Triple DES: How strong is the data encryption
standard?", SearchSecurity, 2019. [Online]. Available:
https://searchsecurity.techtarget.com/tip/Expert-
advice-Encryption-101-Triple-DES-explained.
[Accessed: 10- Jan- 2019]
[3] Patrick Norton & Herbert Schildt - Java 2: The Complete
Reference, McGraw Hill Education (India) Private
Limited; 8th edition
[4] Comparison of DES, T. Pornin, B. RAM, K. Gera and I.
Boyd, "Comparison of DES, Triple DES, AES, blowfish
encryption for data", Stack Overflow, 2019. [Online].
Available:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5084
http://stackoverflow.com/questions/5554526/compari
son-of-des-triple-des-aes- blowfish-encryption-for-
data/5559132#5559132. [Accessed: 02- Feb- 2019]
[5] Roger S. Pressman - Software Engineering: A Practical
Approach, McGraw Hill Higher Education, 8th edition,
2014
[6] Abraham Silberschatz, Henry F. Korth, S. Sudarshan –
Database System Concepts, McGraw Hill Education; 6th
edition
BIOGRAPHIES
Nischal Jakhar : a bachelor's
student in the Information
Technology at Bhagwan
Parshuram Institute of
Technology, NewDelhi,India
Puranjai Mendiratta : a
bachelor's student in the
Information Technology at
Bhagwan Parshuram
Institute of Technology,New
Delhi, India
Vinay Singh : a bachelor's
student in the Information
Technology at Bhagwan
Parshuram Institute of
Technology, NewDelhi,India
Utsav Chadha : a bachelor's
student in the Information
Technology at Bhagwan
Parshuram Institute of
Technology, NewDelhi,India
Ms Varsha Sharma : is an
assistant professor in
Information Technology
department at Bhagwan
Parshuram Institute of
Technology, NewDelhi,India

More Related Content

What's hot

Software Requirement Specification - Software Pack Solution 14
Software Requirement Specification - Software Pack Solution 14Software Requirement Specification - Software Pack Solution 14
Software Requirement Specification - Software Pack Solution 14Syed Farjad Zia Zaidi
 
EXIN Cloud Computing Foundation basic training material
EXIN Cloud Computing Foundation basic training materialEXIN Cloud Computing Foundation basic training material
EXIN Cloud Computing Foundation basic training materialAdept Technologies pvt ltd
 
Recriutment system
Recriutment system Recriutment system
Recriutment system ViMal RaJa
 
Internet mail system java project
Internet mail system java projectInternet mail system java project
Internet mail system java projectTutorial Learners
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM csandit
 

What's hot (9)

Dhinakar (1)
Dhinakar (1)Dhinakar (1)
Dhinakar (1)
 
CV_RAHIM_
CV_RAHIM_CV_RAHIM_
CV_RAHIM_
 
Software Requirement Specification - Software Pack Solution 14
Software Requirement Specification - Software Pack Solution 14Software Requirement Specification - Software Pack Solution 14
Software Requirement Specification - Software Pack Solution 14
 
Srs document
Srs documentSrs document
Srs document
 
EXIN Cloud Computing Foundation basic training material
EXIN Cloud Computing Foundation basic training materialEXIN Cloud Computing Foundation basic training material
EXIN Cloud Computing Foundation basic training material
 
Recriutment system
Recriutment system Recriutment system
Recriutment system
 
Internet mail system java project
Internet mail system java projectInternet mail system java project
Internet mail system java project
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
Ems
EmsEms
Ems
 

Similar to Corporate Message Filtration & Security via 3-DES Encryption

IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DESIRJET Journal
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth TechnologyIRJET Journal
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACIRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSIRJET Journal
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail DetectionIRJET Journal
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET Journal
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakIRJET Journal
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and SecureIRJET Journal
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET Journal
 
IRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in CloudSecure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in CloudIRJET Journal
 

Similar to Corporate Message Filtration & Security via 3-DES Encryption (20)

IRJET- A Work Paper on Email Server using 3DES
IRJET-  	  A Work Paper on Email Server using 3DESIRJET-  	  A Work Paper on Email Server using 3DES
IRJET- A Work Paper on Email Server using 3DES
 
IRJET- Smart Mobile Attendance System using Bluetooth Technology
IRJET-  	  Smart Mobile Attendance System using Bluetooth TechnologyIRJET-  	  Smart Mobile Attendance System using Bluetooth Technology
IRJET- Smart Mobile Attendance System using Bluetooth Technology
 
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMACSecure Data Storage and Forwarding in Cloud Using AES and HMAC
Secure Data Storage and Forwarding in Cloud Using AES and HMAC
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDSDATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
DATA SECURITY ON VIRTUAL ENVIRONMENT USING ENCRYPTION STANDARDS
 
IRJET- Suspicious Mail Detection
IRJET-  	  Suspicious Mail DetectionIRJET-  	  Suspicious Mail Detection
IRJET- Suspicious Mail Detection
 
Paper2
Paper2Paper2
Paper2
 
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud StorageIRJET- Multiple Keyword Search for Encrypted Cloud Storage
IRJET- Multiple Keyword Search for Encrypted Cloud Storage
 
A System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data LeakA System for Detection and Prevention of Data Leak
A System for Detection and Prevention of Data Leak
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
IRJET- Document Management System, Open Source and Secure
IRJET-  	  Document Management System, Open Source and SecureIRJET-  	  Document Management System, Open Source and Secure
IRJET- Document Management System, Open Source and Secure
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
IRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High AuthenticationIRJET- Employee Task Management System with High Authentication
IRJET- Employee Task Management System with High Authentication
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in CloudSecure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in Cloud
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Corporate Message Filtration & Security via 3-DES Encryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5080 Corporate Message Filtration & Security via 3-DES Nischal Jakhar1, Puranjai Mendiratta2, Vinay Singh3, Utsav Chadha4, Varsha Sharma5 1,2,3,4Department of Information Technology, Bhagwan Parshuram Institute of Technology, New Delhi, India 5Assistant Professor, Department of Information Technology, Bhagwan Parshuram Institute of Technology, New Delhi, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today's corporate world loyalty has becomea necessity. This can't be purchased but can be monitored. This system is developed to monitor the communication between different employees by the manager. This system filters the unwanted and inappropriate messages which are against the corporate policies and gives manager the power to take actions against the defaulters using a defaulter score matrix which is maintained for all the employees working in the organization. This application respects the privacy and the presence of sensitive data and hence uses a good encryption and decryption system which is 3-DES triple key version. This system prevents the flow of spam, sensitive data within the organization. Key Words: 3-DES, Corporate, Message Filtration, Privacy, Security 1.INTRODUCTION This system is going to help the corporates maintain a loyal environment within the organization. Since communication within the organization is the backbone of effective functioning of any corporate, preserving integrity and confidentiality of messages is paramount. Without a proper communication system, corporate world can't survive the battle. There is a need of a secure, safe, system that can facilitate the manager with the features that include monitoring the employee’s communication. This system allows filtration of messages based on blocked words list. Any dubious content that is being sent will be blocked and the employee will be assigned defaulter points in the defaulter score matrix. Messages in the inbox are given priority rating. Thissystem uses 3-DES encryptionalgorithm to enhance the security of communication. 1.1 3-DES TRIPLE KEY ALGORITHM 3-DES has two-key and three-key versions. In the two-key version, the same algorithm runs three times,butusesK1for the first and last steps where K means key. In other words, K1 = K3. Note that if K1 = K2 = K3, then Triple DES is Single DES. We use three-key version of Triple DES. Triple DES operates in three steps: Encrypt-Decrypt-Encrypt (EDE). It works by taking three 56-bit keys (K1, K2 and K3), and encrypting first with K1, decrypting next with K2 and encrypting a last time with K3. Two-key Triple DES (which is no longer approved for encryption due to its susceptibility to brute force attacks) thus has 112 bits of strength (56 multiplied bytwo).Because of meet-in-the-middle attacks, Double DES is only one bit stronger than Single DES. So, we are using Three-key version. Triple DES is stronger than 112 bits. It is somewhere between 113 and 167. Due to its Feistel structure and uncomplicated logic, DES is relatively easy to implement. However, it uses eight distinct S-Boxes, which increases its footprint. DES is broken but 3DES is safe and cracking it would be very time consuming and tuff. 2. PROPOSED SYSTEM "Corporate Message Filtration & Security via 3-DES" provides an effectiveway ofcommunicationwhichpreserves integrity and confidentiality of the message. Messages containing suspicious contents will be blocked and can be viewed by the admin/manager. Triple-DES encryption technique is used to encrypt message contents for secure communication. An employee feed is provided similar to a discussion forum. Other basic functionalities related to messaging are provided. 2.1 Functions  Monitoring and filtration of messages.  Provides secure communication between admin and employee.  Maintain a Defaulter Score Matrix.  Provides an employee feed which acts a discussion forum within the organization.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5081 2.2 Important Features  Login and registration system is provided where employees can register and login into the system  Employee feed is provided where employees can post, comment and like. These posts can be viewed by all the other employees  This system helps managers to see the blocked messages and gives them power to act against that employee (e.g. terminating employee’s account)  A Defaulter Score Matrix is created and updated based on the professional behavior of the employees  This system uses 3-DES triple key algorithm to encrypt and decrypt the communication. 3. IMPLEMENTATION 3.1 Authorization & Authentication Module  One step authentication is used to determine the identity of employee or admin/manager.  Login credentials are read from input text field and the record with same credentials is fetched via SQL query from database.  If the credentials match, then identity of the user is confirmed and the now the user is granted access.  User registration functionality is embedded in the system which takes necessary user information to create an account.  In case user forgets password he/she can answer the security question to set the password again.  There are two types of user entities: employee and admin (manager).Functionalities provided tothem after authorizationand authenticationareprovided as follows Fig -1: Log In Panel The figure above is login panel screenshot which is asking for Username and Password. Fig -2: New Employee Registration Panel The figure shows the registration page for new employees. 3.2 Employee Module  Each employee is assigned a unique employee id.  Compose message – employee name is selected from the drop-down list and subject, message body is composed and message is sent.  Message inbox – A list of received messages appear with subject, message body, sender, message idand any message can be viewed/deleted upon selection. Eachmessage isassigned a priorityrating.Messages received from admin needs to be decryptedwiththe help of a key.  Sent Messages - A list of send messages appearwith subject, message body,recipient,messageidandany message can be deleted upon selection.  Employee feed – can be accessed by employees where any registered user can create a post, view likes, view comments, like, comment on the post. It can be used as a discussion forum within an organization.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5082 Fig -3: Employee message area The above figure shows that employee can send and access messages. 3.3 Admin/Manager Module  Blocked Messages - A list of blocked messages is displayed with sender name, recipient name, message id and message contents. Blocked messages can be viewed and deleted from the list.  Add blocked words/phrases - Words orphrasescan be added to the blocked words list. Messages containing these words will be blocked.  Blocked words - Alist of blocked words isdisplayed where words can be deleted upon selection.  Employee list – A list of registered employees is displayed with their username, email id, address and employee id. Admin is authorized to delete any user from the list whichwould result In termination of that user’s account.  Compose secure message - A secure message is composed with the help of triple DES encryption where the sensitive information sent by admin to other employees is encrypted. Employee name is selected from the drop-down list and subject, message body is composed. Appropriate key is chosen by admin for encryption. Fig -4: Admin Panel The above figure shows the admin panel menu. 3.4 Message Flow  Employee to Employee – Employee to Employee messages are sent via the admin. Admin monitors the content of the message. A search algorithm is applied on the message, if any dubious content (which matches the content in ‘blockedwordslist’is found, message is blocked.  Admin to Employee – 3-DES encryptionalgorithmis used to encrypt the message sent by admin to an employee. Employee decrypts via a key to view message received from admin. MIME, SSL, SMTP protocols are used via javax.mail.package. Fig -5: Level-1 Data flow diagram
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5083 The figure above shows the flow of data in our system. 3.5 Triple DES Encryption  Classes from javax.crypto and javax.crypto.spec package are used to design 3-DES encrypt and decrypt methods.  Both the methods take message and key as the parameters.  Encryption is done on the admin module. Decryption is done on the employee module. Same key is used by both the entities for encryption and decryption. Admincan send sensitiveinformationto an employee easily. Fig -6: Message Encrypt and decrypt panel The figure shows the decrypt option in employee module. 3.6 Defaulter Score Matrix  A defaulter score matrix is created to track an employee's professional behavior.  An Employee x Points matrix is created where each employee is assigned some points.  Points are assigned based on how frequently an employee uses words from blocked words list.  An algorithm is designed in such a way that it maps blocked words used per message to the defaulter points.  Input given to the algorithm is number of blocked words used per message.  Output is the number of defaulter points which is added to the final tally of the employee.  Higher defaulter score means an employee is susceptible to disciplinary actions (stripping off perks, sacking). 4. CONCLUSION Our approach of developing “Corporate message Filtration Using Triple DES” will prove successful and practical, as it will demonstrate its suitability for solving many issues among employees and avoid creating terrific problemdueto bad messages. From this Message system, we can obtain useful information for future work. Further development includes Triple DES algorithm for security problem of more than one department at same time. Also, improving problem modeling and searchtechnique, reducingexecutiontimeand enhancinggraphical user interface. More research is needed to complete our interactive, automatic message system. The methods, techniques and concepts developed will be tested on more datasets and applications. This application avoids the manual work and the problems concerned with it. In future, we can add more security algorithms to increase the security of the messages. Functionalities such as generating automatic notification and scheduling of messages can be added. 2-step or 3-step authentication can bolster the security of the system preventing brute force attacks. REFERENCES [1] "A Detailed Description of DES and 3DES Algorithms (Data Encryption Standard and Triple DES) | CommonLounge", Commonlounge.com, 2019. [Online]. Available: https://www.commonlounge.com/discussion/5c7c282 8bf6b4724b806a9013a5a4b99. [Accessed: 01- Jan- 2019] [2] "Triple DES: How strong is the data encryption standard?", SearchSecurity, 2019. [Online]. Available: https://searchsecurity.techtarget.com/tip/Expert- advice-Encryption-101-Triple-DES-explained. [Accessed: 10- Jan- 2019] [3] Patrick Norton & Herbert Schildt - Java 2: The Complete Reference, McGraw Hill Education (India) Private Limited; 8th edition [4] Comparison of DES, T. Pornin, B. RAM, K. Gera and I. Boyd, "Comparison of DES, Triple DES, AES, blowfish encryption for data", Stack Overflow, 2019. [Online]. Available:
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5084 http://stackoverflow.com/questions/5554526/compari son-of-des-triple-des-aes- blowfish-encryption-for- data/5559132#5559132. [Accessed: 02- Feb- 2019] [5] Roger S. Pressman - Software Engineering: A Practical Approach, McGraw Hill Higher Education, 8th edition, 2014 [6] Abraham Silberschatz, Henry F. Korth, S. Sudarshan – Database System Concepts, McGraw Hill Education; 6th edition BIOGRAPHIES Nischal Jakhar : a bachelor's student in the Information Technology at Bhagwan Parshuram Institute of Technology, NewDelhi,India Puranjai Mendiratta : a bachelor's student in the Information Technology at Bhagwan Parshuram Institute of Technology,New Delhi, India Vinay Singh : a bachelor's student in the Information Technology at Bhagwan Parshuram Institute of Technology, NewDelhi,India Utsav Chadha : a bachelor's student in the Information Technology at Bhagwan Parshuram Institute of Technology, NewDelhi,India Ms Varsha Sharma : is an assistant professor in Information Technology department at Bhagwan Parshuram Institute of Technology, NewDelhi,India