SlideShare a Scribd company logo
CRYPTOGRAPHY BASED 
Chat System 
Submitted By: 
Himanshu shakhar 
Jagsir singh
INDEX 
 Introduction 
 Purpose 
 Technologies to be used 
 Cryptography 
 Overview 
 Objective & Scope 
 Limitation 
 CONCLUSIONS & FUTURE SCOPE 
 References
Introduction 
This particular project is a solution developed to communicate between the users across worldwide 
through Internet. The concept of sending letters and telegraphs has been reduced due to the new 
era of Internet Mailing. One such facility is being provided by the Chat Server. 
Due to a lot of hacking tricks used by hackers to access private information. It is must to secure our 
information before sending. So cryptography is used in the chat system. 
Cryptography is the science of coding and decoding messages so as to keep these messages secure.
Purpose 
PURPOSE OF THE PROJECT: This Project is used basically for chatting purpose with the remote 
clients or users on Internet or local networks. Here in this project a java client / server 
combination is used to chat with remote users. 
It maintains two levels of users:- 
 Server 
 Clients 
The Software includes:- 
 One Friend Send Message 
 Other Friend give the Response of given message. 
 Show all Chats message before yet b/w friends.
Public key cryptography 
 Public key cryptography is based on cryptographic algorithms that use two 
related keys, a public key and a private key; the two keys have the property 
that, given the public key, it is computationally infeasible to derive the 
private key. A user publishes his/her public key in a public directory and keeps 
his/her private key to himself/herself. 
 According to the purpose of the algorithm, there are public-key 
encryption/decryption algorithm. An encryption algorithm could be used to 
encrypt a data (for example, a key) using the public key so that only the 
recipient who has the corresponding private key could decrypt the data. 
Typical public key encryption algorithm is RSA .
What is RSA ? 
 RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly 
described the algorithm in 1977. 
 RSA is one of the first practicable public-key cryptosystems and is widely used 
for secure data transmission. 
 In such a cryptosystem, the encryption key is public and differs from the 
decryption key which is kept secret. 
 These keys are created using RSA algorithm, processing on large prime 
numbers. 
 In RSA, this security is based on the practical difficulty of factoring the 
product of two large prime numbers.
Encryption and decryption 
Sender transmits her public key (n, e) to receiver and keeps the private key d secret. sender then 
wishes to send message M to receiver. 
He first turns M into an bytes m[],. He then computes the ciphertext c corresponding to 
Receiver can recover m from c by using his private key exponent d via computing
Key generation 
 Choose two distinct prime numbers p and q. 
 Compute n = pq. 
 Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1) = n - (p + q -1), where φ is Euler's 
totient function. 
 Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1; i.e., e and 
φ(n) are coprime. 
 e and n are released as the public key. 
 Determine d from the equation e X d mod φ(n) =1. 
 d and n are private keys and kept secret.
Key generation example 
 Choose two distinct prime numbers, such as 
 p = 61 and q = 53 
 Compute n = pq, giving n = 61 x 53 = 3233 
 Compute the totient of the product as φ(n) = (p − 1)(q − 1), giving (61 - 1)(53 - 1) = 3120 
 Choose any number 1 < e < 3120 that is coprime to 3120. 
 Let e = 17 
 Compute d from ( e x d ) mod φ(n) =1; 
 Yielding d = 2753
Example of encryption and decryption 
in order to encrypt m = 65, we calculate 
To decrypt c = 2790, we calculate
Overview 
Project is related to Private Chat Server 
The project maintains two levels of users:- 
• Server Level 
• Client or Friends 
In this project collection of message is hold in DataInputStream.
Merits 
 Accuracy 
 Reliability 
 No Redundancy 
 Immediate retrieval of information 
 Immediate storage of information 
 Easy to Operate
Limitation 
 It is limited to only two clients. The existing Chat Server System is only meant 
for transfer of messages from one client to the other 
 the messages cannot be formatted and made attractive to look as well as 
graphical emotional pictures cannot be added to send messages. 
 This system does not provide the facility of adding friends and exclusively 
chatting with the particular added friend.
References 
 Wikipedia.com 
 Tutorialspoint.com 
 Stackoverflow.com
Thank You

More Related Content

PPTX
Network Penetration Testing
Mohammed Adam
 
PPTX
Understanding NMAP
Phannarith Ou, G-CISO
 
PPT
Port Scanning
amiable_indian
 
PPT
Networking and penetration testing
Mohit Belwal
 
PPTX
N map presentation
ulirraptor
 
PDF
Ransomware: History, Analysis, & Mitigation - PDF
Andy Thompson
 
PDF
Nmap Hacking Guide
Aryan G
 
PDF
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 
Network Penetration Testing
Mohammed Adam
 
Understanding NMAP
Phannarith Ou, G-CISO
 
Port Scanning
amiable_indian
 
Networking and penetration testing
Mohit Belwal
 
N map presentation
ulirraptor
 
Ransomware: History, Analysis, & Mitigation - PDF
Andy Thompson
 
Nmap Hacking Guide
Aryan G
 
The Game of Bug Bounty Hunting - Money, Drama, Action and Fame
Abhinav Mishra
 

What's hot (20)

PPTX
Recon with Nmap
OWASP Delhi
 
PDF
Hacking and Defending APIs - Red and Blue make Purple.pdf
Matt Tesauro
 
PPTX
Assignment problem branch and bound.pptx
KrishnaVardhan50
 
PPTX
CLR AND LALR PARSER
Akila Krishnamoorthy
 
PPTX
Basics of Denial of Service Attacks
Hansa Nidushan
 
PPTX
Service Oriented Computing
Aie Sa
 
PPTX
Zen map
harisnaved
 
PDF
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA (European Emergency Number Association)
 
PPTX
Chat Application
kuldip kumar
 
PPTX
Phishing Detection using Machine Learning
Arjun BM
 
PPTX
Indicator Random Variables
Daniel Raditya
 
PPTX
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
PPTX
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
PDF
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
PPTX
SPM Activity Planning Introduction
Kanchana Devi
 
PPTX
Software Project Management (monitoring and control)
IsrarDewan
 
PPTX
Dos attack
Manjushree Mashal
 
PPTX
WTF is Penetration Testing v.2
Scott Sutherland
 
Recon with Nmap
OWASP Delhi
 
Hacking and Defending APIs - Red and Blue make Purple.pdf
Matt Tesauro
 
Assignment problem branch and bound.pptx
KrishnaVardhan50
 
CLR AND LALR PARSER
Akila Krishnamoorthy
 
Basics of Denial of Service Attacks
Hansa Nidushan
 
Service Oriented Computing
Aie Sa
 
Zen map
harisnaved
 
EENA 2021: Keynote – Open-Source Intelligence (OSINT) for emergency services ...
EENA (European Emergency Number Association)
 
Chat Application
kuldip kumar
 
Phishing Detection using Machine Learning
Arjun BM
 
Indicator Random Variables
Daniel Raditya
 
Ethical hacking/ Penetration Testing
ANURAG CHAKRABORTY
 
Message passing in Distributed Computing Systems
Alagappa Govt Arts College, Karaikudi
 
Penetration testing & Ethical Hacking
S.E. CTS CERT-GOV-MD
 
SPM Activity Planning Introduction
Kanchana Devi
 
Software Project Management (monitoring and control)
IsrarDewan
 
Dos attack
Manjushree Mashal
 
WTF is Penetration Testing v.2
Scott Sutherland
 
Ad

Similar to Cryptography based chat system (20)

PPTX
Security
Saqib Shehzad
 
PPT
Rsa diffi-network security-itt
rameshvvv
 
PDF
international security system data threats
gacop74666
 
PDF
PRINCIPLES OF INFORMATION SYSTEM SECURITY
gacop74666
 
PPT
Rsa
magentie
 
PPTX
3 pkc+rsa
Shashank Mishra
 
PPTX
CNS 3RD UNIT PPT.pptx
pjeraids
 
PDF
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 
PPT
Unit --3.ppt
DHANABALSUBRAMANIAN
 
PPT
Crypt
Mir Majid
 
PPTX
module 4 ppt on crypography and network security
PoornimaGn3
 
PDF
PKC&RSA
Anver S R
 
PPT
ch09-Critt.Asimettrica.notes has good info in security
AbdullahOmar704132
 
PPTX
Cryptography
Mrinalini Sharma
 
PPTX
RSA Algm.pptx
Sou Jana
 
PPT
ch09_rsa_nemo.ppt
ChandraB15
 
PPT
Stallings Kurose and Ross
Information Security Awareness Group
 
PPT
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
PPT
Network Security and Cryptography
Adam Reagan
 
PPTX
Security - ch3.pptx
HabtamuHaileMichael2
 
Security
Saqib Shehzad
 
Rsa diffi-network security-itt
rameshvvv
 
international security system data threats
gacop74666
 
PRINCIPLES OF INFORMATION SYSTEM SECURITY
gacop74666
 
3 pkc+rsa
Shashank Mishra
 
CNS 3RD UNIT PPT.pptx
pjeraids
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 
Unit --3.ppt
DHANABALSUBRAMANIAN
 
Crypt
Mir Majid
 
module 4 ppt on crypography and network security
PoornimaGn3
 
PKC&RSA
Anver S R
 
ch09-Critt.Asimettrica.notes has good info in security
AbdullahOmar704132
 
Cryptography
Mrinalini Sharma
 
RSA Algm.pptx
Sou Jana
 
ch09_rsa_nemo.ppt
ChandraB15
 
Stallings Kurose and Ross
Information Security Awareness Group
 
PUBLIC KEY & RSA.ppt
RizwanBasha12
 
Network Security and Cryptography
Adam Reagan
 
Security - ch3.pptx
HabtamuHaileMichael2
 
Ad

Recently uploaded (20)

PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PDF
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
Introduction to Data Science: data science process
ShivarkarSandip
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
The Effect of Artifact Removal from EEG Signals on the Detection of Epileptic...
Partho Prosad
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Inventory management chapter in automation and robotics.
atisht0104
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
Software Testing Tools - names and explanation
shruti533256
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Packaging Tips for Stainless Steel Tubes and Pipes
heavymetalsandtubes
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
Introduction to Data Science: data science process
ShivarkarSandip
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 

Cryptography based chat system

  • 1. CRYPTOGRAPHY BASED Chat System Submitted By: Himanshu shakhar Jagsir singh
  • 2. INDEX  Introduction  Purpose  Technologies to be used  Cryptography  Overview  Objective & Scope  Limitation  CONCLUSIONS & FUTURE SCOPE  References
  • 3. Introduction This particular project is a solution developed to communicate between the users across worldwide through Internet. The concept of sending letters and telegraphs has been reduced due to the new era of Internet Mailing. One such facility is being provided by the Chat Server. Due to a lot of hacking tricks used by hackers to access private information. It is must to secure our information before sending. So cryptography is used in the chat system. Cryptography is the science of coding and decoding messages so as to keep these messages secure.
  • 4. Purpose PURPOSE OF THE PROJECT: This Project is used basically for chatting purpose with the remote clients or users on Internet or local networks. Here in this project a java client / server combination is used to chat with remote users. It maintains two levels of users:-  Server  Clients The Software includes:-  One Friend Send Message  Other Friend give the Response of given message.  Show all Chats message before yet b/w friends.
  • 5. Public key cryptography  Public key cryptography is based on cryptographic algorithms that use two related keys, a public key and a private key; the two keys have the property that, given the public key, it is computationally infeasible to derive the private key. A user publishes his/her public key in a public directory and keeps his/her private key to himself/herself.  According to the purpose of the algorithm, there are public-key encryption/decryption algorithm. An encryption algorithm could be used to encrypt a data (for example, a key) using the public key so that only the recipient who has the corresponding private key could decrypt the data. Typical public key encryption algorithm is RSA .
  • 6. What is RSA ?  RSA stands for Ron Rivest, Adi Shamir and Leonard Adleman, who first publicly described the algorithm in 1977.  RSA is one of the first practicable public-key cryptosystems and is widely used for secure data transmission.  In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret.  These keys are created using RSA algorithm, processing on large prime numbers.  In RSA, this security is based on the practical difficulty of factoring the product of two large prime numbers.
  • 7. Encryption and decryption Sender transmits her public key (n, e) to receiver and keeps the private key d secret. sender then wishes to send message M to receiver. He first turns M into an bytes m[],. He then computes the ciphertext c corresponding to Receiver can recover m from c by using his private key exponent d via computing
  • 8. Key generation  Choose two distinct prime numbers p and q.  Compute n = pq.  Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1) = n - (p + q -1), where φ is Euler's totient function.  Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1; i.e., e and φ(n) are coprime.  e and n are released as the public key.  Determine d from the equation e X d mod φ(n) =1.  d and n are private keys and kept secret.
  • 9. Key generation example  Choose two distinct prime numbers, such as  p = 61 and q = 53  Compute n = pq, giving n = 61 x 53 = 3233  Compute the totient of the product as φ(n) = (p − 1)(q − 1), giving (61 - 1)(53 - 1) = 3120  Choose any number 1 < e < 3120 that is coprime to 3120.  Let e = 17  Compute d from ( e x d ) mod φ(n) =1;  Yielding d = 2753
  • 10. Example of encryption and decryption in order to encrypt m = 65, we calculate To decrypt c = 2790, we calculate
  • 11. Overview Project is related to Private Chat Server The project maintains two levels of users:- • Server Level • Client or Friends In this project collection of message is hold in DataInputStream.
  • 12. Merits  Accuracy  Reliability  No Redundancy  Immediate retrieval of information  Immediate storage of information  Easy to Operate
  • 13. Limitation  It is limited to only two clients. The existing Chat Server System is only meant for transfer of messages from one client to the other  the messages cannot be formatted and made attractive to look as well as graphical emotional pictures cannot be added to send messages.  This system does not provide the facility of adding friends and exclusively chatting with the particular added friend.
  • 14. References  Wikipedia.com  Tutorialspoint.com  Stackoverflow.com