Professional Documents
Culture Documents
BACHELOR OF TECHNOLOGY
IN
COMPUTERSCIENCE ENGINEERING at
GURUNANAK INSTITUTE OF TECHNICAL CAMPUS Khanapur Village, Manchal Mandal Ibrahimpatnam RR District A.P
DECEMBER 2012
DECLARATION
I hereby declare that the project entitled INTRANET CHATTING USING AES ALGORITHM submitted for the B.Tech Degree is my original work and the project has not formed the basis for the award of any degree, associateship, fellowship or any other similar titles.
CERTIFICATE
This is to certify that the project entitled INTRANET CHATTING USING AES ALGORITHM is the bonafide work carried out by JAIDEEP SINGH student of B.Tech ,GURUNANAK INSTITUTE OF TECHNICAL CAMPUS Khanapur Village, Manchal Mandal Ibrahimpatnam RR District A.P during the year 2012, in partial fulfillment of the requirements for the award of the Degree of B.Tech in Computer Science and Engineering and that the project has not formed the basis for the award previously of any degree, diploma, associate ship, fellowship or any other similar title.
H. O.D
Dept.
ABSTRACT
The main aim of this project is to find a system that provides a secure mechanism in modern communication systems. Objective of this project is to create a secured cryptographic mechanism that allows users to communicate messages with high security with less effort. AES is one of the high standard encryption standards where data is encrypted in numerous phases and keys are randomly generated. This research allows studying the usage of AES in between two systems and this communication is done through AES. In this application we are implementing AES algorithm for communication between the systems. This project is used basically for chatting purpose with users on local networks. Here in this project a client / server combination is used to chat with users. When a Client wants to chat with a user on a host, he sends a request to the server with a identification name like chat-id, the server responds to the request by identifying the client-id which is already registered in the server domain and when matched his request is granted and the client can begin to chat with the remote users present on the internet or local network. It is important to understand the terms client/server because the INTRANET CHATTTING project is supported completely by client/server model. A server is anything that has some resource that can be shared. There are compute servers, which provide computing power, web servers, which store web pages. A client is simply any other entity that wants to gain access to a particular server. The interaction between client\server is like an interaction between an electrical socket and a lamp. The server is a permanently available resource while client is free to unplug after it has been served. The program's premier feature is its whiteboard drawing utility. You can draw freehand, do circles, squares, lines, text, or paste image files to the canvas. This is ideal when users want to "sketch" concepts for one another. Users can interact publicly with everyone else on the server, or they can chat/draw privately using java Chat's "whisper mode". Users can create and manage chat rooms, which can be either "public" or "private". The server will also store and manage answering machine-style messages for users who aren't online, and instant messages can be sent to those who are. Additionally, users who aren't watching their screens can be paged with sound.
Table of contents
1. INTRODUCTION 1.1 Project Overview -----------------------------------------2. SYSTEM STUDY AND ANALYSIS 2.1 2.2 2.3 2.4 Existing System---------------------------------------------Proposed System-------------------------------------------Scope of project --------------------------------------------Hardware and Software Specification-----------------4 5 6 7 3
3. SYSTEM DESIGN
3.1 Data flow diagrams--------------------------------------------10 3.2 UML Diagrams 3.2.1 Usecase diagram---------------------------------------------- 15 3.2.2 Class diagram-------------------------------------------------- 16 3.2.3 Sequence diagram-------------------------------------------17 3.2.4 Activity diagram-----------------------------------------------18
1 2
19 41
47 47
3 4
7) REFERENCE / BIBLIOGRAPHY-------------------------------------
other entity that wants to gain access to a particular server. The interaction between client\server is like an interaction between an electrical socket and a lamp. The server is a permanently available resource while client is free to unplug after it has been served. The program's premier feature is its whiteboard drawing utility. You can draw freehand, do circles, squares, lines, text, or paste image files to the canvas. This is ideal when users want to "sketch" concepts for one another. Users can interact publicly with everyone else on the server, or they can chat/draw privately using java Chat's "whisper mode". Users can create and manage chat rooms, which can be either "public" or "private". The server will also store and manage answering machine-style messages for users who aren't online, and instant messages can be sent to those who are. Additionally, users who aren't watching their screens can be paged with sound.
Many vendors distribute even these technologies separately but to obtain these features at one system will be the haunting task. So what should we do and how should we solve the problem that even the technical people are benefited by this chatting technology. Through current chatting technologies we are able to send text with no security.. Lets see how to solve this problem. PROPOSED SYSTEM To solve the inconveniences as mentioned above, an INTRANET CHATTING USING AES ALGORITHM is proposed. The proposed systems premier feature is its security provided to the chat.. INTRANET CHATTING can be a boon for the technical people who want to share their ideas or concepts within an organisation. This system includes the facilities of traditional chat servers and clients like providing a window for each Other uses are , private chat, public chat multiple chat rooms etc. Technical People can exchange as well as share the information using the chat facility so long conversations can be made between two users which may be important business meetings or deals to be sanctioned and all this is carried out with the support of applets with the help of chat can be transferred with high security.
WWW server, the document is transferred to your computer and then the connection is terminated. The World Wide Web is a network of information, accessible via an easy-to-use interface. The information is often presented in hypertext or multimedia and provided by servers located around the world. The usability of the Web depends largely on the performance of these servers. This application is a Java client/server combination, which can be used to chat over the Internet or local networks With these features and with the advent of WWW, Web browsers and with INTRANET CHATTING, Internet has become the media of applications. We can use INTRANET CHATTING USING AES ALGORITHM for following activities: To exchange information and converse with friends and family. To participate in group discussions through public news bulletin board. For Entertainment. Leisure activities. Access business while at home. Communicate and collaborate. At any given point of time, up-to-date information is provided.
HARWARE AND SOFWARE SPECIFICATION The hardware and software requirements of the system are listed below: Hardware Requirements Hard Disk: 10 GB or more RAM: 128 MB or more Processor: Pentium III or above Jdk 1.4 or above Windows 2000 or above Swings AWT The proposed system should have the following features. The Chat Server and Clients Interface should be as simple as possible so that they can be configured even by a nave user. Server should maintain a list of Clients and list of the clients who are currently on line. Server should be able to create facility for one to one communication and multiple user communication at once A user can able to save the chatting information if he feels conversation is important.
Software Requirements
3. SYSTEM DESIGN
PROJECT ANALYSIS 1) STUDY OF THE SYSTEM This application can be mainly divided into two modules: 1. Server 7
2. Client This project INTRANET CHATTING is mainly depended model. The client requests the server and server request. The proposed system should provide both of the above features along with the followed ones: SERVER: The server should be able to perform the following features: The first and foremost problem is to find the server. We should identify the program in the server which processes the clients request. Administrator Client who will be acting as a super user. Creating of private room with the password facility to enable private chats with the users online. The server is always waiting for clients requests .The clients come and go down but the server remains the same. CLIENT: The client should be able to perform the created in the server for chatting purpose. Should be provided with the drawing tools like free hand, rectangle, oval, line and also sending text message over the room. In all the network applications, we find two sort program where the first i.e., server sends the information and the second i.e., client receives the information. 2) INPUT AND OUTPUT: The user has to provide to which server it has to connect. In this, the server name to be provided is local host. The user has to provide the username and the password for proceeding with the server for chatting purpose. 8 following features: on client/server responses by granting the clients
Should be able to send message to anybody in the room with clients unique chat name
3) PROCESS MODEL USED WITH JUSTIFICATION The model used here is a SPIRAL MODEL. This Model demands a direct consideration of technical risk at all stages of the project and if properly applied it reduces risk before they become problematic, hence it becomes easier to handle a project when using this kind of model where in the end user can evaluate the program at the end of each stage and suggest modification if required. In this way the Risk Management of Project is carried out efficiently through Spiral model.
URL CONNECTION
SERVER CLIENT
10
Client requests service to server and Server grants the request through a response.
Client has to first register himself in the server to begin chatting. Server encrypts the PSWD and client is registered, welcome message prompted by server.
11
Client can send offline messages to other clients, server stores and forwards the messages when other users log on.
12
Client logs out of chat, server notifies & updates all other users by a message.
13
Server shuts down by sending message and closes connection by giving a prompt.
USECASE DIAGRAM
14
login
select room
user
select user
public chat
private chat
logout
15
CLASS DIAGRAM
client
client id client password ButtonClick()
chat server
roomlist : array Numberofuser : int getPublic() getRoomList() sendMessage()
Message
InputTextBox : string sendMessage() viewMessage()
Chatter List
roomList : array users : int getRoomList() getUsersList() opname()
chat
user : string otheruser : string sendMessage() recieveMessage()
16
SEQUENCE DIAGRAM
user start connects server AIM
gets users id
send message
disconnect
ACTIVITY DIAGRAM
17
c n e t to o nc A IM
g t a id e n
g t u e lis e s rs t
s le t u e f r e c sro ca ht
s n ms a e ed es g tor o om
s rt c a g ta h ttin
d c net is o n c
18
PROJECT CODING
1. CODE EXPLANATION The INTRANET CHATTING USING AES ALGORITHM application is developed used awt (Abstract Window Toolkit). The java.awt package is much useful for creating user interfaces and for painting graphics and images. A user interface object such as a button or a scrollbar is called, in AWT terminology, a component. The Component class is the root of all AWT components. Some components fire events when a user interacts with the components. A container is a component that can obtain components and other containers. A container can also have a layout manager that controls the visual placement of components in the container. The Containers. The java.security package contains the classes and interfaces that implement the Java security architecture. These classes can be divided into two broad categories. First, there are classes that implement access control and prevent untrusted code from performing sensitive operations. Second, there are authentication classes that implement message digests and digital signatures and can authenticate Java classes and other objects. java.awt package implements different interfaces like
LayoutManager, which defines the interface for classes that know how to layout
The java.net package provides the classes for implementing networking applications. Using the socket classes, one can communicate with any server on the Internet or implement their own Internet server. A number of classes are 19
provided to make it convenient to user Universal Resource Locators (URLs) to retrieve data on the Internet. The java.net package implements for different data interfaces gram like socket
implementing
implementations. It
SocketOptions interface of methods to get/set socket options. Is implemented by SocketImpl and DatagramSocketImpl
PROJECT TESTING Software is only one element of a larger computer based system. Ultimately software is incorporated with other system elements and series of system integration and validation tests are conducted. System testing is actually a series of different tests whose primary purpose is to fully exercise the computer-based system. Testing presents an interesting anomaly for the software development. The testing phase creates a series of test cases that are intended to demolish the software that has been built. A good test case is one that has a high probability of finding an as yet undiscovered error. A successful test is one that uncovers as an yet undiscovered error.
20
Testing Methods Testing process breaks applications down into two main parts Unit testing Integration testing User Interface testing
Test Cases 1 Short Description Purpose Navigation / Input Correct Username and Password in the Home Page. Wrong Username or Password Test Case for Login To check whether the Login Authentication is working properly or not Expected Outcome Login successful for valid user name and password. Actual Outcome Login successful for valid user name and password. Pass/ Fail Pass
Login unsuccessful for invalid username or password. Login unsuccessful when username or password is missing
Login unsuccessful for invalid username or password. Login unsuccessful when username or password is missing
Pass
No Username or Password
Pass
Test Case for RSS Feed Modifier To check whether the Feeds can be modified by the administrator.
21
Navigation / Input Administrators Username and Password in the Feed Modifier Login. Select the Feed from the list and click on Modify Adding a new item to the feed.
Expected Outcome Login successfully and the various feeds should be visible. Should be able to view the details of the items present in the feed. The new item and its corresponding details should be written into the RSS file
Actual Outcome Login successfully and the various feeds are visible.
Administrator can view the details of the various items in the feed. The new item and its corresponding details written into the RSS file.
Pass
Pass
Test Case for RSS Feed Updater To check whether the changes made in the RSS feeds in the RSS Modifier Expected Outcome The changes made to the feeds using the RSS Modifier should be reflected. Actual Outcome The changes made to the feeds using the RSS Modifier are reflected. Pass/ Fail Pass
Navigation / Input Run the RSS Updater module and check the RSS Reader by Logging in the Home Page
OUTPUT SCREEN
22
Server Started
23
24
25
26
27
28
29
30
FUTURE IMPROVEMENT 1. This project can be enhanced by implementing different protocols and can be made more useful for varied clients according to the requirements of the client, it can also possible in future that each client in this globe has his own customized INTRANET CHATTING. 2. It can be enhanced in the field of voice chatting. Using VoIP protocol 3. It can be enhanced in the field of Video Conferencing.
CONCLUSION Even though this application has been developed with the users own Protocols, this can be used in an Intranet based organization. 1. This system was developed so that people can exchange information as well as converse with each other with security. 2. Through this system people can access chat rooms publically and privately 3. The system is interactive and friendly. 4. Entire system is fully automatic to the clients and satisfies the clients request
31
REFERENCES
Webliography (Links) a. b. Books The Complete Reference JAVA 2 IV Edition, Herbert Schildt, TMH The Unified Modeling Language User guide-Addison Wesley, 1999 Grady Booch, James Rumbaugh, Ivar Jacobson Software Engineering, Roger. S. Pressman McGraw Hill Internet and World Wide Web-How to program by Deitel & Deitel and Nieto Pearson Education Asia Java Server Pages, Head First AJAX for Dummies, OReilly http://www.w3schools.com/Ajax/Default.Asp/ http://java.sun.com/webservices/
32