Web Cryptology


                                          Web Cryptology

OBJECTIVE
        The main objective of this project (Crypto Log) is to send the confidential details and related confidential files and documents to their recipients in a securable way.Crypto log will use the numerous kinds of algorithms to generate the encrypted strings, files and decrypted strings, files.
     The Secure Sockets Layer (SSL) is a common Encryption protocol used in Crypto log. When you see a URL in your Web browser that starts with "https" instead of "http", it is a secure connection that is using SSL.Some methods of cryptography used a "secret key" to allow the recipient to decrypt the message. The most common secret key cryptosystem is the Data Encryption Standard (DES), or the more secure Triple-DES which encrypts the data three times.
     These conversions will be generated in the basis of XML Web services in Asp.Net.
The purposeful algorithms used by Crypto log will be in the forms of:
                 1. MD5
                2. SHA1
                 3. RijndaelManaged

Existing System:
1)In Existing system,the data will be secure through the network because data transmission is done in encrypted format.
2)In Existing system,data will not be  accessed through the authorized person.
3)The system does not provides security to the data store in database.
4)In Existing System,the security is not provided throughout the server and database.


Proposed System:
1)In Proposed System, the data will be secure using the web technology by using https enabled.
2)In Proposed System,the data will be accessed through the authorized person.
3) The system  provides security to the data store in the database.
4) In Proposed System,the security is  provided throughout the server and database by disabling the cookies etc.

The Cryptology has been divided into 5 different modules:
        1. Administrator
        2. User
        3. Cryptic messages
        4. Cryptic files
        5. Image transformation
Administrator:
Administrator is a super user in the system. He will monitor all the users’ activities in the system. He has   privileges to do anything at any point of time. He is responsible for providing secure mechanism for the user of the system to send their confidential data in a secure way.
User:
User will register in to site and send his confidential data in a secured way by using Crypto log technology facility provided in the application.
Cryptic messages:
In this module user will send his confidential messages in an encryption format so that receiver will receive the data and he will decrypt to get original data. So that data will transmitted in a secure way.
Cryptic files:
In this module user will send data file in an encryption format so that receiver will receive the data and he will decrypt to get original data. Application provides a facility to send files in a secured way.
Image transformation:
In this module user will transmit data in the form of image and he can encrypt the image and transform to receiver. Receiver will receive the data and he will decrypt to get original data. By using this application user can send images also in a secured way.
Software Requirements:
Operating System                    :         Windows XP/2003 or Linux/Solaris
User Interface                          :         HTML, CSS
Client-side Scripting               :         JavaScript
Programming Language          :         Java
Web Applications                     :         JDBC, JNDI, Servlets, JSP
IDE/Workbench                      :         My Eclipse
Database                                 :         Oracle10g
Server Deployment                  :         Tomcat

Hardware Requirements:

          Processor                                 :                  Pentium IV
Hard Disk                                :                  40GB
RAM                                         :                  256MB

2 comments:

  1. can us end the code to this project plz to this mail shella.naveen143@gmai.com

    ReplyDelete
  2. Can you please provide some detail about various data encryption algorithm available ? You just have mentioned the name in this post and I wanted to learn about each of them in detail.
    electronic signature FAQ

    ReplyDelete