Project
Project
• every client has to be trained as to how to use the application and even the security in the communication
is also the factor to be considered.
• Network security in the existing system is the motivation factor for a new system with higher-level security
standards for the information exchange.
Defects of Existing System
• This makes maintenance expensive.
• Present day transactions are considered to be "un-trusted" in terms of security, i.e. they are
relatively easy to be hacked.
Proposed System
• The validation code should be placed on the server and not on the client such
that data transfer takes place between only the registered users only.
• The server should identi fy the type of request (GET/POST) and perform
appropriate acti on.
• It should also identi fy the user and provide the communicati on according
to the prescribed level of security with transfer of the fi le requested and
run the required process at the server if necessary
Advantages of Proposed System
• The transactions should take place in a secured format between
various clients in the network.
• the server should send necessary information such as User
authorization and authentication information, Encryption,
Decryption types and their level of hierarchy etc.
System Requirements
• Software Requirements
Operating System Windows NT/2000 (Client/Server).
Front-end: Java Swings.
Communication Architecture: JDBC, Servlets.
Database maintenance: Oracle 8i.
• Hardware Requirements
System Configuration
Pentium III Processor with 700 MHz Clock Speed
4 GB RAM, 500 GB HDD, 32 Bit PCI Ethernet Card.
Modules
This project contains five modules. They are:
• Data Embed and Retrieve
• Compression and Decompression
• CRC generation and CRC Verification
• Graphical User Interface
Brief Explanation Of Modules
Data Embed
• This module deals with identifying the data and the image to embed the data into the image before it
can be transmitted. This is then followed by compression to increase the rate of transfer of files
between the networks.
• The module opens by prompting the user to identify the file that need to be transmitted across the
network. The file is then selected using the GUI interface provided through JAVA. The module then
prompts to identify the image file, which needs to house the data file.
• The data is then embedded into the image file in such a way that the image file is not corrupted; at the
same time the data is secure. The image if hacked or interrupted by a third party can be viewed in any
browser without actually displaying the data. The data on the receivers end is isolated and removed
from the image.
• The module deals with identifying the hidden data in the image. The module receives the image file
that is decompressed and decompresses it using JAVA UTILITY PACKAGE.
Compression&Decompression:
• This technique maps arbitrary input into printable character output. The form of encoding has the following
relevant characteristics. The range of the function is a character set that is universally re-presentable at all sites,
not a specific binary encoding of that character set.
• The characters themselves can be encoded into whatever form is needed by a specific system. For instance, the
character 'E' is represented in ASCII system as a hexadecimal 45 and in EDCDIC- based system as hexadecimal-
c5.
• The character set consists of 65 printable characters, one of which is used for padding. With 2^6 = 64 available
characters, each character can be used to represent 6 bits of input.
• No control characters are included in the set. Thus, the message encoded in Radix-64 can traverse mail-
handling system. That scans the data stream for control characters. The hyphen character "- " is not included.
CRC Generation and Verification
• Its purpose is to protect programs (in which supporting code is linked) with one of the most effective
weapons against computer viruses: the Cyclic Redundancy Check, or CRC.
• There are many utilities that perform CRC checks on other but most of these are external programs that
are usually run only once, if at all. The CRC generated by these utilities must be compared to a value in an
external file; if the values match, the program is not infected.
• This approach has two problems: the first is that the CRC check is run only once when the user gets the
program, if at all. Most people would never run the check a second time.
• The CRC to be stored in the program itself (the .EXE file) and for the program to do its own check every
time it is loaded.
• This method is much more effective than the previous one because it means that the moment the program
is infected and the CRC changes, the infection will be detected the next time the program is run.
Graphical User Interface
• This project is developed using graphics in java swings. The options available are displayed in a menu
format, like in an online editor.
• Clicking on any particular menu item through mouse or through keyboard a dropdown menu is displayed,
listing all the options available under that menu item and the user can select the needed actions according
to their wish.
RESULTS
Login Screen Driver Connection
Database Connection Login Match
Main Screen File Selection
Key Entering Client Address
Message sent sucssfully
Information
Conclusion
• The challenge of cryptography is developing a system in which it is impossible to determine the key. This is
accomplished the use of a one-way function. With a one-way function, it is relatively easy to compute a
result given some input values.
• To encrypt data, enter the data “plain text” and an encryption to the encryption portion of the algorithm.
To decrypt the “cipher text” a proper decryption key is used at the decryption portion of the algorithm.
• The project work done herewith has given a lot of insight into the working of the Networking-programming
environment. The program written for encryption and decryption using DES Algorithm is tested on several
textual files and results are observed.The program could achieve a better secure transferring of files
between the server and various clients.
Future Enhancement
• The program written could be extended to higher order to achieve a better secure
transferring of files between server and the various clients.
References: