0% found this document useful (0 votes)
84 views2 pages

Sending A Secure Message Over A Network To A Remote Site: Software Requirements

The system securely transfers an encrypted message from one site to another using AES encryption and TCP/IP. Only the intended recipient can decrypt the message with the proper authentication key. The system uses acknowledgments to confirm message integrity and delivery. It consists of two terminal applications that allow a user to securely send a message from one PC to another.

Uploaded by

ankushjoshi1987
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views2 pages

Sending A Secure Message Over A Network To A Remote Site: Software Requirements

The system securely transfers an encrypted message from one site to another using AES encryption and TCP/IP. Only the intended recipient can decrypt the message with the proper authentication key. The system uses acknowledgments to confirm message integrity and delivery. It consists of two terminal applications that allow a user to securely send a message from one PC to another.

Uploaded by

ankushjoshi1987
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Sending a secure message over a network to a

remote site

We here use a system to securely transfer a message encrypted using Aes


algorithm to a remote site so that only proper authentication at remote site can
decrypt the message. The system also uses acknowledgements to signal the
message integrity and delivery over the network. The system consists of two
terminal applications running concurrently over two different PC’s. User may first
use the sending tab to send a secure message. On using this function the accepts
user string and key to encrypt it. The system then receives this message and
encrypts it using AES algorithm. Now the system transfers this message to remote
site using over a Tcp/ip internet connection. The receiving system sends out a
notification acknowledgement to the sender application as soon as it receives the
string. It them allows receiving user to enter the key. The system now decrypts
message using the key and sends out a notification to sender weather the receiver
enter the right key or wrong one. Entering right key decrypts message to exact
string sent, entering wrong key decrypts message to something wrong. .

Software Requirements:

 Windows Xp, Windows 7(ultimate, enterprise)


 Sql 2008
 Visual studio 2010

Hardware Components:

 Processor – i3
 Hard Disk – 5 GB
 Memory – 1GB RAM

Advantages:

 The system allows to remotely transfer message strings.


 Allows for securely sending out messages.
 Sends notifications of acknowledgement on receiving messages.
 Easy , user friendly GUI.

Disadvantages:

 It reduces employment as the human efforts are being automated by this system.

Applications:

This system can be implemented in military, government, other high security tasks.

You might also like