0% found this document useful (0 votes)
55 views

Real Time Web Based Secure Chat Application using Django

Real Time Web Based Secure Chat Application using Django

Uploaded by

Phyu Too Thwe
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Real Time Web Based Secure Chat Application using Django

Real Time Web Based Secure Chat Application using Django

Uploaded by

Phyu Too Thwe
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

International Journal of Advances in Engineering and Management (IJAEM)

Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

Real-Time Web-Based Secure Chat


Application using Django
Satish Singh, Satyam Singh, Dr. Ashish Sharma
B-Tech Computer Science And Engineering, Galgotias University,Greater Noida, India
B-Tech Computer Science And Engineering, Galgotias University, Delhi, India
School Of Computer Science and Engineering, Galgotias University, Delhi, India
----------------------------------------------------------------------------------------------------------------------------- ---------
Date of Submission: 20-04-2023 Date of Acceptance: 30-04-2023
----------------------------------------------------------------------------------------------------------------------------- ----------
ABSTRACT— The most relevant advancement in messaging through social media, team chats in a
the Internet has put the whole world in our control. Slack or Microsoft Team workspace, or an iOS or
From information sharing to product purchases, text message on an iPhone or Android smartphone [3]
everything is done online. The internet making the from a friend.
world a small circle. This project is also Internet- Despite geographical boundaries, chatting is
based. The purpose of this project is to develop a web a way to use technology to "bring individuals and
application that will allow users to instantaneously their ideas together [4]." Although these technologies
and at the moment connect. Considering this, a chat have been around for a while, their acceptability is
application is a feature or a program that allows relatively new. A chat application [5] is the greatest
online or concurrent internet users to connect directly method for making it simple to send and receive
with one another. Focusing on the most error-free messages in real-time with individuals anywhere in
data flow possible on the web is crucial while the world. Users of real-time chat software will be
developing chat applications. Users of chat software able to engage in the same vibrant and engaging
can communicate even when they are far apart. To dialogue as they would in person thanks to
stop hackers or intruders from attempting to steal customizing messaging features. Chat applications
data, encryption becomes a viable solution with the are becoming more and more popular and vital in the
key exchange. As a suggestion for securing chat software development environment. owing to this
messages in web apps, this study suggests the N-TEA compensatory technique, it allows for flawless
algorithm. The real-time encryption system N-TEA concurrent interaction amongst programmers. Each
operates independently of the type of data being sent group member will be able to talk and work on
and operates in real-time. A real-time, reliable problems with the others wherever they are at any
encryption method is supported by this algorithm. given time thanks to the real-time interaction. The
The findings of this research indicate that the majority of chat applications are incorporated inside
avalanche effect caused by a change in plaintext the development environment. The "Chat
character is 36.72%. Another section sees a 42.9% Application" was created to replace the currently in-
avalanche impact due to the change in the encryption use manual system. The difficulties that these current
key character. The N-TEA algorithm can securely system encounters are intended to be eliminated, and
transmit messages, as this study's findings in some case reduce the hardship faced by the
demonstrate. This App is constructed by using existing system. Additionally, this application
Django Framework in the back end and CSS and prevents users from searching elsewhere for a
HTML in the front end. messaging solution and keeps them speaking on your
Keywords—Django, HTML, CSS platform. The addition of personalizing chat
capabilities to your app can assist make sure that your
I. INTRODUCTION users have a positive experience. Chat applications
In the modern world, where everything is can be either private chat, group chat [6], or large-
being replaced by technology. The means of scale chat. Our project serves as an illustration of a
communication are likewise evolving. Due to its user- chat application. It consists of two modules: a client
friendly functionality and convenience for real-time module that runs on the user's computer and a server
communication [1], messaging has integrated itself module that runs on any networked computer. The
into our daily lives [2]. There are numerous similar client must establish a connection to the server in
methods accessible today, including instant order to start a conversation. Once connected, users

DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1445
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

can practice two different kinds of chatting: develop a brand-new cyber identity that is entirely
Public(messages are broadcast to all connected users) distinct from their true identities. Randall asks that it
and Private(between any two users alone), and at the be difficult for people to flip between these two
same times as the last security measures were taken. identities as a result of these circumstances[11].
The N-TEA algorithm enables the As a result, while chat has a positive
maintenance of powerful encryption techniques and influence on society, there are also issues present.
real-time capabilities. The foundation of the N-TEA However, these issues don't appear to be too pressing.
encryption method is the dictionary or dictionary Therefore, chat technology will continue to grow
"AM," which upholds data security and data essential to our lives as long as these issues persist.
reduction. The released "AM" code was created as a
framework for text compression in both versions III. METHODOLOGIES
[7][8]. The following code is used to reduce data Different Front-end and Back-end
usage in mobile email and chat programmers as well technologies that are present in today's digital age are
as text messaging. The N-TEA algorithm used in this used in this chatting software. The following is a
research is based on the "AM" framework for quick discussion of the technologies employed in this
encrypting digital data. project:

II. LITERATURE REVIEW A. Frontend Technologies


Nowadays, the public has become HTML
significantly familiar with internet communication. HTML is known as hypertext markup
People now communicate with one another using language and is the most favorable language for
advanced technology rather than the telephone, cars, creating web page designs. Technologies like
or mail. In actuality, chat become a form of internet scripting languages and Cascading Style Sheets
technology that facilitates human-to-human [9] (CSS) like JavaScript can assist with HTML. The
conversation. Web chat, for instance, becomes the web browsers download the HTML files from servers
latest chat. With the advancement in technology in or local drives and turn them into various multimedia
recent times, there has massive growth in the practice web pages. It is used to establish the structure of a
of using chat for communication. Users of the chat webpage semantically and it originally provides a
software can communicate, send and receive signal for the introduction of the document created.
messages, and play games in real-time with other
users. Studies on the effects of chat apps on society CSS
have become more popular due to their increased use. The language used to style an HTML
Because of work stresses, there is a positive document is called CSS (Cascading Style Sheets).
impact of the chat. According to Hauben (1997), the CSS is used to specify how HTML elements should
user is now free to interact without having any form be presented, such as changing your content's font,
of fear, limitation, or apprehension through the chat color, size, and spacing, dividing it into numerous
because the impact or influence of the first columns, or including animation and other
impression has been erased. This statement identifies adornments. By using CSS lots of time and work can
the primary reason for the exclusive growth in the use be saved. The design of several web pages can be
of chat. There isthe advantage of using chat as well, managed simultaneously by using CSS.
which is why there are such a large number of users.
Accordingly, Licklider (1997) asserted that JAVASCRIPT
individuals can interact online with one another if JavaScript (JS) is an
they share similar objectives, passions, and interpreted,lightweight, compiled programming
viewpoints. As a result, their lives will become language. This JavaScript comes with first-class
happierand their interaction will get more fruitful and functions. The main objective to design JavaScript is
pleasurable. Although Lickliderwas actually the for constructing network-centric applications. It is
prophet of the net, it seems that chat really has very easy to implement as it is integrated with HTML
benefits[10]. and also it’s open and cross-platform.
Instead of focusing on the chat’s advantage, JavaScript is a crucial component of web
some researchers have adopted a different strategy by applications because it makes web pages interactive.
emphasizing its issue rather than its benefits. Due to its high popularity in the programming world,
According to Randall (1997), for instance, some it is a programmer’s great choice. By learning
issues have actually existed. Undoubtedly, most JavaScript, you will be able to develop great front-
people will not communicate using their real end and Back-end software by the use of various
identities, as is common knowledge. Either they will

DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1446
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

frameworks that are based on JavaScript like jQuery, software needed for the application to function on
and Node.JS. various devices:

B. Backend Technologies Systems Specification


PYTHON Processor Required: Intel® Core™ ie-5005U
Python is developed by Guido van Rossum @2.00GHz
and is initially released in 1991, which is a general- RAM: Should be 2 Gigabytes or more
purpose, object-oriented, interpreted, interactive, System Type: Should be 32-bit/64-bit operating
interpreted, object-oriented, and high-level system, x32 or x64-based Processor.
programming language [12]. Python's design OS Required: Windows 7/8/10/11.
ideology places a strong emphasis on code readability
through the extensive use of whitespace.Python is Software Interface required:
also a garbage-collected programming language with Front End: HTML, CSS, JavaScript
dynamic typing. Back End: Django
Local Access Link: localhost: 8000
In this chatting app, we are using python as a
backend coding language to code database parts and IV. PROPOSED METHODS
all the functionalities that a website can perform. We took several steps in the development of this
Python 3.6, the most recent version is used in this project. The key action is outlined here:
project 1. Installation of Python and adding its path to
windows.
DJANGO 2. Creating Virtual Environment (In the command
Django (Holovaty&Kalpan-Moss, 2008) is prompt, type the commands below to create a
known as a high-level Python Web Framework that virtual environment)
promotes pragmatist design, quick development, and  pip install virtualenvwrapper-win
clean code [13]. Since Django was created by  mkvirtualenvironmentname (give any name)
seasoned programmers, you can concentrate on  workonenvironmentname
creating apps without having to invent the wheel by 3. Django Installation
using it to handle a lot of the hassles associated with  pip install Django
web development. Django’s main objective is to 4. For navigating to the destination location where
make the process of building database-driven you want the project to be kept, use the cd
complex, database-driven websites simpler. Less command.
code, ―pluggability‖, quick development, ―Low 5. Creation of the Project is as follows
coupling‖, quick development, and the not repeating  django-admin startproject(name of the project)
yourself philosophy are the main objective of the
 cd (project name)
Django framework. Python is utilized everywhere,
6. Creation of the project App as
including when creating data models and files.
 django-admin startappappname
Additionally, it has an optional admin create,delete
interface, read, and update that is dynamically  python manage.py makemigrations
produced using contemplation and customized using  python manage.py migrate
admin models. 7. Copy the Template Folder (if Frontend Template
is downloaded) to the project folder created.
MYSQL 8. Run Server (localhost:8000)
Based on the popular language known as  Python manage.py runserver
Structured Query Language, which is used to
maintain and access database records, MySQL is The installation process for our project and
RelationalDatabase Management System (RDBMS) the processes required in its development are
that is open-source. For creating web-based illustrated in the flow chart below. Commands
applications, it is regarded as one of the best enclosed in brackets should be entered into the
RDBMS. Command Prompt. On the platform that the project
will be developed on, they must build up a virtual
C. Hardware and Software Requirements environment and operate a server. Any editor can be
All of the functionally and non-functionally used to code the backend and frontend (the PyCharm
satisfying needs are mentioned to construct the Community version was used in this project).
project. The following is a list of the hardware and

DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1447
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

Fig. 1. Flow Chart of Methodology

DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1448
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

V. PROJECT DESIGN communicate with one another via written messages


This project’s concept is about a web-based in real-time.
real-time chat application that offers users a platform
to chat in real-time. Basically, this project consists of Client Modules: -
a login page and a chat room. Two modules for this A client is a piece of software program that
project are listed below: enables the user to connect to a chat server and
engage in user-to-user communication in a chat room.
Server Modules: -
A server is a specifically configured Chat Room: -
computer linked to the internet that allows the user to A chat room is where a user can start a real-
time online conversation with other users.

Fig. 2. Flow Chart

The flow process of this chat program encoded. For ciphertext to be acknowledged and
begins with connecting to the server online through understood by the recipient, it must be possible to
the internet. This application is ready once linked to convert it back into the original plaintext.
the server. When a user and another user are friends, Messaging is a part of data exchange
they can communicate by exchanging IDs. The between two entities. The entity that sends messages
message is information or data that can be read and to other entities is known as the sender. The entity
understood. The message is sometimes referred to as that receives the message is the recipient. The sender
plaintext. The message must be encoded into another would want the communication to be done surely,
incomprehensible form in order to render it which means that the sender is confident that the
unreadable by other unauthorized parties. Ciphertext recipient cannot view the message’s contents. The
is the name for a communication that has been message must be converted into ciphertext as a fix.
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1449
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

An explicit communication(plaintext) is converted a key to be decrypted. On the other hand, if the


through the process of encryption into a random sender doesn’t utilize encryption, the client will
message that cannot be decoded(ciphertext). automatically get a message in plaintext, which can
Although the decryption procedure is the opposite of be read immediately. Two users, A, and B, are
encryption, it will turn the ciphertext into plain text represented in this system design fable. User A is the
utilizing the same crucial method and key. sender and User B is the recipient of the
The only difference between the two communication. The message is sent by the
encryption methods is how the communication is conservation, encrypted, sent, and finally decrypted a
received. If the sender encrypts the message, all second time before being delivered to the recipient in
received messages will be in the ciphertext and need plain text.

VI. RESULT AND DISCUSSION


TABLE.
Data Size Encryption Decryption
Time(sec) Time(sec)
1 1 byte 0.34 0.82
2 2 bytes 0.41 0.94
3 3 bytes 0.47 1.23
4 1 byte 0.29 0.69
5 3 bytes 0.48 0.98
6 1 byte 0.34 0.82
Fig.3. Computation Test of Algorithm Encryption

The length of the encryption process encryption and decryption processes is 0.3 seconds.
increases with the size of the encrypted text. The This algorithm is more guaranteed in terms of
encryption process takes 0.34 seconds for 1-byte text security. Because all the messages obtained when
data and 0.41 seconds for 2-byte text data. The obtaining the message are the ciphertext and not the
quantity of words entered determines how quickly a actual message. A message can only be opened by the
communication is encrypted. The process takes recipient using a key that has been entered by the
longer as the number of words sent increases. Longer message sender. The message won’t be read by the
than the encryption process is the decoding process. recipient if the key entered by the message recipient
The encryption process for the initial text data takes and the key entered by the sender is different.
0.34 seconds. The time difference between the

Fig.4. Login Page

DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1450
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

Fig.5. Chat Room

VII. CONCLUSION AND FURTHER Application Based on Android Using


SCOPE Google Firebase,‖ International Journal of
No matter how well and efficiently anything Advance Research in Computer Science and
is done, there is always space for improvement. Management Studies, vol. 6, no. 4, 2018,
However, the main crucial component ought to be [Online]. Available: www.ijarcsms.com
adaptable enough to welcome subsequent alteration. [2]. R. A. Sowah, A. R. Ofoli, S. N. Krakani, and
We only use text at this moment. Chat platforms first S. Y. Fiawoo, ―Hardware design and web-
gained popularity by providing a free, web-based based communication modules of a real-time
alternative to SMS, but over time they transformed multisensor fire detection and notification
into multimedia hubs that provide text system using fuzzy logic,‖ IEEE Trans Ind
communication. Customers must be sure that nobody Appl, vol. 53, no. 1, pp. 559–566, Jan. 2017,
could read their communication as it is real-time and doi: 10.1109/TIA.2016.2613075.
was not stored data. Further, we can extend this [3]. C. Anglano, M. Canonico, and M.
software to include features that will make it more Guazzone, ―Forensic analysis of the
comfortable to use. The feature which can be added ChatSecure instant messaging application on
are: android smartphones,‖ Digit Investig, vol.
File Sharing: Through this software program, the 19, pp. 44–59, Dec. 2016, doi:
user will be capable enough to transfer the file in 10.1016/j.diin.2016.10.001.
various formats to the other user. [4]. S. Hegde and S. Shah, ―A SURVEY ON
Voice chat: Voice chat will take this application to THE LATEST WEB TECHNOLOGIES.‖
the advanced level making the user enable voice [Online]. Available: www.ijtra.com 2015.
calling, just like on a telephone, for communication. [5]. G. Rovira Sánchez, ―Implementation of a
chat application for developers,‖ 2017.
REFERENCES [6]. A. Kumar and A. Singh, ―Research paper on
[1]. N. Chatterjee, S. Chakraborty, A. Decosta, Group chatting Application.‖ [Online].
and A. Nath, ―Real-time Communication Available:
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1451
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252

https://www.researchgate.net/publication/36 Netizen: Their impact on science and


0483603 2022. society,‖ in Past, Present and Future of
[7]. R. KembangHapsari, SISTEM Research in the Information Society,
KEAMANAN SHORT MESSAGE Springer US, 2007, pp. 47–62. doi:
SERVICE (SMS) BERBASIS ANDROID 10.1007/978-0-387-47650-6_4.
MENGGUNAKAN ALGORITMA [11]. Randall. N (1997). Epilogue: The Soul of
ADVANCED ENCRYPTION STANDARD the Internet, The soul of internet: net
(AES). 2016. gods, netizens and the wiring of the
[8]. Sugiyanto, ―N-TEA (New-Text Encryption world(pp.345-358). London: Computer
Algorithm) For Secure Chat In Android Press
Based Application.‖2018 [12]. R. Bello, M. Ogunrinde, and B. Bello,
[9]. M. A. Mohamed, A. Muhammed, and M. ―Model Implementation Of Text And Video
Man, ―A secure chat application based on Chats With Python Ide Software,‖ Journal of
pure peer-to-peer architecture,‖ Journal of Computer Science and Its Application, vol.
Computer Science, vol. 11, no. 5, pp. 723– 27, no. 1, Aug. 2020, doi:
729, 2015, doi: 10.3844/jcssp.2015.723.729. 10.4314/jcsia.v27i1.7.
[10]. R. Hauben, J. Hauben, W. Zorn, K. Chon, [13]. ―django-private-chat Documentation Release
and A. Ekeland, ―The origin and early 0.3.0 delneg,‖ 2020.
development of the internet and of the

DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1452

You might also like