Real Time Web Based Secure Chat Application using Django
Real Time Web Based Secure Chat Application using Django
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1445
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252
can practice two different kinds of chatting: develop a brand-new cyber identity that is entirely
Public(messages are broadcast to all connected users) distinct from their true identities. Randall asks that it
and Private(between any two users alone), and at the be difficult for people to flip between these two
same times as the last security measures were taken. identities as a result of these circumstances[11].
The N-TEA algorithm enables the As a result, while chat has a positive
maintenance of powerful encryption techniques and influence on society, there are also issues present.
real-time capabilities. The foundation of the N-TEA However, these issues don't appear to be too pressing.
encryption method is the dictionary or dictionary Therefore, chat technology will continue to grow
"AM," which upholds data security and data essential to our lives as long as these issues persist.
reduction. The released "AM" code was created as a
framework for text compression in both versions III. METHODOLOGIES
[7][8]. The following code is used to reduce data Different Front-end and Back-end
usage in mobile email and chat programmers as well technologies that are present in today's digital age are
as text messaging. The N-TEA algorithm used in this used in this chatting software. The following is a
research is based on the "AM" framework for quick discussion of the technologies employed in this
encrypting digital data. project:
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1446
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252
frameworks that are based on JavaScript like jQuery, software needed for the application to function on
and Node.JS. various devices:
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1447
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1448
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252
The flow process of this chat program encoded. For ciphertext to be acknowledged and
begins with connecting to the server online through understood by the recipient, it must be possible to
the internet. This application is ready once linked to convert it back into the original plaintext.
the server. When a user and another user are friends, Messaging is a part of data exchange
they can communicate by exchanging IDs. The between two entities. The entity that sends messages
message is information or data that can be read and to other entities is known as the sender. The entity
understood. The message is sometimes referred to as that receives the message is the recipient. The sender
plaintext. The message must be encoded into another would want the communication to be done surely,
incomprehensible form in order to render it which means that the sender is confident that the
unreadable by other unauthorized parties. Ciphertext recipient cannot view the message’s contents. The
is the name for a communication that has been message must be converted into ciphertext as a fix.
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1449
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252
The length of the encryption process encryption and decryption processes is 0.3 seconds.
increases with the size of the encrypted text. The This algorithm is more guaranteed in terms of
encryption process takes 0.34 seconds for 1-byte text security. Because all the messages obtained when
data and 0.41 seconds for 2-byte text data. The obtaining the message are the ciphertext and not the
quantity of words entered determines how quickly a actual message. A message can only be opened by the
communication is encrypted. The process takes recipient using a key that has been entered by the
longer as the number of words sent increases. Longer message sender. The message won’t be read by the
than the encryption process is the decoding process. recipient if the key entered by the message recipient
The encryption process for the initial text data takes and the key entered by the sender is different.
0.34 seconds. The time difference between the
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1450
International Journal of Advances in Engineering and Management (IJAEM)
Volume 5, Issue 4 April 2023, pp: 1445-1452 www.ijaem.net ISSN: 2395-5252
DOI: 10.35629/5252-050414451452 |Impact Factorvalue 6.18| ISO 9001: 2008 Certified Journal Page 1452