0% found this document useful (0 votes)
9 views20 pages

Final Nis Micro Project

The document outlines a micro-project on implementing client/server communication using cryptography tools, specifically focusing on secure chat applications. It details the project's aim, course outcomes, and methodology, emphasizing the use of RSA encryption for secure message transmission. The project is conducted by a group of students under the guidance of Prof. B. B. Handge at Sir Dr. M.S. Gosavi Polytechnic Institute for the academic year 2023-2024.

Uploaded by

sahilrlayare05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views20 pages

Final Nis Micro Project

The document outlines a micro-project on implementing client/server communication using cryptography tools, specifically focusing on secure chat applications. It details the project's aim, course outcomes, and methodology, emphasizing the use of RSA encryption for secure message transmission. The project is conducted by a group of students under the guidance of Prof. B. B. Handge at Sir Dr. M.S. Gosavi Polytechnic Institute for the academic year 2023-2024.

Uploaded by

sahilrlayare05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Maharashtra State Board of Technical Education, Mumbai

Academic Year : 2023 – 2024


Course Name & Code : Network And Information Security (22620)
Branch Name : Computer Engineering
Semester : VI

MICROPROJECT TOPIC : "Implement Client/ Server Communication


Using Cryptography Tools In Your Laboratory "
submitted in 2024 by the group of TYCO student

Sr.no Roll No. Name of the student Enrollment No. Seat No.

1. 36 Waghmare Vishal Arjun 2118000041 532311


2. 39 Layre Sahil Ravindra 2118000046 532315
3. 46 Gunjal Pratik Santosh 2118000066 532323
4. 48 Chaudhari Gunwant Gautum 2218000209 532326
Under the guidance of
Prof. B. B. Handge

Three years Diploma programme in Engineering and Technology of


Maharashtra
State Board of Technical Education, Mumbai (Autonomous)
IOS 9001:2008 (IOS/IEC – 27001:2013), AT-1800
G. E. S. Sir Dr. M. S. Gosavi Polytechnic Nashik-Road, Nashik – 422101

Prof. B. B. Handge Prof. B. B. Handge Dr. S. P. Deshpande


Subject Teacher Head Of Department Principal

Seal Of Institute

1
Maharashtra State Board of Technical Education
Certificate

This is to certify that Mr. Vishal Arjun Waghmare Roll No: 36 of


Computer Engineering & Technology at (1800) Sir Dr. M.S. Gosavi
Polytechnic Institute, Nashik Road, Nashik-422101 has completed the
micro-project satisfactorily in

Subject: Network And Information Security (22620) for the academic


year 2023 to 2024 as prescribed in the MSBTE curriculum of I Scheme.

Place: Nashik Road Enrollment No : 2118000041


Date: ........................ Exam Seat No : 532311

Prof. B. B. Handge Prof. B. B. Handge Dr. S. P. Deshpande


Subject Teacher Head Of Department Principal

2
Maharashtra State Board of Technical Education
Certificate

This is to certify that Mr. Sahil Ravindra Layre Roll No: 39 of


Computer Engineering & Technology at (1800) Sir Dr. M.S. Gosavi
Polytechnic Institute, Nashik Road, Nashik-422101 has completed the
micro-project satisfactorily in

Subject: Network And Information Security (22620) for the academic


year 2023 to 2024 as prescribed in the MSBTE curriculum of I Scheme.

Place: Nashik Road Enrollment No : 2118000046


Date: ........................ Exam Seat No : 532315

Prof. B. B. Handge Prof. B. B. Handge Dr. S. P. Deshpande


Subject Teacher Head Of Department Principal

3
Maharashtra State Board of Technical Education
Certificate

This is to certify that Mr. Pratik Santosh Gunjal Roll No: 46 of


Computer Engineering & Technology at (1800) Sir Dr. M.S. Gosavi
Polytechnic Institute, Nashik Road, Nashik-422101 has completed the
micro-project satisfactorily in

Subject: Network And Information Security (22620) for the academic


year 2023 to 2024 as prescribed in the MSBTE curriculum of I Scheme.

Place: Nashik Road Enrollment No : 2118000066


Date: ........................ Exam Seat No : 532323

Prof. B. B. Handge Prof. B. B. Handge Dr. S. P. Deshpande


Subject Teacher Head Of Department Principal

4
Maharashtra State Board of Technical Education
Certificate

This is to certify that Mr. Chaudhari Gunwant Gautum Roll No: 48 of


Computer Engineering & Technology at (1800) Sir Dr. M.S. Gosavi
Polytechnic Institute, Nashik Road, Nashik-422101 has completed the
micro-project satisfactorily in

Subject: Network And Information Security (22620) for the academic


year 2023 to 2024 as prescribed in the MSBTE curriculum of I Scheme.

Place: Nashik Road Enrollment No : 2218000209


Date: ........................ Exam Seat No : 532326

Prof. B. B. Handge Prof. B. B. Handge Dr. S. P. Deshpande


Subject Teacher Head Of Department Principal

5
INDEX

Sr.no. Title Page


no.

1. Aim and Course Out-Come 7

2. Abstract 8

3. Introduction 9

4. Method 10

5. Proposed System 14

6. Experimental Result 16

7. Requirements Conclusion 18

8. Marks Section 19

6
A MICRO PROJECT ON “Implement Client/ Server
Communication Using Cryptography Tools In Your Laboratory”

1. Aim Of Project :
The aim of the project is to implement client/server communication using
cryptography tools in a laboratory setting. This involves setting up a client-
server architecture where data is securely transmitted between the two using
cryptographic techniques such as encryption and decryption. The project aims
to demonstrate the importance of cryptography in securing communication
channels and ensuring data confidentiality, integrity, and authenticity.

2. Course Outcome ( CO ) :
The course outcome for implementing client/server communication using
cryptography tools in the laboratory project is aimed at equipping students with
the practical skills necessary to secure communication channels between clients
and servers. Through hands-on experience, students will learn to implement
cryptographic protocols such as SSL/TLS to ensure confidentiality, integrity,
and authenticity of data exchanged over the network. They will gain proficiency
in configuring and managing cryptographic algorithms, keys, and certificates to
establish secure connections and prevent eavesdropping, tampering, and
unauthorized access.

7
3. Abstract :
The effectiveness of the information system in many ways depends on its
architecture and how data is transmitted among different parties. One of the
most popular architectures is a client/server architecture. Practically, one of
such advantages were the centralization of data storage and processing and the
flexibility for applying authentication methods and encryption algorithms.
While the number of clients increases it requires increasing the authentication
and encryption level as high as possible. Client/server is a technology that
allows the user to open an interactive session between the user's browser and the
server. In this study, we used client/server architecture to accomplish secure
chat between clients without the server being able to decrypt the message by
using one layer of encryption between the clients and the server, and then a
second layer of encryption between the clients in a chat room. All the
encryption processes are based on the RSA (Rivest Shamir-Adelman)
algorithm.

8
4. Introduction :
In today's world, computer networking has become an integral part of life.
There are many different networks available to share information between
groups of devices through a shared communication medium . They are mainly
differentiated by the physical medium and protocol standards. Ethernet is a
prime wired networking standard which is an obvious choice for many network
applications due to reliability, efficiency, and speed. The Ethernet standard is
used in various application segments. Figure 1 shows the Client/Server model
architecture that has been used in most network systems and in this study.

Figure 1: A Client/Server Architecture.

The client side could be any type of smart devices (desktop, laptop, smart
phone, etc.). The server part is one device that controls and passes messages and
opens the connections among clients and/or between clients and server. The
Internet part could be one device to isolate the network overall into two main
parts: client(s) and server, it could be a switch or hub or router or just a cable.

A very important aspect in the world of software development is the security of


data that flows through open communication channels. In our web applications,
there is an intensive exchange of data via different protocols, like http, between

9
client applications which are presented as browser, mobile and desktop
applications and server-side applications. The importance and confidentiality of
data may be different depending on the specifics of the web application, and the
possibility of interception by a third party increases with perfection of hacking
techniques in the world of IT. What can be done to prevent access to the data by
your traffic listener? If we exchange data between the client applications and
server, we don’t want the information to be stored as open text on the server,
which will be accessible in case of server crack.

Everyday people use the chat area, through the users (clients) scan chat or send
messages to selected users. However, the security components in chat area
applications are to make sure all information from clients is protected from
hackers. The chat messages from users can easily be transformed by expert
hackers, without a good enough security component. In this way, a chat area
interface (CAI) is a required technique to secure a chat message from hackers.
The cryptography is significant to keep private data secure to avoid
unauthorized access.

5. Method :
Building a Client/Server architecture for an encrypted chat system to
communicate between clients via a server using encryption based on RSA. The
goal for this study is to use client/server architecture to accomplish secure chat
between clients without the server being able to decrypt the message by using
one layer of encryption between the clients and the server, and then a second
layer of encryption between the clients in a chat room. All the used encryption
processes are based on the RSA algorithm. The implementation of this study is
held in the MATLAB environment.

The very term "client-server" was initially applied to the software architecture,
which described the distribution of the execution process by the principle of
interaction of two software processes, one of which in this model was called the
client and the other the server. The client process requested some services, and
the server process ensured their execution. It was assumed that one server

10
process can serve a lot of client processes. One of the client/server applications
is “chatting”. Chatting alludes to one kind of correspondence over the Internet
that offers a continuous transmission of instant messages from sender to
beneficiary or over a server that controls and deals with the gatherings
(customers) to convey.

1. Client/Server The used client/server model describes how a server provides


resources and services to one or more clients. Examples of servers including
web servers, chat servers, and file servers. Each of these servers provide
resources to client devices. Most servers have a one to-many relationships
with clients, meaning a single server can provide resources to m Computers.
In order to meet the main requirements of businesses, networks themselves
are becoming quite complex with multiple clients at one time.

2. Chat Service A secure chat service provides the ability to have real time
secure discussions among users electronically, one-to-one or in group
sessions. A public network accumulates information slightly, rather than on a
user’s individual computer that is used to keep in touch with people. A
secure chatting between client and server to make a safe and reliable
communication, the benefits are :

 Allows for instant communications between users.

 Uses real time chat over the network that can eliminate costly long-
distance charges.

 Allows for rapid query and rapid responses.

 While the negative points of chat service can be listed as following :

 Security problems of instant messaging programs.

 Secure chats in most cases are routed through a server system, where the
service is provided and that is a single point where all messages can be
intercepted.

 Chat programs can provide an open avenue of attack for hackers,


crackers, spies and thieves.

11
3. RSA Encryption In this study, an encrypted chat program designed to ensure
a safe mode of communication between two users. It uses RSA encryption to
encode and decode messages in a terminal window. Clients exchange public
keys and encrypt outgoing text with the intended recipient’s public key.

Each user connects to a central server which forwards messages to the intended
recipient. On the receiving end, the program utilizes a client’s private key to
decrypt received messages. In 1977, Ron Rivest, Adi Shamir and Leonard
Adleman introduced a cryptographic algorithm, RSA, which is named for the
first letter in each of its inventors’ last name. RSA’s motivation is Diffie
Hellman Algorithm which describes the idea of such an algorithm that enables
public key cryptosystem. Here are the steps of RSA Algorithm :

 The first step of the RSA Algorithm is to select two different prime
numbers p and q.

 The second step is the calculation of n where N=p*q

 The calculation of φ(N)=(p 1)*(q-1) is the third step.

 As the fourth step, an integer e is selected as a public-key which is co-


prime with φ(N)

 Finally, the inverse of e modulus φN) is taken to produce d, the private-


key. By using e and d modulus N, the encryption and decryption are
done.

In the RSA Algorithm, the public-key involves two numbers N and e while the
private-key is N together with a different number d. To encrypt message M
(plain text):

M→Me (mod N)=C

To dencrypt message C (cipher text):

C→Cd (mod N)=M

12
For the implementation of RSA, the number N is a product of two large prime
numbers p and q. If p and q are known then d can be obtained from e. As N is a
part of the public-key and the multiplication of p and q then factoring N to find
p and q is possible. Figure 2 shows the main components and processes for the
RSA algorithm.

Figure 2: RSA algorithm main components and processes.

 RSA Key distributions

Each person or a party who desires to participate in communication using


encryption and decryption operations. Assume that Bob needs to send data to
Alice. In the event that they choose to utilize RSA, Bob must know Alice's
public key to encode the message and Alice must utilize her private key to
unscramble the message. To empower Bob to send his encoded messages, Alice
transmits her open key (n, e) to Bob through a dependable, yet not really
mysterious, course. Alice's private key (d) is never dispersed.

 Encryption

13
After Bob acquires Alice's public key, he can send a message specific M to
Alice. To do it, he initially turns M (entirely, the un-cushioned plaintext) into a
whole number m (entirely, the cushioned plaintext), with the end goal that 0 ≤
m < n by utilizing a settled upon reversible convention known as cushioning
plan. He at that point processes the ciphertext c, utilizing Alice's public key e,
corresponding to
c ≡ me (mod n)

This should be possible sensibly immediately, notwithstanding for 500-piece


numbers, utilizing secluded exponentiation. Weave at that point transmits c to
Alice.

 Decryption

Alice can recuperate m from c by utilizing her private key type d by registering

cd ≡ (me ) d ≡ m (mod n)

Given m, she can recuperate the first message M by turning around the
cushioning plan.

6. PROPOSED SYSTEM

Encryption algorithm is deployed to encrypt messages exchanged with the


proposed chat gateway. This study is about developing a new model to create
a private messaging network to transmit message contents over the network /
intranet between client terminals. The chat messaging environment showed a
great potential to host a real time interactive interaction system which is
supported by RSA encryption methodology to preserve the security of the
message stream.

Choosing the key size in RSA encryption is of great importance. As the size
of the key increases, the security level of the system, the complexity and the
resistance of encrypted text increases. These advantages make it difficult to
decrypt ciphertexts and break passwords. However, in addition to these
advantages, the encryption key creation time, text encryption time, and mobile

14
device RAM consumption increase. These disadvantages are factors that will
influence the effective use of the application. For this reason, the advantages
and disadvantages of key dimensions should be determined and the most
suitable key size should be preferred.

To accomplish the chatting and meet the goals of this study in client/server
architecture, the need for authentication methods and encryption algorithms
will be urgent. The flowchart of the secure chat system is presented in Figure
3.

In this study, we used one


authentication level and two
encryption levels. We used GUI
in MATLAB to ask the user for
the server IP and the port that
made the connection and the
client ID and password. We
used the RSA algorithm to
encrypt messages between
clients and the server as the first
encryption level and then
encrypt messages between
clients and chat rooms.

15
7. EXPERIMENTAL RESULTS
The results that we get after implementing the proposed chat lab system in
Figure 3 will be followed figure by figure below (Figures 4, 5, 6, 7, 8, and 9).

Figure 4: Starting the messaging environment.

Figure 5: Initialize the server.

16
Figure 6: Authentication level.

Figure 7: Initialize client(s).

Figure 8: Client asking to join a chat room.

17
Figure 9: Chatting between two clients.
8. CONCLUSION

Demonstrating appropriate client/server applications is a basic figure of


their plan, sending, and later adaptability. The demonstrating advances
required in this exertion are not for the most part accessible, and not prepared
for wide dispersion to application originators and organizers. This paper
highlights the usefulness requirements for client/server models and depicts
configuration inquiries to be tended to. A model reenactment demonstrates
executed a large number of the prerequisites recorded, and its utilization was
shown in a few genuine and speculative illustrations.

We developed a client/server encrypted chat based on RSA by using


MATLAB software encryption policies. The result gave one authentication
level and two encryption levels by secure chat data based on the RSA
algorithm. We have implemented the system in client/server architecture and
in real-time network. We believe that the system provides a high level in
encryption and more flexibility in implementation. However, as a future work
other encryption algorithm might be used and a hybrid algorithm can be
developed for further purposes such as faster or wider messaging needs.

18
References :

1. Ferguson, N., & Schneier, B. (2003). Practical cryptography. Wiley.

2. Stallings, W. (2013). Cryptography and network security: principles and


practice. Pearson.

3. Schneier, B. (2010). Applied cryptography: protocols, algorithms, and source


code in C. John Wiley & Sons.

Marks Section:

Roll no. Seat no. Full name of the student Marks out Marks out of Total out
of (6) (4) performed of (10)
performed by oral
by group presentation
activity

36 532311 Waghmare Vishal Arjun

39 532315 Layre Sahil Ravindra

Gunjal Pratik Santosh


46 532323

48 532326 Chaudhari Gunwant Gautum

19
Prof. B. B. Handge
Department Of Computer Engineering
Sir Dr. Ms. Gosavi Polytechnic Institute,
Nashik Road, Nashik-422101

20

You might also like