Final Nis Micro Project
Final Nis Micro Project
Sr.no Roll No. Name of the student Enrollment No. Seat No.
Seal Of Institute
1
Maharashtra State Board of Technical Education
Certificate
2
Maharashtra State Board of Technical Education
Certificate
3
Maharashtra State Board of Technical Education
Certificate
4
Maharashtra State Board of Technical Education
Certificate
5
INDEX
2. Abstract 8
3. Introduction 9
4. Method 10
5. Proposed System 14
6. Experimental Result 16
7. Requirements Conclusion 18
8. Marks Section 19
6
A MICRO PROJECT ON “Implement Client/ Server
Communication Using Cryptography Tools In Your Laboratory”
1. Aim Of Project :
The aim of the project is to implement client/server communication using
cryptography tools in a laboratory setting. This involves setting up a client-
server architecture where data is securely transmitted between the two using
cryptographic techniques such as encryption and decryption. The project aims
to demonstrate the importance of cryptography in securing communication
channels and ensuring data confidentiality, integrity, and authenticity.
2. Course Outcome ( CO ) :
The course outcome for implementing client/server communication using
cryptography tools in the laboratory project is aimed at equipping students with
the practical skills necessary to secure communication channels between clients
and servers. Through hands-on experience, students will learn to implement
cryptographic protocols such as SSL/TLS to ensure confidentiality, integrity,
and authenticity of data exchanged over the network. They will gain proficiency
in configuring and managing cryptographic algorithms, keys, and certificates to
establish secure connections and prevent eavesdropping, tampering, and
unauthorized access.
7
3. Abstract :
The effectiveness of the information system in many ways depends on its
architecture and how data is transmitted among different parties. One of the
most popular architectures is a client/server architecture. Practically, one of
such advantages were the centralization of data storage and processing and the
flexibility for applying authentication methods and encryption algorithms.
While the number of clients increases it requires increasing the authentication
and encryption level as high as possible. Client/server is a technology that
allows the user to open an interactive session between the user's browser and the
server. In this study, we used client/server architecture to accomplish secure
chat between clients without the server being able to decrypt the message by
using one layer of encryption between the clients and the server, and then a
second layer of encryption between the clients in a chat room. All the
encryption processes are based on the RSA (Rivest Shamir-Adelman)
algorithm.
8
4. Introduction :
In today's world, computer networking has become an integral part of life.
There are many different networks available to share information between
groups of devices through a shared communication medium . They are mainly
differentiated by the physical medium and protocol standards. Ethernet is a
prime wired networking standard which is an obvious choice for many network
applications due to reliability, efficiency, and speed. The Ethernet standard is
used in various application segments. Figure 1 shows the Client/Server model
architecture that has been used in most network systems and in this study.
The client side could be any type of smart devices (desktop, laptop, smart
phone, etc.). The server part is one device that controls and passes messages and
opens the connections among clients and/or between clients and server. The
Internet part could be one device to isolate the network overall into two main
parts: client(s) and server, it could be a switch or hub or router or just a cable.
9
client applications which are presented as browser, mobile and desktop
applications and server-side applications. The importance and confidentiality of
data may be different depending on the specifics of the web application, and the
possibility of interception by a third party increases with perfection of hacking
techniques in the world of IT. What can be done to prevent access to the data by
your traffic listener? If we exchange data between the client applications and
server, we don’t want the information to be stored as open text on the server,
which will be accessible in case of server crack.
Everyday people use the chat area, through the users (clients) scan chat or send
messages to selected users. However, the security components in chat area
applications are to make sure all information from clients is protected from
hackers. The chat messages from users can easily be transformed by expert
hackers, without a good enough security component. In this way, a chat area
interface (CAI) is a required technique to secure a chat message from hackers.
The cryptography is significant to keep private data secure to avoid
unauthorized access.
5. Method :
Building a Client/Server architecture for an encrypted chat system to
communicate between clients via a server using encryption based on RSA. The
goal for this study is to use client/server architecture to accomplish secure chat
between clients without the server being able to decrypt the message by using
one layer of encryption between the clients and the server, and then a second
layer of encryption between the clients in a chat room. All the used encryption
processes are based on the RSA algorithm. The implementation of this study is
held in the MATLAB environment.
The very term "client-server" was initially applied to the software architecture,
which described the distribution of the execution process by the principle of
interaction of two software processes, one of which in this model was called the
client and the other the server. The client process requested some services, and
the server process ensured their execution. It was assumed that one server
10
process can serve a lot of client processes. One of the client/server applications
is “chatting”. Chatting alludes to one kind of correspondence over the Internet
that offers a continuous transmission of instant messages from sender to
beneficiary or over a server that controls and deals with the gatherings
(customers) to convey.
2. Chat Service A secure chat service provides the ability to have real time
secure discussions among users electronically, one-to-one or in group
sessions. A public network accumulates information slightly, rather than on a
user’s individual computer that is used to keep in touch with people. A
secure chatting between client and server to make a safe and reliable
communication, the benefits are :
Uses real time chat over the network that can eliminate costly long-
distance charges.
Secure chats in most cases are routed through a server system, where the
service is provided and that is a single point where all messages can be
intercepted.
11
3. RSA Encryption In this study, an encrypted chat program designed to ensure
a safe mode of communication between two users. It uses RSA encryption to
encode and decode messages in a terminal window. Clients exchange public
keys and encrypt outgoing text with the intended recipient’s public key.
Each user connects to a central server which forwards messages to the intended
recipient. On the receiving end, the program utilizes a client’s private key to
decrypt received messages. In 1977, Ron Rivest, Adi Shamir and Leonard
Adleman introduced a cryptographic algorithm, RSA, which is named for the
first letter in each of its inventors’ last name. RSA’s motivation is Diffie
Hellman Algorithm which describes the idea of such an algorithm that enables
public key cryptosystem. Here are the steps of RSA Algorithm :
The first step of the RSA Algorithm is to select two different prime
numbers p and q.
In the RSA Algorithm, the public-key involves two numbers N and e while the
private-key is N together with a different number d. To encrypt message M
(plain text):
12
For the implementation of RSA, the number N is a product of two large prime
numbers p and q. If p and q are known then d can be obtained from e. As N is a
part of the public-key and the multiplication of p and q then factoring N to find
p and q is possible. Figure 2 shows the main components and processes for the
RSA algorithm.
Encryption
13
After Bob acquires Alice's public key, he can send a message specific M to
Alice. To do it, he initially turns M (entirely, the un-cushioned plaintext) into a
whole number m (entirely, the cushioned plaintext), with the end goal that 0 ≤
m < n by utilizing a settled upon reversible convention known as cushioning
plan. He at that point processes the ciphertext c, utilizing Alice's public key e,
corresponding to
c ≡ me (mod n)
Decryption
Alice can recuperate m from c by utilizing her private key type d by registering
cd ≡ (me ) d ≡ m (mod n)
Given m, she can recuperate the first message M by turning around the
cushioning plan.
6. PROPOSED SYSTEM
Choosing the key size in RSA encryption is of great importance. As the size
of the key increases, the security level of the system, the complexity and the
resistance of encrypted text increases. These advantages make it difficult to
decrypt ciphertexts and break passwords. However, in addition to these
advantages, the encryption key creation time, text encryption time, and mobile
14
device RAM consumption increase. These disadvantages are factors that will
influence the effective use of the application. For this reason, the advantages
and disadvantages of key dimensions should be determined and the most
suitable key size should be preferred.
To accomplish the chatting and meet the goals of this study in client/server
architecture, the need for authentication methods and encryption algorithms
will be urgent. The flowchart of the secure chat system is presented in Figure
3.
15
7. EXPERIMENTAL RESULTS
The results that we get after implementing the proposed chat lab system in
Figure 3 will be followed figure by figure below (Figures 4, 5, 6, 7, 8, and 9).
16
Figure 6: Authentication level.
17
Figure 9: Chatting between two clients.
8. CONCLUSION
18
References :
Marks Section:
Roll no. Seat no. Full name of the student Marks out Marks out of Total out
of (6) (4) performed of (10)
performed by oral
by group presentation
activity
19
Prof. B. B. Handge
Department Of Computer Engineering
Sir Dr. Ms. Gosavi Polytechnic Institute,
Nashik Road, Nashik-422101
20