A Secure Chat Application Based On Pure Peer-To-Peer

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

A SECURE CHAT APPLICATION

BASED ON PURE PEER-TOPEER ARCHITECTURE


PRESENTED BY:
V. DIVYA
12321A0522
CSE-A

CONTENTS
Chat application
Peer-to-peer architecture
Pure Peer-to-peer architecture
What does this topic mean?
Why do we need it?
Implementation
Methodology behind it
Total scenario of its working
Advantages & Disadvantages
Enhancements $ future scope

CHAT APPLICATION
Chat Application refers to any

kind of communication over the


Internet that offers a real-time
transmission of text messages
from sender to receiver.

PEER-TO-PEER ARCHITECTURE
Peer-to-peer (P2P) computing
or networking is a distributed
application architecture that
partitions tasks or work loads
between peers.

Peers are equally privileged,

equipotent participants in the


application.

PURE PEER-TO-PEER ARCHITECTURE


Decentralized Architecture.
End-to-End communication.
In "pure" P2P systems, every

node acts as a server and client


- and they share resources
without any centralized
control.

WHAT IS THIS TOPIC?


It is a chat application which is secure and based on pure peer-topeer architecture.

The system is controlled by the users and its security is


autonomously managed by the communicating parties.

WHY DO WE NEED IT?


To totally get rid of centralized.
To get rid of third party
elements.

Transfer of files privately.


No permanent storage of data.
For security.

IMPLEMENTATION
Developed on
Technologies used
Type of application
Cryptosystem used

METHODOLOGY BEHIND IT
Pure P2P architecture with no

centralized server, peers profiles


is managed locally by user.

Contacting each other based on

the IP address and port number


of their devices.

Peer1
Peer5

Peer2

Data Exchange is done among


the peers.

Every peer is equipped with

internet or LAN connection.

Peer4

Peer3

HOW THEY CONTACT?


The peers contact each other with the help of their IP-address and
their port numbers.

DATA EXCHANGE
Message is encrypted prior

exchanging between two or more


peers.

Once peers run this application,


they can start exchanging
messages.

For security reason, message is

encrypted using AES cryptosystem.

data1
Peer1

data2
Peer2

CRYPTOSYSTEM
AES (acronym of Advanced

Encryption Standard) is a
symmetric encryption algorithm.

Key size: 128,192 or 256 bits.


Plain text block size: 128 bits.
No. of rounds: 10,12 or 14.
CHARACTERISTICS:

1. Resistance against attacks.


2. Design simplicity.
3. Speed & code compactness on a
wide range of platforms.

TOTAL SCENARIO OF ITS WORKING

AFTER IT??

CAN WE CREATE GROUPS??

ADVANTAGES
Secure chat
Flexibility ,suitability and

simplicity of AES algorithm.

Equipped with advanced features,


people can use it for education,
business and socialize.

Data exchange among peers is


confidential.

DISADVANTAGES
In this network, the whole

system is decentralized thus it


is difficult to administer.

One person cannot determine

the whole accessibility setting


of whole network.

The application works only in


the network in which it is
present.

ENHANCEMENTS $ FUTURE SCOPE


Update security tools to the latest version.
Create a trusted group feature where the member only
need a single username and password when
communicating with any user within the group.

In making the application more secure, we should also


offer different authentication and encryption
algorithms to be chosen by users.

Whenever possible, key size should be allowed to be


negotiated manually by the users.

ANY QUERIES???

THANK YOU

You might also like