Web Cryptology
Presented By: Project Guide:
The main objective of this project (Crypto Log) is to send the confidential
details and related confidential files and documents to their recipients in a
securable way.
Crypto log will use the numerous kinds of algorithms to generate the
encrypted strings, files and decrypted strings, files.
The Secure Sockets Layer (SSL(its have a one public key and one private
key)) is a common Encryption protocol used in Crypto log.
When you see a URL in your Web browser that starts with "https" instead of
"http", it is a secure connection that is using SSL.Some methods of
cryptography used a "secret key" to allow the recipient to decrypt the
message.
The most common secret key cryptosystem is the Data Encryption Standard
(DES), or the more secure Triple-DES which encrypts the data three times.
MD5, SHA1, RijndaelManaged.
In Existing system, the data will be secure through the network because
data transmission is done in encrypted format.
In Existing system, data will not be accessed through the authorized
person.
The system does not provide security to the data store in database.
In Existing System, the security is not provided throughout the server
and database.
In Proposed System, the data will be secure using the web
technology by using https enabled.
In Proposed System, the data will be accessed through the
authorized person.
The system provides security to the data store in the
database.
In Proposed System, the security is provided throughout
the server and database by disabling the cookies etc.
The Cryptology has been divided into 5 different modules:
The Cryptology has been divided into 5
different modules:
1. Administrator
2. User
3. Cryptic messages
4. Cryptic files
5. Image transformation
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 1 Gb.
Operating System : WindowsXP/2003or Linux/Solaris
User Interface : HTML, CSS
Client-side Scripting : JavaScript
Programming Language : Java
Web Applications : JDBC, JNDI, Servlets, JSP
IDE/Workbench : My Eclipse
Database : Oracle10g
Server Deployment : Tomcat6.x
It is not possible to develop a system that makes all the requirements of
the user. User requirements keep changing as the system is being used.
Some of the future enhancements that can be done to this system are:
As the technology emerges, it is possible to upgrade the system and can
be adaptable to desired environment.
Because it is based on object-oriented design, any further changes can be
easily adaptable.
Based on the future security issues, security can be improved using
emerging technologies.
Attendance module can be added
sub admin module can be added
Reduced entry work
Easy retrieval of information
Reduced errors due to human intervention
User friendly screens to enter the data
Portable and flexible for further enhancement
Web enabled.
Fast finding of information requested
(1) Java Complete Reference by Herbert Shield
(2) Database Programming with JDBC and Java by
George Reese
(3) Java and XML By Brett McLaughlin
(4) Wikipedia, URL: http://www.wikipedia.org.
(5) Answers.com, Online Dictionary, Encyclopedia
and much more, URL:
http://www.answers.com
(6) Google, URL: http://www.google.co.in
(7)Project Management URL:
http://www.startwright.com/project.htm
Thank You