Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

A HIGHLY SECURED CHATTING APP FOR ANDROID

No description
by

Aum Upadhyay

on 5 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of A HIGHLY SECURED CHATTING APP FOR ANDROID

Introduction
Hardware and Software Secification
Methodology :
Advanced Encryption Standard (AES)
A HIGHLY SECURED CHATTING APPLICATION FOR ANDROID
Secured Hash Algorithm (SHA-256) & SALT
Application Module & Flowchart
Conclusion and Future Scope
Agenda
Introduction
Problem Statement
Methodology
Hardware & Software Specification
Conclusion and References

By:
Amol Deshpande 18
Sushant Jain 37
Aum Upadhyay 73

Project Guide :
Mrs. Dakshata Panchal

Increasing number of smartphone users.
Popularity of chat applications on multiple platforms increasing exponentially.
Widely used chat applications like whatsapp have vulnerabilities.
Hence arises the need of an application which provides high level security.

Existing system
Vulnerability of chat application on android.
Need of secured chat application.
Existing unsecured model is :
Proposed Model
Designing Steps :
1.Generate AES value of the entered message.
2.Generate SHA value of the same.
3.Generate random SALT value.
4.Append Step 1, 2 & 3.
5.Send result of Step 4 over a network
AES is a symmetric key algorithm.

Key size – 128 bits, Random key generation.

Variable output size ,but encryption takes place of blocks of 128 bits.

AES Algorithm
Key expansion.
Initial Round
Add Round Key
Rounds
Substitute Bytes
Shift Rows
Mix Columns
Add Round Key
Final Round
Substitute Bytes
Shift Rows
Add Round Key

AES Example :
For input : Hello
AES value
: -15 28 -125 -27 -53 -51 116 120 82 100 -78 104 -30 18 -37 116

Brute force attack will not work.

SHA-2 has an output size of 512 bits, so finding a collision would take O(2^256) time. Given there are no clever attacks on the algorithm.

Secured Hash Algorithm
- Generation of hash values
- Secured hash F(M)
- F(M1)=F(M2)Not possible

SHA 2

To improve security against dictionary attack, we add salt function.

For example,
Input : Hello
SHA value
:
185f8db32271fe25f561a6fc938b2e264306ec304eda518007d1764826381969

It’s corresponding byte array value
: 49 56 53 102 56 100 98 51 50 50 55 49 102 101 50 53 102 53 54 49 97 54 102 99 57 51 56 98 50 101 50 54 52 51 48 54 101 99 51 48 52 101 100 97 53 49 56 48 48 55 100 49 55 54 52 56 50 54 51 56 49 57 54 57



Ensures that attackers can't use specialized attacks like lookup tables and rainbow tables to crack large collections of hashes quickly.

Strengthens the Hash Key for better encryption by addition of salt bits at the end of the key.

The output produced by salt function has a length of 6 bytes.
Salt Function

Input : Hello

Appended array sent over a network
: 49 56 53 102 56 100 98 51 50 50 55 49 102 101 50 53 102 53 54 49 97 54 102 99 57 51 56 98 50 101 50 54 52 51 48 54 101 99 51 48 52 101 100 97 53 49 56 48 48 55 100 49 55 54 52 56 50 54 51 56 49 57 54 57 -15 28 -125 -27 -53 -51 116 120 82 100 -78 104 -30 18 -37 116 3 4 5 2 9 1

Example

Application has Peer-to-peer network.

Socket programming is used for connectivity.

Single server multiple clients.

Provides a chat room for multiple users to chat in a group
App Features:

A user friendly interface.

Securing outgoing messages using SHA 2 and AES algorithm.

Additional security using Salt function which adds random bits to the hash value.

Minimizing the risk of cracking the messages.

Hardware Requirements:
Computer:
>Pentium IV or higher.
>4 GB RAM or higher.(To Simultaneously run 2 emulator )
>A network connection.
Phone:
>800 MHz processor or higher in phone.
>1 GB RAM or higher.

Software Requirements:
Android SDK (2.3.3 or higher)
Eclipse classic 3.6.1.

Snapshot
• With the help of SHA, AES and SALT function, we have secured the outgoing messages.

• SHA generates hash value which is appended by AES value of the message and randomly generated SALT bits.

• This enhances the strength of the message being sent over the network by making it difficult for the third party entities to breach the security.

Conclusion
Future Scope
We have used our security algorithm for lan based chatting application on android platform.

• This algorithm can easily be extended for any java based chatting or messaging application.
• It can be incorporated into various other applications which have chatting as one of the features and also in some sectors like banking, industries, security services and defence where sharing of confidential data comes into picture.
• This application can be extended to transfer multimedia elements like images, audio messages etc.

References
IEEE References:
[1] Yusof, M.K., Abidin, A.F.A., “A secure private instant
messenger”, Communications (APCC), 2011 17th Asia-Pacific Conference, pp.821-825, 2-5 Oct. 2011.

Web References:
[2] What is SHA-2? http://www.entrust.net/knowledge-base
/technote.cfm?tn=8526
[3] Keep Your Data Secure with the New Advanced Encryption Standard
http://msdn.microsoft.com/en-us/magazine/cc164055.aspx
[4] Salt (cryptography) http://en.wikipedia.org/wiki/Salt_(cryptography)

Thank You
Problem Statement
Full transcript