SlideShare a Scribd company logo
Whatscrypt Messenger Application
Team Members:-
M. Muthukumaran(513117621307)
A.Vinothkumar(513117621319)
Guided By:- D. Sandheep(513117621315)
Mr.N.Santhosh,M.C.A., Asst.prof., T. Santhosh kumar(513117621329)
Project Scope
• Privacy
• Secure
• Purpose of Encryption
• What is Encryption
Requirements
• Hardware
– Processor : i3 or above.
– Processer speed : 3.00GHz
– Hard disk : 300GB
– RAM : 4 GB or above
– Monitor : super VGA(17 inch)
– Keyboard : Logitech (103 keys)
– Mouse : Logitech or Optical
• Software
– IDE : Android Studio 3.4.1 (Stable)
– DB : Firebse
– OS : Windows 7,8,10, Linux.
– Mobile Os : Kitkat or above Versions
– Virtual Box : Genymotion 6.0
Abstract
• Whatscrypt application design which protects its users with better
integrity, confidentiality and privacy.
• The purpose of the Whatscrypt application is to allow users to
communicate and chat securely with each other, to use advanced
Encryption algorithoms.
• The users will be able to chat with each other, most likely from
user to user. Also one user can send one message to many users by
forming a group so that all the contacts can receive same message.
Existing System
• Privacy of a user is related to and based on a metadata that an
application can collect and send to a second or third party.
• Unfortunately privacy is one of the factors that is getting sacrificed in
the current mobile application environment. Many applications are free
of charge, but the service providers grab metadata of the user and send
these information to their servers even sometimes without the
knowledge of the users.
• Metadata means any type of data which includes different information
about a user, such as location, name, contact information, creator of
data, contact list, type of operating system, etc….
Disadvantage of Existing Systems
• It not secured privacy issues
• Encrypted data can store and retrieve in that system accessing
offline
• Encrypt algorithms are commonly used
• It less integrity
• Encryption plays a major role, but decryption plays not match
Proposed system
• The proposed system suggests a new method of how the messages
are stored.
• This proposed system aims to fill this gap by providing an
advanced level of chatting protection algorithms.
• This algorithm works with both private key and public key. Only
the encrypted file will be uploading to the server.
• In this application have protect spams, malware attacks,
advertisement.
Advantages of Proposed Systems
• It is more secured for protect spams, advertisement, malware
attacks.
• Encrypted Data not store and retrieve in that system, save in online
Database.
• It is more integrity.
• ‘N’ no.of users connected with stable performance.
• Using new encryption algorithm.
• Encryption and Decryption is plays main role.
Modules
1. Server Module
2. Client Module
3. Authentication Module
4. Discover Friends Module
5. Request Module
6. Conversation Module
Server Modules:-
– A Server is a specially equipped Mobiles connected to the internet that
allowsusers with chat clients to converse with one another via typed
messages in real time.
Client Modules:-
– A Client is a Software program that allows users to connected to chat
servers and communicate with other users via a chat room.
Authentication Module
• Authentication is one of the most important aspects of security.
• This avoids any type of attack or malicious activity by which a
malicious user impersonates the user and identifies himself as the real
user to the server.
• There are different practices to perform such authentication such as
one-time passwords (OTP) and certificate-based authentication (CBA).
• In one-time password, a shared secret key is stored on a device that the
entity has, and the system issues one-time passwords based on this
shared secret key.
Discover Friends Module
• The Discover Friends Module is to show all users id and profiles.
• The user can who wants to chat when give the request to that user,
and also who wants to block chat when user can then remove user
from contact list.
• User have already request then user can accept that request.
Request’s Module
• The Request’s module is shows who wants to send request and
also who wants to user receive requests list are shown.
• If user interest to chat that user when accept the request other wise
user can cancel requests.
Conversation Module
• The Conversation module is to show the chat contacts. Here we
choose who wants to chat (private) to select on the contact.
• Once you select contact when instantly create a page and ready to
connection chat with that user.
• In this page user can type text message and the key for encryption
that message will encrypted and sent it. Receiver can decrypt that
message using the same key.
• Here the another way to secure, don’t have take screenshot or
screen recorder at this module.
Architecture of Whatscrypt Messenger
Use-Case Diagrams
Sequence Diagram
Whatscrypt Messenger for android project
Class Diagram
Screenshots
Signup page Login Page Forgot Password
Account Settings Home Page Options
Find Friends Page Profile Page Request sent to others
Request from others Chat Page Individual Chat
Decrypt Message Using Key View message
Feedback Page
Conclusion
• Users can be confident that nobody can read their messages; even
provider of the service also cannot read their messages.
• Even the mobile phone reaches to wrong hands, no readable
information can be extracted from the physical memory of the
phone.
Future Enhancement
• In future this project can be developed to share the documents,
images, audio and video in a secure way and also to provide
advanced encryption algorithms to encrypt those multimedia files
which has to share securely.
• The next level to develop the video conference call and voice
conference call will also be included.
References
• [1]Barry A. Burd ,‟Android Application Development All in One”,
Wiley, 2015.
• [2] Ed Burnette,‟Hello, Android: Introducing Google‟s Mobile
Development Platform‟ third edition‟ Pragmatic
Programmers,2013.
• [3] https://developer.android.com/guide
• [4] https://developer.android.com/design
• [5] https://developer.android.com/reference

More Related Content

PDF
Psdot 19 four factor password authentication
PPSX
Shoulder surfing resistant graphical and image based login system
PPT
PPTX
3D Password
PPTX
3d authentication system
PPTX
Security in e commerce
PPTX
Authentication vs authorization
PPTX
3DPassword_AakashTakale
Psdot 19 four factor password authentication
Shoulder surfing resistant graphical and image based login system
3D Password
3d authentication system
Security in e commerce
Authentication vs authorization
3DPassword_AakashTakale

What's hot (20)

PPTX
What is Cryptography and Types of attacks in it
PPTX
INFORMATION AND CYBER SECURITY
PPT
3D password
PPTX
3D PASSWORD
PPTX
Computer Security Primer - Eric Vanderburg - JURINNOV
PDF
3D password
PDF
E commerce Security
PDF
3d password - Report
PDF
Chapter 3 security principals
PPTX
Different types of attacks in internet
PPTX
3D Password M Sc BHU Sem 1
PPTX
Attack lecture #2 ppt
PPTX
Multi Factor Authentication using 3D password
PDF
Location based authentication new words approch secuirity
PPSX
Welcome to the 3rd generation in user authentication
PPT
Malwares
PPTX
Security in E-commerce
PPTX
3 d secure password
PPTX
3D-Password
What is Cryptography and Types of attacks in it
INFORMATION AND CYBER SECURITY
3D password
3D PASSWORD
Computer Security Primer - Eric Vanderburg - JURINNOV
3D password
E commerce Security
3d password - Report
Chapter 3 security principals
Different types of attacks in internet
3D Password M Sc BHU Sem 1
Attack lecture #2 ppt
Multi Factor Authentication using 3D password
Location based authentication new words approch secuirity
Welcome to the 3rd generation in user authentication
Malwares
Security in E-commerce
3 d secure password
3D-Password
Ad

Similar to Whatscrypt Messenger for android project (20)

PDF
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
PDF
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
PDF
CONFY make it easy to communicate with people anywhere in the world by sendin...
PDF
CONFY make it easy to communicate with people anywhere in the world by sendin...
PPTX
Chat Application
PDF
End end-security
PDF
International Journal of Engineering Research and Development
PDF
Shivkumar_koppad_14043513_EE6093_FInal Ecopy submission.
PPTX
Social messenger introduction
PDF
A Modular Instant Messaging System
PDF
Secure instant messanger service
PPT
Client server chat
PPTX
Private messenger
PPTX
Private messenger
PPTX
Communication security 2021
DOCX
ProposalRequirements document This is part 1 of the project, I .docx
PDF
Chat application throught client server project report.pdf
PDF
TLS/SSL Protocol Design 201006
PDF
Multicast chat with file and desktop sharing
DOC
digiCRYPT_ENG
MESSENGER: ANDROID MESSENGER WITH END TO END ENCRYPTION
The Proposed Development of Prototype with Secret Messages Model in Whatsapp ...
CONFY make it easy to communicate with people anywhere in the world by sendin...
CONFY make it easy to communicate with people anywhere in the world by sendin...
Chat Application
End end-security
International Journal of Engineering Research and Development
Shivkumar_koppad_14043513_EE6093_FInal Ecopy submission.
Social messenger introduction
A Modular Instant Messaging System
Secure instant messanger service
Client server chat
Private messenger
Private messenger
Communication security 2021
ProposalRequirements document This is part 1 of the project, I .docx
Chat application throught client server project report.pdf
TLS/SSL Protocol Design 201006
Multicast chat with file and desktop sharing
digiCRYPT_ENG
Ad

Recently uploaded (20)

PDF
August Patch Tuesday
PDF
Encapsulation theory and applications.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Getting Started with Data Integration: FME Form 101
August Patch Tuesday
Encapsulation theory and applications.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A novel scalable deep ensemble learning framework for big data classification...
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Web App vs Mobile App What Should You Build First.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hybrid model detection and classification of lung cancer
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MIND Revenue Release Quarter 2 2025 Press Release
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
A comparative study of natural language inference in Swahili using monolingua...
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Programs and apps: productivity, graphics, security and other tools
Univ-Connecticut-ChatGPT-Presentaion.pdf
Enhancing emotion recognition model for a student engagement use case through...
SOPHOS-XG Firewall Administrator PPT.pptx
Getting Started with Data Integration: FME Form 101

Whatscrypt Messenger for android project

  • 1. Whatscrypt Messenger Application Team Members:- M. Muthukumaran(513117621307) A.Vinothkumar(513117621319) Guided By:- D. Sandheep(513117621315) Mr.N.Santhosh,M.C.A., Asst.prof., T. Santhosh kumar(513117621329)
  • 2. Project Scope • Privacy • Secure • Purpose of Encryption • What is Encryption
  • 3. Requirements • Hardware – Processor : i3 or above. – Processer speed : 3.00GHz – Hard disk : 300GB – RAM : 4 GB or above – Monitor : super VGA(17 inch) – Keyboard : Logitech (103 keys) – Mouse : Logitech or Optical
  • 4. • Software – IDE : Android Studio 3.4.1 (Stable) – DB : Firebse – OS : Windows 7,8,10, Linux. – Mobile Os : Kitkat or above Versions – Virtual Box : Genymotion 6.0
  • 5. Abstract • Whatscrypt application design which protects its users with better integrity, confidentiality and privacy. • The purpose of the Whatscrypt application is to allow users to communicate and chat securely with each other, to use advanced Encryption algorithoms. • The users will be able to chat with each other, most likely from user to user. Also one user can send one message to many users by forming a group so that all the contacts can receive same message.
  • 6. Existing System • Privacy of a user is related to and based on a metadata that an application can collect and send to a second or third party. • Unfortunately privacy is one of the factors that is getting sacrificed in the current mobile application environment. Many applications are free of charge, but the service providers grab metadata of the user and send these information to their servers even sometimes without the knowledge of the users. • Metadata means any type of data which includes different information about a user, such as location, name, contact information, creator of data, contact list, type of operating system, etc….
  • 7. Disadvantage of Existing Systems • It not secured privacy issues • Encrypted data can store and retrieve in that system accessing offline • Encrypt algorithms are commonly used • It less integrity • Encryption plays a major role, but decryption plays not match
  • 8. Proposed system • The proposed system suggests a new method of how the messages are stored. • This proposed system aims to fill this gap by providing an advanced level of chatting protection algorithms. • This algorithm works with both private key and public key. Only the encrypted file will be uploading to the server. • In this application have protect spams, malware attacks, advertisement.
  • 9. Advantages of Proposed Systems • It is more secured for protect spams, advertisement, malware attacks. • Encrypted Data not store and retrieve in that system, save in online Database. • It is more integrity. • ‘N’ no.of users connected with stable performance. • Using new encryption algorithm. • Encryption and Decryption is plays main role.
  • 10. Modules 1. Server Module 2. Client Module 3. Authentication Module 4. Discover Friends Module 5. Request Module 6. Conversation Module
  • 11. Server Modules:- – A Server is a specially equipped Mobiles connected to the internet that allowsusers with chat clients to converse with one another via typed messages in real time. Client Modules:- – A Client is a Software program that allows users to connected to chat servers and communicate with other users via a chat room.
  • 12. Authentication Module • Authentication is one of the most important aspects of security. • This avoids any type of attack or malicious activity by which a malicious user impersonates the user and identifies himself as the real user to the server. • There are different practices to perform such authentication such as one-time passwords (OTP) and certificate-based authentication (CBA). • In one-time password, a shared secret key is stored on a device that the entity has, and the system issues one-time passwords based on this shared secret key.
  • 13. Discover Friends Module • The Discover Friends Module is to show all users id and profiles. • The user can who wants to chat when give the request to that user, and also who wants to block chat when user can then remove user from contact list. • User have already request then user can accept that request.
  • 14. Request’s Module • The Request’s module is shows who wants to send request and also who wants to user receive requests list are shown. • If user interest to chat that user when accept the request other wise user can cancel requests.
  • 15. Conversation Module • The Conversation module is to show the chat contacts. Here we choose who wants to chat (private) to select on the contact. • Once you select contact when instantly create a page and ready to connection chat with that user. • In this page user can type text message and the key for encryption that message will encrypted and sent it. Receiver can decrypt that message using the same key. • Here the another way to secure, don’t have take screenshot or screen recorder at this module.
  • 21. Screenshots Signup page Login Page Forgot Password
  • 22. Account Settings Home Page Options
  • 23. Find Friends Page Profile Page Request sent to others
  • 24. Request from others Chat Page Individual Chat
  • 25. Decrypt Message Using Key View message
  • 27. Conclusion • Users can be confident that nobody can read their messages; even provider of the service also cannot read their messages. • Even the mobile phone reaches to wrong hands, no readable information can be extracted from the physical memory of the phone.
  • 28. Future Enhancement • In future this project can be developed to share the documents, images, audio and video in a secure way and also to provide advanced encryption algorithms to encrypt those multimedia files which has to share securely. • The next level to develop the video conference call and voice conference call will also be included.
  • 29. References • [1]Barry A. Burd ,‟Android Application Development All in One”, Wiley, 2015. • [2] Ed Burnette,‟Hello, Android: Introducing Google‟s Mobile Development Platform‟ third edition‟ Pragmatic Programmers,2013. • [3] https://developer.android.com/guide • [4] https://developer.android.com/design • [5] https://developer.android.com/reference