Вы находитесь на странице: 1из 12

Web Cryptology

Presented By: Project Guide:


 The main objective of this project (Crypto Log) is to send the confidential
details and related confidential files and documents to their recipients in a
securable way.

 Crypto log will use the numerous kinds of algorithms to generate the
encrypted strings, files and decrypted strings, files.

 The Secure Sockets Layer (SSL(its have a one public key and one private
key)) is a common Encryption protocol used in Crypto log.

 When you see a URL in your Web browser that starts with "https" instead of
"http", it is a secure connection that is using SSL.Some methods of
cryptography used a "secret key" to allow the recipient to decrypt the
message.

 The most common secret key cryptosystem is the Data Encryption Standard
(DES), or the more secure Triple-DES which encrypts the data three times.

 MD5, SHA1, RijndaelManaged.


 In Existing system, the data will be secure through the network because
data transmission is done in encrypted format.

 In Existing system, data will not be accessed through the authorized


person.

 The system does not provide security to the data store in database.

 In Existing System, the security is not provided throughout the server


and database.
 In Proposed System, the data will be secure using the web
technology by using https enabled.

 In Proposed System, the data will be accessed through the


authorized person.

 The system provides security to the data store in the


database.

 In Proposed System, the security is provided throughout


the server and database by disabling the cookies etc.

 The Cryptology has been divided into 5 different modules:


 The Cryptology has been divided into 5
different modules:

 1. Administrator
 2. User
 3. Cryptic messages
 4. Cryptic files
 5. Image transformation
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 1 Gb.
 Operating System : WindowsXP/2003or Linux/Solaris
 User Interface : HTML, CSS
 Client-side Scripting : JavaScript
 Programming Language : Java
 Web Applications : JDBC, JNDI, Servlets, JSP
 IDE/Workbench : My Eclipse
 Database : Oracle10g
 Server Deployment : Tomcat6.x
 It is not possible to develop a system that makes all the requirements of
the user. User requirements keep changing as the system is being used.
Some of the future enhancements that can be done to this system are:

 As the technology emerges, it is possible to upgrade the system and can


be adaptable to desired environment.

 Because it is based on object-oriented design, any further changes can be


easily adaptable.

 Based on the future security issues, security can be improved using


emerging technologies.

 Attendance module can be added


 sub admin module can be added
 Reduced entry work
 Easy retrieval of information
 Reduced errors due to human intervention
 User friendly screens to enter the data
 Portable and flexible for further enhancement
 Web enabled.
 Fast finding of information requested
 (1) Java Complete Reference by Herbert Shield
 (2) Database Programming with JDBC and Java by
George Reese
 (3) Java and XML By Brett McLaughlin
 (4) Wikipedia, URL: http://www.wikipedia.org.
 (5) Answers.com, Online Dictionary, Encyclopedia
and much more, URL:
http://www.answers.com
 (6) Google, URL: http://www.google.co.in
 (7)Project Management URL:
http://www.startwright.com/project.htm

Thank You

Вам также может понравиться