SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Computation-Efficient Multicast Key Distribution
1.Introduction
1.1 Abstract:
Using Multicast key distribution computation complexity is significantly reduced.
It drastically reduces the computation load of each group member compared to existing
schemes employing traditional encryption algorithms. Such a scheme is desirable for
many wireless applications where portable devices or sensors need to reduce their
computation as much as possible due to battery power limitations. Easily combined with
any key-tree-based schemes, this scheme provides much lower computation complexity
while maintaining low and balanced communication complexity and storage complexity
for secure dynamic multicast key distribution.
1.2 ABBREVIATIONS
MD5 – Message-Digest algorithm 5
DSK Different Session Key

1.3 References
http://tldp.org/HOWTO/Multicast-HOWTO.html
http://www.ipmulticast.com/
http://www.cdt.luth.se/~peppar/java/multicast_example/
http://www.cdt.luth.se/~peppar/java_multicast/
http://java.sun.com/docs/books/tutorial/networking/datagrams/broadcasting.html
2. Overview of Existing System:
In existing system unicast method has been used. In this method message can be
transferred to only one user at a time. There is no security measure while transferring
messages hence data loss may occur because of hackers. Communication complexity
occurs due to Single session key method.

3. Objective of Proposed System:
In Proposed system Multicast Re-keying method has been used. Using this
method message can be transferred to multiple users at a time. Secret key is generated to
avoid data loss while transferring messages by using Cryptography method.
Communication complexity is circumventing by providing multiple session key.
4.2 Software Specification:
Software Interfaces:
Operating System

: Win2000/Win xp

Programming Package

: JAVA / J2EE

Tools

: Eclipse.

SDK

: JDK1.5.0

4.3 Hardware Specification:
Hardware Interfaces:
Processor Type

: Pentium -IV

Speed

: 2.4 GHZ

Ram

: 128 MB RAM

Hard disk

: 20 GB HD
Project Modules
 User interface design
 Transferring message using multicast
 Key establishment using MD5 cryptography algorithm
 Session key generation for multicast receivers
 Audio chatting

User interface design:
In this Module, Design the interface for the user to interact with the application.
Each and every software application needs fine steps to interact with end users of the
application. In this application the interactions with end users are made under AWT
concepts. User should enter the particular Internet protocol address of server to transfer
message. The user should enter his/her user name to adhere the chat room.

Transferring message using multicast:
In this method, you can transmit data or messages to all destination host
machines, which has been interested an appropriate multicast group. The sender
generates only one data stream
But it delivered to all destination hosts. It supports one-to-many data delivering networks.
Multicast delivers a data or information simultaneously to all interested destination hosts
machines. The multicast methodologies are used in case of teleconferencing and
videoconferencing. The teleconferencing and videoconferencing machines transmit data
simultaneously to all interested parties present in the same group.
Multicast provides the best features to unicast and broadcast because, here neither carries
the burden of data to delivering all hosts nor misses-utilize the entire network. Users are
joined in the multicast groups to follows an appropriate standard like: IP Multicast and
Mbone.

Key establishment using MD5 cryptography algorithm:
Shared secret key is used between encryption and decryption of message being
transferred from source to number of receivers.
Cryptographic Implementation:
To prevent the attacker (Middle-man-attack, etc.) from reading the data, we go for
the encryption and decryption of the data. Here we use the MD5 symmetric key
algorithm for secure message transfer. Since there is a separate common key for each pair
of user, the data is secured from others.

Session key generation for multicast receivers:
Every chat room should have an independent session to transfer data between
multiple users. Hence each session thus needs a new key that is only known to the current
session members, i.e., session keys need to be dynamically distributed to authorized
session members. When any one of the old member logout from the chat room, session
key has been canceled for every one and a new session key is generated for the remaining
members.

Audio Chatting:
User can interact by audio chatting. By giving the IP of the user whom want to
interact can have a voice chat. VOIP (Voice over internet protocol) is used to chat. Audio
chat is processed in WAN in former but it’s implemented in LAN also using UDP (User
Datagram Protocol). Transferring audio is in the form of encryption and decryption form
so it’s used to avoid third man interaction.
ScreenShots :
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)

Weitere ähnliche Inhalte

Was ist angesagt?

Private messenger
Private messengerPrivate messenger
Private messenger
Piyush Gaur
 

Was ist angesagt? (20)

18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Private messenger
Private messengerPrivate messenger
Private messenger
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Multi user chat system using java
Multi user chat system using javaMulti user chat system using java
Multi user chat system using java
 
Software Defined Networking - 1
Software Defined Networking - 1Software Defined Networking - 1
Software Defined Networking - 1
 
Using PGP for securing the email
Using PGP for securing the emailUsing PGP for securing the email
Using PGP for securing the email
 
A Complete Guide Cloud Computing
A Complete Guide Cloud ComputingA Complete Guide Cloud Computing
A Complete Guide Cloud Computing
 
Certificate less key management scheme in
Certificate less key management scheme inCertificate less key management scheme in
Certificate less key management scheme in
 
Peer to Peer services and File systems
Peer to Peer services and File systemsPeer to Peer services and File systems
Peer to Peer services and File systems
 
Key management
Key managementKey management
Key management
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Private messenger
Private messengerPrivate messenger
Private messenger
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
Multiuser chat application using java
Multiuser chat application using javaMultiuser chat application using java
Multiuser chat application using java
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks CreationA secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
A secure protocol for Spontaneous Wireless Ad Hoc Networks Creation
 
Encryption and Key Distribution Methods
Encryption and Key Distribution MethodsEncryption and Key Distribution Methods
Encryption and Key Distribution Methods
 

Andere mochten auch

An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)
Mumbai Academisc
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
Mumbai Academisc
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
Mumbai Academisc
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
Mumbai Academisc
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)
Mumbai Academisc
 

Andere mochten auch (8)

An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
 
Engineering
EngineeringEngineering
Engineering
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)Mitigating performance degradation in congested sensor networks(synopsis)
Mitigating performance degradation in congested sensor networks(synopsis)
 
Web based development
Web based developmentWeb based development
Web based development
 

Ähnlich wie Computation efficient multicast key distribution(synopsis)

Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
Videoguy
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
Videoguy
 
Collaboration and Grid Technologies
Collaboration and Grid TechnologiesCollaboration and Grid Technologies
Collaboration and Grid Technologies
Videoguy
 
Sen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmission
Senetas
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 

Ähnlich wie Computation efficient multicast key distribution(synopsis) (20)

A Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast ServicesA Novel High Order Tree for Securing Key Management for Multicast Services
A Novel High Order Tree for Securing Key Management for Multicast Services
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...Scalable Service Oriented Architecture for Audio/Video ...
Scalable Service Oriented Architecture for Audio/Video ...
 
WebRTC Introduction & Basics
WebRTC Introduction & BasicsWebRTC Introduction & Basics
WebRTC Introduction & Basics
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Collaboration and Grid Technologies
Collaboration and Grid TechnologiesCollaboration and Grid Technologies
Collaboration and Grid Technologies
 
Sen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmissionSen 214 simple secure multicast transmission
Sen 214 simple secure multicast transmission
 
IJET-V3I2P3
IJET-V3I2P3IJET-V3I2P3
IJET-V3I2P3
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Blockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud SystemBlockchain Based Decentralized Cloud System
Blockchain Based Decentralized Cloud System
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Towards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephoneTowards building a message retrieval facility via telephone
Towards building a message retrieval facility via telephone
 
Dos unit1
Dos unit1Dos unit1
Dos unit1
 
Wireless application protocol
Wireless application protocolWireless application protocol
Wireless application protocol
 
Dotnet network prog_chap07
Dotnet network prog_chap07Dotnet network prog_chap07
Dotnet network prog_chap07
 
Cloud computing protocol
Cloud computing protocolCloud computing protocol
Cloud computing protocol
 
A securing symmetric key distribution
A securing symmetric key distributionA securing symmetric key distribution
A securing symmetric key distribution
 

Mehr von Mumbai Academisc

J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
Mumbai Academisc
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
Mumbai Academisc
 

Mehr von Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Jsp
JspJsp
Jsp
 
Project list
Project listProject list
Project list
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Kürzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Computation efficient multicast key distribution(synopsis)

  • 1. Computation-Efficient Multicast Key Distribution 1.Introduction 1.1 Abstract: Using Multicast key distribution computation complexity is significantly reduced. It drastically reduces the computation load of each group member compared to existing schemes employing traditional encryption algorithms. Such a scheme is desirable for many wireless applications where portable devices or sensors need to reduce their computation as much as possible due to battery power limitations. Easily combined with any key-tree-based schemes, this scheme provides much lower computation complexity while maintaining low and balanced communication complexity and storage complexity for secure dynamic multicast key distribution. 1.2 ABBREVIATIONS MD5 – Message-Digest algorithm 5 DSK Different Session Key 1.3 References http://tldp.org/HOWTO/Multicast-HOWTO.html http://www.ipmulticast.com/ http://www.cdt.luth.se/~peppar/java/multicast_example/ http://www.cdt.luth.se/~peppar/java_multicast/ http://java.sun.com/docs/books/tutorial/networking/datagrams/broadcasting.html
  • 2. 2. Overview of Existing System: In existing system unicast method has been used. In this method message can be transferred to only one user at a time. There is no security measure while transferring messages hence data loss may occur because of hackers. Communication complexity occurs due to Single session key method. 3. Objective of Proposed System: In Proposed system Multicast Re-keying method has been used. Using this method message can be transferred to multiple users at a time. Secret key is generated to avoid data loss while transferring messages by using Cryptography method. Communication complexity is circumventing by providing multiple session key.
  • 3. 4.2 Software Specification: Software Interfaces: Operating System : Win2000/Win xp Programming Package : JAVA / J2EE Tools : Eclipse. SDK : JDK1.5.0 4.3 Hardware Specification: Hardware Interfaces: Processor Type : Pentium -IV Speed : 2.4 GHZ Ram : 128 MB RAM Hard disk : 20 GB HD
  • 4. Project Modules  User interface design  Transferring message using multicast  Key establishment using MD5 cryptography algorithm  Session key generation for multicast receivers  Audio chatting User interface design: In this Module, Design the interface for the user to interact with the application. Each and every software application needs fine steps to interact with end users of the application. In this application the interactions with end users are made under AWT concepts. User should enter the particular Internet protocol address of server to transfer message. The user should enter his/her user name to adhere the chat room. Transferring message using multicast: In this method, you can transmit data or messages to all destination host machines, which has been interested an appropriate multicast group. The sender generates only one data stream But it delivered to all destination hosts. It supports one-to-many data delivering networks. Multicast delivers a data or information simultaneously to all interested destination hosts machines. The multicast methodologies are used in case of teleconferencing and videoconferencing. The teleconferencing and videoconferencing machines transmit data simultaneously to all interested parties present in the same group. Multicast provides the best features to unicast and broadcast because, here neither carries the burden of data to delivering all hosts nor misses-utilize the entire network. Users are joined in the multicast groups to follows an appropriate standard like: IP Multicast and Mbone. Key establishment using MD5 cryptography algorithm:
  • 5. Shared secret key is used between encryption and decryption of message being transferred from source to number of receivers. Cryptographic Implementation: To prevent the attacker (Middle-man-attack, etc.) from reading the data, we go for the encryption and decryption of the data. Here we use the MD5 symmetric key algorithm for secure message transfer. Since there is a separate common key for each pair of user, the data is secured from others. Session key generation for multicast receivers: Every chat room should have an independent session to transfer data between multiple users. Hence each session thus needs a new key that is only known to the current session members, i.e., session keys need to be dynamically distributed to authorized session members. When any one of the old member logout from the chat room, session key has been canceled for every one and a new session key is generated for the remaining members. Audio Chatting: User can interact by audio chatting. By giving the IP of the user whom want to interact can have a voice chat. VOIP (Voice over internet protocol) is used to chat. Audio chat is processed in WAN in former but it’s implemented in LAN also using UDP (User Datagram Protocol). Transferring audio is in the form of encryption and decryption form so it’s used to avoid third man interaction.