Anda di halaman 1dari 5

1.

Abstract

The secure communication between the person sending the information and the
person receiving the information is authenticated by using the Quantum Cryptography. In the
A Secure Chat Program situations like public discussions and also when the session keys are
divided the verification of eavesdropping and verification of uniqueness of session key is
done by using the quantum key mechanisms and Quantum key distribution protocols in the
quantum cryptography. In the communication rounds that are taken place later between the
information sender and information receiver requires the public discussions. These
communication rounds among the sender and the receiver are intermediary. In general the
communication between the sender and the receiver should be secure; the session explanation
should be set up proper in order to achieve the common authentication for the authorized
user.

2. Study of existing system

In the previous existing there were something, but here something interesting is implemented
in this project, like a private chat system and one to one connection.

3. Metamorphosis:

3.1 Objectives:

 To connect with people in one place


 To be more comfortable with each other.

3.3.1 Hardware Requirement

Processor : Intel Pentium IV 2.0 GHz and above


RAM : 2GB and above
Hard disk : 80GB and above
Monitor : CRT or LCD monitor
Keyboard : Normal or Multimedia
Mouse : Compatible mouse

3.3.2 Software Requirements

Front End : Xml


Language : Java
Back End : Android Studio
Operation System : Windows XP or above
Browser : Any latest browser

4. Requirement Analysis:

1|Page
4.1 Introduction:

Requirements analysis, also called requirements engineering, is the process of determining


user expectations for a new or modified product. These features, called requirements, must be
quantifiable, relevant and detailed Requirements analysis is an important aspect of project
management.

4.2. About Front End:

The Android platform is an open source mobile development platform. It gives you access to
all aspects of the mobile device that it runs on, from low level graphics, to hardware like the
camera on a phone. With so many things possible using Android, you might wonder why you
need to bother with XML. It is not that working with XML is so interesting; it is working
with the things that it enables. XML is commonly used as a data format on the Internet. If you
want to access data from the Internet, chances are that the data will be in the form of XML. If
you want to send data to a Web service, you might also need to send XML. In short, if your
Android application will leverage the Internet, then you will probably need to work with
XML. Luckily, you have a lot of options available for working with XML on Android.
4.3 About Back End:
Java programming language was originally developed by Sun Microsystems which was
initiated by James Gosling and released in 1995 as core component of Sun Microsystems'
Java platform (Java 1.0 [J2SE]).

The latest release of the Java Standard Edition is Java SE 8. With the advancement of Java
and its widespread popularity, multiple configurations were built to suit various types of
platforms. For example: J2EE for Enterprise Applications, J2ME for Mobile Applications.

The new J2 versions were renamed as Java SE, Java EE, and Java ME respectively. Java is
guaranteed to be Write Once, Run Anywhere.

Java is −

Object Oriented − In Java, everything is an Object. Java can be easily extended since it is
based on the Object model.

Platform Independent − Unlike many other programming languages including C and C++,
when Java is compiled, it is not compiled into platform specific machine, rather into platform

2|Page
independent byte code. This byte code is distributed over the web and interpreted by the
Virtual Machine (JVM) on whichever platform it is being run on.

Simple − Java is designed to be easy to learn. If you understand the basic concept of OOP
Java, it would be easy to master.

Secure − With Java's secure feature it enables to develop virus-free, tamper-free systems.
Authentication techniques are based on public-key encryption.

Architecture-neutral − Java compiler generates an architecture-neutral object file format,


which makes the compiled code executable on many processors, with the presence of Java
runtime system.

Portable − Being architecture-neutral and having no implementation dependent aspects of the


specification makes Java portable. Compiler in Java is written in ANSI C with a clean
portability boundary, which is a POSIX subset.

Robust − Java makes an effort to eliminate error prone situations by emphasizing mainly on
compile time error checking and runtime checking.

Multithreaded − With Java's multithreaded feature it is possible to write programs that can
perform many tasks simultaneously. This design feature allows the developers to construct
interactive applications that can run smoothly.

Interpreted − Java byte code is translated on the fly to native machine instructions and is not
stored anywhere. The development process is more rapid and analytical since the linking is
an incremental and light-weight process.

High Performance − With the use of Just-In-Time compilers, Java enables high performance.

Distributed − Java is designed for the distributed environment of the internet.


Dynamic − Java is considered to be more dynamic than C or C++ since it is designed to adapt
to an evolving environment. Java programs can carry extensive amount of run-time
information that can be used to verify and resolve accesses to objects on run-time.
5. Conclusion:

With the help of above mentioned technologies this project has been run successfully.

3|Page
6. Planning for the project:

 Two members were allocated for this project and every worked simultenously.
 No such cost required to run this project, without internet cost.
 Design the front design and then implement it throught android studio.

7.Testing:

Software testing is the process of evaluation a software item to detect differences between
given input and expected output. Also to assess the feature of A software
item. Testing assesses the quality of the product. Software testing is a process that should be
done during the development process.

7.1Black Box Testing:

The method of Black Box Testing is used by the software engineer to derive the required
results of the test cases:
1. Black Box Testing alludes to test that are conducted at the soft ware
interface.
2.A Black Box Test examines some fundament al aspect of a system with
little regard for the internal logic structure of the software.
3.A limited number of import ant logical paths can be selected and
exercised.
4. Important data structure can be probed for validity

Black box testing was performed to find errors in the following categories:-
Incorrect or missing functions
 Graphics error.
 Errors in data in binary format.
 Error in data in integer format.
 File error.
 Pointer error.
 Memory access error.
 Variable error.
 Performance error

7.2White Box Testing:

White Box Testing is sometimes called Glass Box Testing. Using White Box

Testing methods the software engineer can derive the following test cases:
1 . Guarantee that all independent paths within a module have been
exercised at least once.
2. Exercise all logical decisions on their true and false sides.
3. Execute all loops at their boundaries and within their operational bounds.
4. Exercise internal data structures to ensure the validity. 50
In White Box Testing efforts were made to handle the following:-
• Number of input parameters equal to number of arguments.

4|Page
•Parameters and arguments attributes match.
• Number of arguments transmitted is called modules equal
to attributes of parameters..
•Unit system of argument transmitted is called modules equal unit
system of parameter.
• Number of attributes and order of arguments to build in functions correct.
•Any references to parameters not associated to build in functions correct.
•Input only arguments altered.
•Global variable definition consistent across module.
•Files attributes correct.
•Format specifications matches I/O specification.
•Files opened before use.

8.Security System:

a) Encrypted password : The password given by the user has been converted into a
encrypted format then store into the database. Thus it makes secure the no one can get the
original password.
The encrypted function that is being used here:

base64_encode(strrev(md5($password)

b)Session Management:Thus when a user gets logged in a session has been created that
stores the current user id thus if a user is logged in then no other user can get another page
without destroying the current session. Thus it makes the application more user friendly at the
same time making the Application.

9. User Manual

A user guide or user's guide, also commonly known as a manual, is a technical


communication document intended to give assistance to people using a particular system. It is
usually written by a technical writer, although user guides are written by programmers,
product or project managers, or other technical staff, particularly in smaller companies.

11. Web reference:

1. https://www.w3schools.com

2. https://www.youtube.com/watch?v=rr9VdmRg7Vk
3. https://www.youtube.com/watch?v=WzQR-93WI1w

5|Page

Anda mungkin juga menyukai