Professional Documents
Culture Documents
Sriramachandra.M
Sandeep Ukkingatti.M
Praveen K.C
Sandeep V Savanth
Saawan Rathod
GUIDE COORDINATOR
Cryptographic techniques.
Membership Service.
Processor – Pentium IV Processor
J2SDK 1.5.
My Eclipse.
Server Authentication
SERVER ADMIN
ADD USERS
USERNAME
PASSWORD
SERVER NAME
ENCRYPTION
GROUP MEMBER Ek
GROUP COMMUNICATION
1) Server administration .
2) User Authentication.
3) Authenticating the users logged in.
4) Server accepting the clients .
5) Dynamic nature of Generating key.
6) Encryption of message by sender by using key.
7) Multicasting of message to all.
8) Decryption of message with Key.
9) Exit
Admin
Admin Name
and Password
Change Remove
Add Users
Password users
Start
User is
invalid
Client
Username ,password
servername
Accept
request
Checks NO
Validity
YES
Allows client
End
to chat
source Client
types the
message
encryption
If key no
matches Rejected
decryption yes
Video Conferencing.
This project is an implementation based on providing
basics of secure group communication, the definition of
group communication, need for its security and functions
implemented to secure group communication.
Books
[1] William Stallings, ‘ Cryptography and Network Security’,
Prentice Hall India
[2] Alfred J. Menezes, Paul C. van Oorschot, Scott A.
Vanston, ‘HandBook of Applied Cryptography’.
[3] Scott Oaks, ‘Java Security’, Second Edition, Oreilly
Publication
[4] Jonathan B. Knudsen, ‘Java Cryptography’, Oreilly
Publication
[5] Elliotte Rusty, Harlord, ‘Java Network Programming’,
Second Edition, Oreilly Publication
Thank You…