SlideShare uma empresa Scribd logo
1 de 18
Maninda Edirisooriya
Introduction
 Extension for Google Chrome.
 Privacy protection system for online chat.
 Encrypts chat text using 128 bit AES.
 Decrypts at the receiver.
 Common password for both users.
Motivation
 No existing cheap solution.
 Lot of Information analyzers in use for advertisements.
 No freedom against governments – filter key words
 For people who do not trust on servers. (Like me )
Design and Implementation
 Design – JavaScript and HTML
 Run as an extension in web browser – In Application
 Layer.
Design and Implementation
 At each end Encryption/Decryption occurs.
 Cipher text in Base-64 encoded is sent via network.
Design and Implementation
 Encryption – change text to Base-64
 Decryption – show text in tooltip and copy to
 clipboard.
Design and Implementation
Setting Password
 Step 1 – Convert password to ASCII numeric
 Step 2 – Get MD5 digest of ASCII as key.

Encryption
 Step 1 – Identify the text box in focus and convert the
  text string to ASCII numeric
 Step 2 – Break it into 128 bit blocks. Assign nulls for
  padding.
 Step 3 – Apply AES 128 block cipher using key.
Design and Implementation
 Step 4 – Convert encrypted numeric values to base 64
  character encoding.
 Step 5 – Replace original string with this. This will be
  sent via server.

Decryption
 Step 1 – Select received text and convert to numeric
  values.
 Step 2 – Break into blocks.
Design and Implementation
 Step 3 – Apply AES 128 decryption to each set of
  blocks.
 Step 4 – Remove padding nulls from the result.
 Step 5 – Convert to ASCII characters and show in a
  tooltip while copying it to clipboard.

Ending Session
 Replace the variables with key value with another
  value.
Demonstration
 Start a session – enter password
 Enter again.
Demonstration
 If passwords are not matching or
 Empty password – Error
Demonstration
 When want to chat type and press Alt + z or
 Select “Encrypt Text” from menu.
                       Alt + z

                         or
Demonstration
 At receiver’s end – select text and press Alt +d or
 Select “Decrypt Text” from menu.
Demonstration
 Can be used without a chat box – Real Time Mode
 Select “Real Time” from menu.
Demonstration
 Other features – Google bubble translator and
 Password generator.
Demonstration
 When want to end conversation – End Session
 Select “End Session” from menu and confirm.
Conclusion
 Simple and cheap way to communicate confidentially.
 But impossible to send emoticons.
 No key sharing mechanism.
 AES 128 simple cipher is vulnerable to language
  statistics based attacks.
 Therefore
 Could and should be developed more for commercial
  use.
Questions and Answers


Any Questions
      ?

Mais conteúdo relacionado

Mais procurados

Bba105 computer fundamentals..
Bba105  computer fundamentals..Bba105  computer fundamentals..
Bba105 computer fundamentals..smumbahelp
 
Programming fundamentals lecture 1&2
Programming fundamentals lecture 1&2Programming fundamentals lecture 1&2
Programming fundamentals lecture 1&2Raja Hamid
 
Lesson notes text editor 04.03.13
Lesson notes text editor 04.03.13Lesson notes text editor 04.03.13
Lesson notes text editor 04.03.13Lucy Taylor
 
Nielsen’s heuristics 9th evaluation
Nielsen’s heuristics 9th evaluationNielsen’s heuristics 9th evaluation
Nielsen’s heuristics 9th evaluationNoorjahanTaha
 
Bba105 computer fundamentals..
Bba105  computer fundamentals..Bba105  computer fundamentals..
Bba105 computer fundamentals..smumbahelp
 
Bca5010 web design
Bca5010  web designBca5010  web design
Bca5010 web designsmumbahelp
 
Captcha Creation Using PHP
Captcha Creation Using PHPCaptcha Creation Using PHP
Captcha Creation Using PHPvmadan89
 
Mi0041 java and web design
Mi0041   java and web designMi0041   java and web design
Mi0041 java and web designsmumbahelp
 
Fundamental Programming Lect 1
Fundamental Programming Lect 1Fundamental Programming Lect 1
Fundamental Programming Lect 1Namrah Erum
 
notes on Programming fundamentals
notes on Programming fundamentals notes on Programming fundamentals
notes on Programming fundamentals ArghodeepPaul
 
Bt0087, wml and wap programming theory
Bt0087, wml and wap programming theoryBt0087, wml and wap programming theory
Bt0087, wml and wap programming theorysmumbahelp
 
Why coding convention ?
Why coding convention ?Why coding convention ?
Why coding convention ?Panji Gautama
 
An introduction to Competitive Programming
An introduction to Competitive ProgrammingAn introduction to Competitive Programming
An introduction to Competitive ProgrammingGaurav Agarwal
 
Effective Programming In Scala
Effective Programming In ScalaEffective Programming In Scala
Effective Programming In ScalaHarsh Sharma
 

Mais procurados (17)

Bba105 computer fundamentals..
Bba105  computer fundamentals..Bba105  computer fundamentals..
Bba105 computer fundamentals..
 
Programming fundamentals lecture 1&2
Programming fundamentals lecture 1&2Programming fundamentals lecture 1&2
Programming fundamentals lecture 1&2
 
Lesson notes text editor 04.03.13
Lesson notes text editor 04.03.13Lesson notes text editor 04.03.13
Lesson notes text editor 04.03.13
 
Nielsen’s heuristics 9th evaluation
Nielsen’s heuristics 9th evaluationNielsen’s heuristics 9th evaluation
Nielsen’s heuristics 9th evaluation
 
Bba105 computer fundamentals..
Bba105  computer fundamentals..Bba105  computer fundamentals..
Bba105 computer fundamentals..
 
Bca5010 web design
Bca5010  web designBca5010  web design
Bca5010 web design
 
Coding standards
Coding standardsCoding standards
Coding standards
 
Captcha Creation Using PHP
Captcha Creation Using PHPCaptcha Creation Using PHP
Captcha Creation Using PHP
 
Mi0041 java and web design
Mi0041   java and web designMi0041   java and web design
Mi0041 java and web design
 
Fundamental Programming Lect 1
Fundamental Programming Lect 1Fundamental Programming Lect 1
Fundamental Programming Lect 1
 
notes on Programming fundamentals
notes on Programming fundamentals notes on Programming fundamentals
notes on Programming fundamentals
 
Bt0087, wml and wap programming theory
Bt0087, wml and wap programming theoryBt0087, wml and wap programming theory
Bt0087, wml and wap programming theory
 
Why coding convention ?
Why coding convention ?Why coding convention ?
Why coding convention ?
 
An introduction to Competitive Programming
An introduction to Competitive ProgrammingAn introduction to Competitive Programming
An introduction to Competitive Programming
 
Coding conventions
Coding conventionsCoding conventions
Coding conventions
 
Effective Programming In Scala
Effective Programming In ScalaEffective Programming In Scala
Effective Programming In Scala
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 

Semelhante a ChatCrypt

Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarAshok Panwar
 
Encryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docxEncryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docxYASHU40
 
PBU-Intro_to_PGP
PBU-Intro_to_PGPPBU-Intro_to_PGP
PBU-Intro_to_PGPauremoser
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with muleAnil Kumar V
 
Generative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptxGenerative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptxAlon Fliess
 
CryptoGraphy Module in Mulesoft
CryptoGraphy Module in MulesoftCryptoGraphy Module in Mulesoft
CryptoGraphy Module in Mulesoftshyamraj55
 
PGP keys Configuration
PGP keys ConfigurationPGP keys Configuration
PGP keys ConfigurationQaisar Ayub
 
Improving Code Quality Through Effective Review Process
Improving Code Quality Through Effective  Review ProcessImproving Code Quality Through Effective  Review Process
Improving Code Quality Through Effective Review ProcessDr. Syed Hassan Amin
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizingHamdamboy (함담보이)
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizingHamdamboy
 
Mulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography ModuleMulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography ModuleManjuKumara GH
 
Laporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdfIGedeArieYogantaraSu
 
[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...
[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...
[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...DevDay.org
 

Semelhante a ChatCrypt (20)

Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Encryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docxEncryption Laboratory   Purpose of the Lab   T.docx
Encryption Laboratory   Purpose of the Lab   T.docx
 
PBU-Intro_to_PGP
PBU-Intro_to_PGPPBU-Intro_to_PGP
PBU-Intro_to_PGP
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Using pgp with mule
Using pgp with muleUsing pgp with mule
Using pgp with mule
 
Generative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptxGenerative AI in CSharp with Semantic Kernel.pptx
Generative AI in CSharp with Semantic Kernel.pptx
 
Clean code
Clean codeClean code
Clean code
 
CryptoGraphy Module in Mulesoft
CryptoGraphy Module in MulesoftCryptoGraphy Module in Mulesoft
CryptoGraphy Module in Mulesoft
 
PGP keys Configuration
PGP keys ConfigurationPGP keys Configuration
PGP keys Configuration
 
Improving Code Quality Through Effective Review Process
Improving Code Quality Through Effective  Review ProcessImproving Code Quality Through Effective  Review Process
Improving Code Quality Through Effective Review Process
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
 
Coding standard
Coding standardCoding standard
Coding standard
 
Message queuing telemetry transport (mqtt)and part 3 and summarizing
Message queuing telemetry transport (mqtt)and  part 3 and summarizingMessage queuing telemetry transport (mqtt)and  part 3 and summarizing
Message queuing telemetry transport (mqtt)and part 3 and summarizing
 
Mulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography ModuleMulesoft Meetup Cryptography Module
Mulesoft Meetup Cryptography Module
 
Laporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 5 -Kelas C - Kelompok 3.pdf
 
[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...
[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...
[DevDay2018] Let’s all get along. Clean Code please! - By: Christophe K. Ngo,...
 
Anti-Patterns
Anti-PatternsAnti-Patterns
Anti-Patterns
 

Mais de Maninda Edirisooriya

Lecture - 10 Transformer Model, Motivation to Transformers, Principles, and ...
Lecture - 10 Transformer Model, Motivation to Transformers, Principles,  and ...Lecture - 10 Transformer Model, Motivation to Transformers, Principles,  and ...
Lecture - 10 Transformer Model, Motivation to Transformers, Principles, and ...Maninda Edirisooriya
 
Lecture 11 - Advance Learning Techniques
Lecture 11 - Advance Learning TechniquesLecture 11 - Advance Learning Techniques
Lecture 11 - Advance Learning TechniquesManinda Edirisooriya
 
Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...
Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...
Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...Maninda Edirisooriya
 
Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...
Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...
Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...Maninda Edirisooriya
 
Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...
Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...
Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...Maninda Edirisooriya
 
Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...
Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...
Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...Maninda Edirisooriya
 
Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...
Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...
Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...Maninda Edirisooriya
 
Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...
Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...
Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...Maninda Edirisooriya
 
Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...
Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...
Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...Maninda Edirisooriya
 
Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...
Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...
Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...Maninda Edirisooriya
 
Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...
Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...
Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...Maninda Edirisooriya
 
Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...
Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...
Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...Maninda Edirisooriya
 
Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...
Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...
Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...Maninda Edirisooriya
 
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...Maninda Edirisooriya
 
Analyzing the effectiveness of mobile and web channels using WSO2 BAM
Analyzing the effectiveness of mobile and web channels using WSO2 BAMAnalyzing the effectiveness of mobile and web channels using WSO2 BAM
Analyzing the effectiveness of mobile and web channels using WSO2 BAMManinda Edirisooriya
 

Mais de Maninda Edirisooriya (20)

Lecture - 10 Transformer Model, Motivation to Transformers, Principles, and ...
Lecture - 10 Transformer Model, Motivation to Transformers, Principles,  and ...Lecture - 10 Transformer Model, Motivation to Transformers, Principles,  and ...
Lecture - 10 Transformer Model, Motivation to Transformers, Principles, and ...
 
Lecture 11 - Advance Learning Techniques
Lecture 11 - Advance Learning TechniquesLecture 11 - Advance Learning Techniques
Lecture 11 - Advance Learning Techniques
 
Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...
Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...
Lecture 9 - Deep Sequence Models, Learn Recurrent Neural Networks (RNN), GRU ...
 
Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...
Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...
Extra Lecture - Support Vector Machines (SVM), a lecture in subject module St...
 
Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...
Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...
Lecture 11 - KNN and Clustering, a lecture in subject module Statistical & Ma...
 
Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...
Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...
Lecture 10 - Model Testing and Evaluation, a lecture in subject module Statis...
 
Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...
Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...
Lecture 9 - Decision Trees and Ensemble Methods, a lecture in subject module ...
 
Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...
Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...
Lecture 8 - Feature Engineering and Optimization, a lecture in subject module...
 
Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...
Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...
Lecture 7 - Bias, Variance and Regularization, a lecture in subject module St...
 
Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...
Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...
Lecture 6 - Logistic Regression, a lecture in subject module Statistical & Ma...
 
Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...
Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...
Lecture 5 - Gradient Descent, a lecture in subject module Statistical & Machi...
 
Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...
Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...
Lecture 4 - Linear Regression, a lecture in subject module Statistical & Mach...
 
Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...
Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...
Lecture 3 - Exploratory Data Analytics (EDA), a lecture in subject module Sta...
 
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
Lecture 2 - Introduction to Machine Learning, a lecture in subject module Sta...
 
Analyzing the effectiveness of mobile and web channels using WSO2 BAM
Analyzing the effectiveness of mobile and web channels using WSO2 BAMAnalyzing the effectiveness of mobile and web channels using WSO2 BAM
Analyzing the effectiveness of mobile and web channels using WSO2 BAM
 
WSO2 BAM - Your big data toolbox
WSO2 BAM - Your big data toolboxWSO2 BAM - Your big data toolbox
WSO2 BAM - Your big data toolbox
 
Training Report
Training ReportTraining Report
Training Report
 
GViz - Project Report
GViz - Project ReportGViz - Project Report
GViz - Project Report
 
Mortivation
MortivationMortivation
Mortivation
 
Hafnium impact 2008
Hafnium impact 2008Hafnium impact 2008
Hafnium impact 2008
 

ChatCrypt

  • 2. Introduction  Extension for Google Chrome.  Privacy protection system for online chat.  Encrypts chat text using 128 bit AES.  Decrypts at the receiver.  Common password for both users.
  • 3. Motivation  No existing cheap solution.  Lot of Information analyzers in use for advertisements.  No freedom against governments – filter key words  For people who do not trust on servers. (Like me )
  • 4. Design and Implementation  Design – JavaScript and HTML  Run as an extension in web browser – In Application Layer.
  • 5. Design and Implementation  At each end Encryption/Decryption occurs.  Cipher text in Base-64 encoded is sent via network.
  • 6. Design and Implementation  Encryption – change text to Base-64  Decryption – show text in tooltip and copy to clipboard.
  • 7. Design and Implementation Setting Password  Step 1 – Convert password to ASCII numeric  Step 2 – Get MD5 digest of ASCII as key. Encryption  Step 1 – Identify the text box in focus and convert the text string to ASCII numeric  Step 2 – Break it into 128 bit blocks. Assign nulls for padding.  Step 3 – Apply AES 128 block cipher using key.
  • 8. Design and Implementation  Step 4 – Convert encrypted numeric values to base 64 character encoding.  Step 5 – Replace original string with this. This will be sent via server. Decryption  Step 1 – Select received text and convert to numeric values.  Step 2 – Break into blocks.
  • 9. Design and Implementation  Step 3 – Apply AES 128 decryption to each set of blocks.  Step 4 – Remove padding nulls from the result.  Step 5 – Convert to ASCII characters and show in a tooltip while copying it to clipboard. Ending Session  Replace the variables with key value with another value.
  • 10. Demonstration  Start a session – enter password  Enter again.
  • 11. Demonstration  If passwords are not matching or  Empty password – Error
  • 12. Demonstration  When want to chat type and press Alt + z or  Select “Encrypt Text” from menu. Alt + z or
  • 13. Demonstration  At receiver’s end – select text and press Alt +d or  Select “Decrypt Text” from menu.
  • 14. Demonstration  Can be used without a chat box – Real Time Mode  Select “Real Time” from menu.
  • 15. Demonstration  Other features – Google bubble translator and Password generator.
  • 16. Demonstration  When want to end conversation – End Session  Select “End Session” from menu and confirm.
  • 17. Conclusion  Simple and cheap way to communicate confidentially.  But impossible to send emoticons.  No key sharing mechanism.  AES 128 simple cipher is vulnerable to language statistics based attacks.  Therefore  Could and should be developed more for commercial use.