Posts

Android and Flutter

Image
   Android & Flutter Week 1 Setting up android studio and basics of java programming language: Object Oriented − In Java, everything is an Object. Java can be easily extended since it is based on the Object model. Platform Independent − Unlike many other programming languages including C and C++, when Java is compiled, it is not compiled into platform specific machine, rather into platform independent byte code. This byte code is distributed over the web and interpreted by the Virtual Machine (JVM) on whichever platform it is being run on. Simple − Java is designed to be easy to learn. If you understand the basic concept of OOP Java, it would be easy to master. Secure − With Java's secure feature it enables to develop virus-free, tamper-free systems. Authentication techniques are based on public-key encryption. Architecture-neutral − Java compiler generates an architecture-neutral object file format, which makes the compiled code executable on many...
Image
 Android & Flutter Week 1 Setting up android studio and basics of java programming language: Object Oriented − In Java, everything is an Object. Java can be easily extended since it is based on the Object model. Platform Independent − Unlike many other programming languages including C and C++, when Java is compiled, it is not compiled into platform specific machine, rather into platform independent byte code. This byte code is distributed over the web and interpreted by the Virtual Machine (JVM) on whichever platform it is being run on. Simple − Java is designed to be easy to learn. If you understand the basic concept of OOP Java, it would be easy to master. Secure − With Java's secure feature it enables to develop virus-free, tamper-free systems. Authentication techniques are based on public-key encryption. Architecture-neutral − Java compiler generates an architecture-neutral object file format, which makes the compiled code executable on many proces...

End to End encrypted chat application

Image
   End to End encrypted chat application - 18it024 Vedantsinh Dabhi -18IT054 Pranay Maheriya INTRODUCTION  End-to-end encrypted messaging means that the users within that specific chat can only read messages sent between two people. To enable this, the messages that are sent are encrypted before leaving a user's device, and can only be decrypted by the intended recipient (end-user). How does end to end encryption work? In the app, we used AES ( Advanced Encryption Standard ) It is  a symmetric  block   cipher   chosen by the U.S. government to protect classified information. AES is implemented in software and hardware throughout the world to  encrypt   sensitive data. It is essential for government computer security, cybersecurity, and electronic data protection. AES includes three block  ciphers : AES-128, AES-192 and AES-256. AES-128 uses a 128- bit  key length to encrypt and decrypt a block of messages, while AES-192 uses a 192-b...