Encrypted Messenger PHP
Encrypted Messenger PHP Is Super Fast And Extremly Secure
Encrypted Messenger PHP Features
- Fully Programmed In PHP 7
- Model View Controller (MVC)
- Extremely Secure Error Handling
- Military Grade Encryption (AES 256)
- Every Single Field In Database Is Fully Encrypted
- Safe Against SQL Injection , Brute Force Cracking And Timing Attacks
- Unique Validation For All Sorts Of Inputs Even Cookies
- Fully Responsive And Cross Browser User Interface
- Completely Open-source
- Bootstrap Framework
- Google reCAPTCHA
PHP
PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language.
Originally created by Rasmus Lerdorf in 1994 , the PHP reference implementation is now produced by The PHP Group.
PHP originally stood for Personal Home Page, but it now stands for the recursive acronym PHP: Hypertext Preprocessor .
Encrypted Messenger PHP is programmed in PHP 7 .
MVC
Model–view–controller (MVC) is a software architectural pattern commonly used for developing user interfaces that divides an application into three interconnected parts.
This is done to separate internal representations of information from the ways information is presented to, and accepted from, the user.
The MVC design pattern decouples these major components allowing for efficient code reuse and parallel development.
Encryption
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Encryption does not itself prevent interference, but denies the intelligible content to a would-be interceptor.
In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm – a cipher – generating ciphertext that can be read only if decrypted.
For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm.
It is in principle possible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, considerable computational resources and skills are required.
An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.
AES
The Advanced Encryption Standard (AES), also known by its original name Rijndael , is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
Database
A database is an organized collection of data.
A relational database, more restrictively, is a collection of schemas, tables, queries, reports, views, and other elements.
Database designers typically organize the data to model aspects of reality in a way that supports processes requiring information, such as (for example) modelling the availability of rooms in hotels in a way that supports finding a hotel with vacancies.
SQL Injection
SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).
SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and unexpectedly executed.
SQL injection is mostly known as an attack vector for websites but can be used to attack any type of SQL database.
Brute-force Attack
In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.
The attacker systematically checks all possible passwords and passphrases until the correct one is found.
Alternatively, the attacker can attempt to guess the key which is typically created from the password using a key derivation function.
This is known as an exhaustive key search.
Timing Attack
In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms.
Every logical operation in a computer takes time to execute, and the time can differ based on the input; with precise measurements of the time for each operation, an attacker can work backwards to the input.
Data Validation
In computer science, data validation is the process of ensuring that data have undergone data cleansing to ensure they have data quality, that is, that they are both correct and useful.
It uses routines, often called “validation rules” “validation constraints” or “check routines”, that check for correctness, meaningfulness, and security of data that are input to the system.
The rules may be implemented through the automated facilities of a data dictionary , or by the inclusion of explicit application program validation logic.
Responsive Web Design
Responsive web design (RWD) is an approach to web design which makes web pages render well on a variety of devices and window or screen sizes.
Recent work also considers the viewer proximity as part of the viewing context as an extension for RWD.
Content, design and performance are necessary across all devices to ensure usability and satisfaction.
Open-source Software
Open-source software (OSS) is computer software with its source code made available with a license in which the copyright holder provides the rights to study, change, and distribute the software to anyone and for any purpose.
Open-source software may be developed in a collaborative public manner.
According to scientists who studied it, open-source software is a prominent example of open collaboration.
The term is often written without a hyphen as “open source software”.
Bootstrap (Front-end Framework)
Bootstrap is a free and open-source front-end web framework for designing websites and web applications.
It contains HTML- and CSS-based design templates for typography, forms, buttons, navigation and other interface components, as well as optional JavaScript extensions.
Unlike many web frameworks, it concerns itself with front-end development only.
Bootstrap is the second most-starred project on GitHub, with more than 111,600 stars and 51,500 forks.
reCAPTCHA
reCAPTCHA is a CAPTCHA-like system designed to establish that a computer user is human (normally in order to protect websites from bots) and, at the same time, assist in the digitization of books.
reCAPTCHA was originally developed by Luis von Ahn, Ben Maurer, Colin McMillen, David Abraham and Manuel Blum at Carnegie Mellon University’s main Pittsburgh campus.
It was acquired by Google in September 2009.
Encrypted Messenger PHP Structure
Three folders for not signed in users :
- home
- sign-up
- sign-in
Five folders for signed in users :
- profile
- new
- inbox
- sent
- sign-out
Three other folders :
- block
- private
- secured
Encrypted Messenger PHP SQL
Encrypted Messenger PHP Files
- index.php
- home
- sign-up
- sign-in
- profile
- new
- inbox
- sent
- sign-out
- block
- index.php
- omid-bahrami.css
- omid-bahrami.js
- private
- index.php
- css
- index.php
- bootstrap.min.css
- ie10-viewport-bug-workaround.css
- navbar-fixed-top.css
- style.css
- icon
- index.php
- omid-bahrami.png
- js
- index.php
- bootstrap.min.js
- ie10-viewport-bug-workaround.js
- ie-emulation-modes-warning.js
- jquery.min.js
- secured