Professional Documents
Culture Documents
Introduction and H/W & S/W Requirements
Introduction and H/W & S/W Requirements
CRYPTOGRAPHY:
Cryptography is a Greek word. Which comes from two words Crypto + Graph in
meaning "Hidden or Secret "+ "Writing or Study". It is used for Encryption and
Decryption for sending E-mails. The many schemes used for Encryption constitute the
area of Study is known as Cryptography, Such a schemes is known as a Cryptographic
System or a Cipher. Technic used for Decryption a message without any knowledge
of the Encryption details fill in the area of cryptanalysis is what a \the layperson calls
breaking the code.
ENCRYPTION:
1
algorithm to perform encryption, we need to generate Key and IV using the derived
bytes and the symmetric key. Using Memory Stream and Crypto Stream the clear text
is encrypted and written to byte array and finally the byte array is converted to
Base64String and returned which is the final outcome i.e. the corresponding encrypted
text.
DECRYPTION:
2
Aims and Objectives:
As a result, the only way to protect the online information sending is through the use
of cryptography. The past 20 years has seen numerous efforts to make secure internet
information possible, if not ubiquitous.
The main objective is that the sanded message should be reached at the
authenticated person.
The secured information should not be accessed by unauthorized person.
3
System Requirement
HARDWARE REQUIREMENTS:
SOFTWARE REQUIREMENT
4
CHAPTER 2
PROBLEM IDENTIFICATION & FEASIBILITY STUDY:
Problem Identification:
Identity-based cryptography is a type of public-key cryptography in which a publicly
known string representing an individual or organization is used as a public key. The
public string could include an email address, domain name, or a physical IP address.
Under Shamir's scheme, a trusted third party would deliver the private key to the user
after verification of the user's identity, with verification essentially the same as that
required for issuing a certificate in a typical PKI.
5
Identity-based systems allow any party to generate a public key from a known identity
value such as an ASCII string. A trusted third party, called the Private Key
Generator (PKG), generates the corresponding private keys. To operate, the PKG first
publishes a master public key, and retains the corresponding master private
key (referred to as master key). Given the master public key, any party can compute a
public key corresponding to the identity by combining the master public key with the
identity value. To obtain a corresponding private key, the party authorized to use the
identity ID contacts the PKG, which uses the master private key to generate the
private key for identity ID.
As a result, parties may encrypt messages (or verify signatures) with no prior
distribution of keys between individual participants. This is extremely useful in cases
where pre-distribution of authenticated keys is inconvenient or infeasible due to
technical restraints. However, to decrypt or sign messages, the authorized user must
obtain the appropriate private key from the PKG. A caveat of this approach is that the
PKG must be highly trusted, as it is capable of generating any user's private key and
may therefore decrypt (or sign) messages without authorization. Because any user's
private key can be generated through the use of the third party's secret, this system has
inherent key escrow. A number of variant systems have been proposed which remove
the escrow including certificate-based encryption, secure key issuing
cryptographyand certificateless cryptography.The steps involved are depicted in this
diagram:
6
Fig.1- ID Based Encryption: Offline and Online Steps
Encryption schemes
7
using an Elgamal-like approach. Though the Boneh-Franklin
scheme is provably secure, the security proof rests on relatively new
assumptions about the hardness of problems in certain elliptic curve groups.
8
In the process of the System Planning various phase-dependent tools, techniques
and notations are determined. Preliminary cost estimates for the system
development and preliminary development schedules are established. Preliminary
estimates of the computing resources required to operate and maintain the system
are developed, glossary of terms are prepared.
These are the main objectives of the Online Secure Information Sending System.
9
The computer carries out computing steps including arithmetic accurately and
consistently from which really human is escaped which yields more fatigue and
boredom.
Cost Reduction:
Using computerization we can do the required operations with lower cost than any
other methods. Hence by computerization we can reduce the cost drastically
Advantages
One of the major advantages of any identity-based encryption scheme is that if there
are only a finite number of users, after all users have been issued with keys the third
party's secret can be destroyed. This can take place because this system assumes that,
once issued, keys are always valid (as this basic system lacks a method of key
revocation). The majority of derivatives of this system which have key revocation lose
this advantage.
Moreover, as public keys are derived from identifiers, IBE eliminates the need for a
public key distribution infrastructure. The authenticity of the public keys is guaranteed
implicitly as long as the transport of the private keys to the corresponding user is kept
secure (Authenticity, Integrity, Confidentiality).
Apart from these aspects, IBE offers interesting features emanating from the
possibility to encode additional information into the identifier. For instance, a sender
might specify an expiration date for a message. He appends this timestamp to the
actual recipient's identity (possibly using some binary format like X.509). When the
receiver contacts the PKG to retrieve the private key for this public key, the PKG can
evaluate the identifier and decline the extraction if the expiration date has passed.
Generally, embedding data in the ID corresponds to opening an additional channel
between sender and PKG with authenticity guaranteed through the dependency of the
private key on the identifier.
10
Drawbacks:
11
IBE solutions may rely on cryptographic techniques that are insecure against
code breaking quantum computer attacks (see Shor's algorithm)
Feasibility Study:
An initial investigation culminates in a proposal that determines whether an
alternative system is feasible than the present candidate system. To do feasible study
we have to do the Economic, Technical, Behavioral feasible studies.
i. Economic Feasibility: -
It isthe most frequently used method for evaluating the effectiveness of a system. It is
also called as cost/benefit analysis.In this project “Computer Resource Management
System”, for the development of the candidate system the cost that has to spend is the
computer resources like the required software and hardware that supports the software
in an effective and efficient manner and the money to be paid to the developers. As
the company itself is a development center all the resources are in the company itself
and no extra cost is spent for Computer Resource Management System.Hence our
candidate system production is economically feasible.
12
People are inherently resistant to change. Our candidate system is developed in such a way
that it is very user friendly, easy to learn how to work with and there is also not much
resistant to this package from the staff side also. As the company is basically a development
center it will be very easy for the employees of the company to learn about the developed
candidate system.Hence our candidate system production is behaviorally feasible.
13
CHAPTER 3
REQUIREMENT ANALYSIS
Even though the goal has been the same, the methods and techniques of cryptanalysis
have changed drastically through the history of cryptography, adapting to increasing
cryptographic complexity, ranging from the pen-and-paper methods of the past,
through machines like the British Bombes and Colossus computers at Bletchley
Park in World War II, to the mathematically advanced computerized schemes of the
present
The use of the internet and wireless communications has been rapidly growing
andoccupying a wide area in everyday life.
14
Millions of users generate and interchange large amount of electronic data on a daily
basis in diverse domains. However, the issue of privacy and security is on the top of
the crucial concerns which determine the diffusion of such applications into the daily
life. Hence, cryptography turns to become the key for the reliability and effectiveness
of the embedded Technologies .Nowadays cryptography has a main role in Embedded
systems designs. In many applications, the data requires a secured connection which is
usually achieved bycryptography. Cryptography is divided in two types first is
symmetric key cryptography (sender and receiver shares the same ) and the second
one is asymmetric key cryptography (sender and receiver shares different key) .
Document Convention:
C Conditional Required
R Required
O Optional
SM System Maintained
EF External Feature
Master Administrator: Has all the privileges of deleting all type users, Status,
shelves, for moving the components from one location to another and also for
15
changing the designation of a particular user. The administrator can also
search on shelves, component models, users and computers.
Hardware Administrator: Will be having the privilege of moving the
components between various modules (shelves, Bin, Recycle-Bin, locations
and computers). He can create and delete computers.
Project Scope:
Project Function:
User Setup: An Interface will be provided for user to login. The user can login into
the system by entering a valid user name and password with the Login Type.
Administrator Setup:
16
The administrator will be provided with the following interfaces.
Reports:
An interface is created for viewing the reports on
Based on All user Detail
Based on All Contact Users
Based on All messages send by User
Appropriate security Features will be provided for protecting the web data.
1. Database is password protected.
2. Administrative functions will be kept separate from user
functions.
User functions are not permitted through the non-administrative network ports. All
administrative functions will be performed only on the administrative network port.
Requirement
Functional Requirement:In Online Secure information Sending System the
main functional requirement are as follows:
17
User List: Here the user has to provide information to the system about the
requirements of the be a member so that it will generate him a list of User who are
eligible as a member.
Query analysis: Here the user is able to get the Query which are released and store
them for later usage. The output of this project is beneficial for the All User, to Send
information in Secure way.
Mailing: Here the user is provided to mail students or others (for example,
company officials) depending on his need.
Database: The Online Secure Information Sending System application has the Sql
Server Database connectivity, which is provided to interface with Sql Server 2008
database. The Sql Server 2008 is chosen for Computer Resource Management
System because of higher security level and web compatibility features offered by it.
Hardware Interface
18
Software Interface
Operating System: Windows Server 2000/2003/2005,Windows XP,
Vista,7.0,8.0.
The system will be built on windows compatible environment. The
application will be web based using ASP.NET technology
19
Software Requirement Analysis:
To understand the nature of the program to be built, the software engineer
(analyst) must understand the information domain for the software, as well as
the required function, performance, and interfacing. Requirements for both
the system and the software are documented and reviewed with the customer.
Design:
Software design is actually a multi-step process that focuses on four distinct
attributes of the program: data structure, software architecture, procedural
detail and interface characterization. The design process translates
requirements into a representation of the software.
Coding:
The design must be translated into a machine readable form. The coding step
performs this task.
Testing:
Once code has been generated, program testing begins.
Maintenance:
Software will undoubtedly undergo change after it is delivered to the
customer. Software maintenance reapplies each of the preceding life-cycle
steps to an existing program rather than a new one.
CHAPTER 4
The many schemes used for Encryption constitute the area of Study is known as
Cryptography, Such a schemes is known as a Cryptographic System or a Cipher.
Technic used for Decryption a message without any knowledge of the Encryption
details fill in the area of cryptanalysis is what a the layperson calls breaking the code.
The area of Cryptography and cryptanalysis together are called cryptology.
Cryptographic System are characterized along three independent dimensions.
Type of Operations- Used for transforming Plaintext to Cipher text. All Encryption
Algorithms are based on two general principal.Substitution (One bit, letter, group of
bit or letter mapped in to other).Transposition (Elements in the plain Text are
rearranged). The Number of Keys used- Sender and receiver used the same key called
symmetric. If used different key called asymmetric, Two-key or Public-key.The way
in which the plaintext is processed.
22
HTML Markup
The HTML Markup consists of TextBox and Labels to accept inputs for encryption
and decryption.
<u>Encrypt</u><br />
<br />
Original Text:
<asp:TextBox ID="txtOriginalText" runat="server" Text="" />
<br />
<br />
Encrypted Text:
<asp:Label ID="lblEncryptedText" runat="server" Text="" />
<br />
<br />
<asp:Button ID="btnEncrypt" OnClick="Encrypt" Text="Encrypt" runat="server" />
<hr />
<u>Decrypt</u>
<br />
<br />
Encrypted Text:
<asp:TextBox ID="txtEncryptedText" runat="server" Text="" />
<br />
<br />
Decrypted Text:
m<asp:Label ID="lblDecryptedText" runat="server" Text="" />
<br />
<br />
23
<asp:Button ID="btnDecrypt" OnClick="Decrypt" Text="Decrypt" runat="server" />
Namespaces
C#
using System.IO;
using System.Text;
using System.Security.Cryptography;
Encryption
For this article I am making use of AES encryption algorithm wherein I am using a
Symmetric (Same) key for encryption and decryption process.
24
Firstly the original text i.e. clear text is converted into bytes and then for the AES
algorithm to perform encryption, we need to generate Key and IV using the derived
bytes and the symmetric key.
protected void Encrypt(object sender, EventArgs e)
{
lblEncryptedText.Text = this.Encrypt(txtOriginalText.Text.Trim());
}
private string Encrypt(string clearText)
{
string EncryptionKey = "MAKV2SPBNI99212";
byte[] clearBytes = Encoding.Unicode.GetBytes(clearText);
using (Aes encryptor = Aes.Create())
{
Rfc2898DeriveBytes pdb
= new Rfc2898DeriveBytes(EncryptionKey, new byte[] { 0x49, 0x76, 0x61, 0x6e,
0x20, 0x4d, 0x65, 0x64, 0x76, 0x65, 0x64, 0x65, 0x76 });
encryptor.Key = pdb.GetBytes(32);
encryptor.IV = pdb.GetBytes(16);
using (MemoryStream ms = new MemoryStream())
{
using (CryptoStream cs = new CryptoStream(ms,
encryptor.CreateEncryptor(), CryptoStreamMode.Write))
25
{
cs.Write(clearBytes, 0, clearBytes.Length);
cs.Close();
}
clearText = Convert.ToBase64String(ms.ToArray());
}
}
return clearText;
}
Decryption
Firstly the encrypted text i.e. cipher text is converted into bytes and then similar to the
encryption process here too we will generate Key and IV using the derived bytes and
the symmetric key.
C#
protected void Decrypt(object sender, EventArgs e)
26
}
private string Decrypt(string cipherText)
string EncryptionKey = "MAKV2SPBNI99212";
using (Aes encryptor = Aes.Create())
{
Rfc2898DeriveBytes pdb
= new Rfc2898DeriveBytes(EncryptionKey, new byte[] { 0x49, 0x76, 0x61, 0x6e,
0x20, 0x4d, 0x65, 0x64, 0x76, 0x65, 0x64, 0x65, 0x76 });
using (MemoryStream ms = new MemoryStream())
{
using (CryptoStream cs = new CryptoStream(ms,
encryptor.CreateDecryptor(), CryptoStreamMode.Write))
{
cs.Close();
}
27
cipherText = Encoding.Unicode.GetString(ms.ToArray());
}
}
return cipherText;
28
Fig.3-Encrypt and Decrypt
29
About ASP.NET:-
First, you assemble the dynamic portion of the user interface by using
ASP.NET controls. ASP.NET controls enable you to display "smart" HTML
forms, for example, and present interactive grids of database data.
The second building block of a Web Forms Page is the application logic,
which includes the code that executes when you click a form button, or the
code that retrieves the database data displayed within a control
30
To provide a code-execution environment that minimizes software
deployment and versioning conflicts.
To provide a code-execution environment that guarantees safe
execution of code, including code created by an unknown or semi-
trusted third party.
To provide a code-execution environment that eliminates the
performance problems of scripted or interpreted environments.
To make the developer experience consistent across widely varying
types of applications, such as Windows-based applications and Web-
based applications.
To build all communication on industry standards to ensure that code based
on the .NET Framework can integrate with any other code .
31
CHAPTER 5
PROJECT DESCRIPTION
User Module
User Registration Module
User Login Module
Mail Sending Module
Mail Receiving Module
Admin Module
Admin Login
Send Message
Read Message
View All Contacts
View All Users
View All Message
32
“Online Secure Information Sending System” is broken into following
module.
USERMODULE
User page module is for front page of this system. It is the main page
of the system in which all the links of this system are kept. Now the
main thing is how to make the home page interactive and user friendly
so that there should not be any problem for the user. This is the task of
the system administrator to make the home page Interactive.
User Registration:
It allows Non user to register for sending and Receiving Information
in secure manner.
About us:
• In this information related website is provided.
User Login :
• It allows User to Login in User Panel and authenticate to the non-users from
Login.
• User Mail Sending :
It is used to Send the Encrypted Information from User to Registered User .
• Mail Reading:
Receiver get a Encrypted Unique Key on his/her mail and after login to
InfoSecure get the Encrypted Information using that Unique Key.
• Contact us:
In this page users can contact via mail if they have any query or need help
ADMIN MODULE
33
Admin module is mainly for the owner of these System. This module performs
the work of regular checking process. Everyone needs current information
about anything. So, this module is responsible for updating the information
continuously if any, in the system so that one can find timely information. But
the main function of this module is to handle security ofthis system. Different
types of authentication and authorization process is performed for this purpose.
This module is also responsible for advertisement bid. Any organizations that
are eager for advertisement can contact us for their ad. This module handles the
entire task related to advertisement like specifying and allocating the space and
related cost.
ADMIN MODULE
Admin Login:
It allows the admin to login with their registered id.
Send Message:
In this admin can send encrypted messages to the users .
Read Message:
In this admin can read the encrytped message by decrypting it by using the
single key and the public key.
View All User:
In this the admin can view all registered user’s information .
View All Contacts:
In this admin can get all the information of the users query or message from the
users who wants to contact.
View All Message:
In this page admin can view the details of the message send and read by the
users.
34
CHAPTER 6
DESIGN
DESIGNphase follows system analysis phase. Design is maintaining a record
The design is a solution, a “how to” approach to the creation a new system.
This is composed of several steps. It provides the understanding and
procedural details necessary for implementing the system recommended in
the feasibility study. Design goes through logical and physical stages of
development, logical design reviews the present physical system, prepare
input and output specifications, detail the implementation plan, and prepares
a logical design walkthrough.
OBJECTIVES OF DESIGN
System design is like a blue print for a building, it specifies all the features
that are to be in the finished product. Design states how to accomplish
objectives determined in the analysis phase.
36
During early iterations, the incremental release might be a paper model or
prototype. During later iterations, increasingly more complete versions of the
engineered system are produced.
A spiral model is divided into a number of framework activities, also called
task
regions.Typically, there are between three and six task regions. A spiral model
that contains six task regions:
• Customer communication—tasks required to establish effective
communication
between developer and customer.
37
Each of the regions is populated by a set of work tasks, called a task set, that
areadapted to the characteristics of the project to be undertaken. For small
projects, thenumber of work tasks and their formality is low. For larger, more
critical projects,each task region contains more work tasks that are defined to
achieve a higher levelof formality.
38
activities. Also, directly estimating the effort for some overhead tasks, such as
project management, that span the project can be difficult.
39
Context Diagram
40
Actors
Actors (or Entities, or Terminators) are the parties that communicate either
directly with the Process, or indirectly with the Process through an
intermediary Data Store. According to Yourdon, in a Context Diagram the
Actors should not be shown as communicating directly with each other.
Flows
Flows (or Relationships) represent data or events flowing between the three
other components above. Flows are labelled and can be displayed as
unidirectional or bi-directional.
41
Fig.4-Context Diagram
42
DATA FLOW DIAGRAMS
A DFD shows what kind of information will be input to and output from the
system, how the data will advance through the system, and where the data
will be stored. It does not show information about the timing of process or
information about whether processes will operate in sequence or in parallel
unlike a flowchart which also shows this information.
There are some symbols that are used in the drawing of business process
diagrams (data flow diagrams). These are now explained, together with the
rules that apply to them.
Flow diagrams in general are usually designed using simple symbols such as
a rectangle, an oval or a circle depicting a processes, data stored or an
external entity, and arrows are generally used to depict the data flow from
one step to another.
43
A DFD usually comprises of four components. These four components can
be represented by four simple symbols. These symbols can be explained in
detail as follows: External entities (source/destination of data) are
represented by squares; Processes (input-processing-output) are represented
by rectangles with rounded corners; Data Flows (physical or electronic data)
are referred to by arrows; and finally, Data Stores (physical or electronic
like XML files) are presented by open-ended rectangles.
External Entity
Process
Firstly an identification number appears in the upper left hand corner. This
is allocated arbitrarily at the top level and serves as a unique reference.
44
Secondly, a location appears to the right of the identifier and describes
where in the system the process takes place. This may, for example, be a
department or a piece of hardware. Finally, a descriptive title is placed in
the centre of the box. This should be a simple imperative sentence with a
specific verb, for example 'maintain customer records' or 'find driver'.
Data Flow
A data flow shows the flow of information from its source to its destination.
A data flow is represented by a line, with arrowheads showing the direction
of flow. Information always flows to or from a process and may be written,
verbal or electronic. Each data flow may be referenced by the processes or
data stores at its head and tail, or by a description of its contents.
Data Store
Resource Flow
A resource flow shows the flow of any physical material from its source to
its destination. For this reason they are sometimes referred to as physical
flows.The physical material in question should be given a meaningful name.
Resource flows are usually restricted to early, high-level diagrams and are
used when a description of the physical flow of materials is considered to be
important to help the analysis.
External Entities
45
It is normal for all the information represented within a system to have been
obtained from, and/or to be passed onto, an external source or recipient.
These external entities may be duplicated on a diagram, to avoid crossing
data flow lines. Where they are duplicated a stripe is drawn across the left
hand corner, like this.
46
Fig.5-( 0-Level)
47
Fig.6- (1-Level)
48
ENTITY-RELATIONSHIP DIAGRAM
PhoneNO
Administrator User Visitor
EmailID
Password
Registration
New User/User
Admin Process Process
Sender name
Read message
Send message
MSG-Key
Send message Sender name
UrEmail-ID
R-EmailID
MSG-Box
Sender name MSG-Box
Subject 49
Subject
R-EmailID
FLOWCHART
50
SNAPSHOTS OF THE PROJECT
51
52
53
54
55
56
57
58
59
60
61
DATABASE AND TABLES
Database is collection of data that can be treated as single unit. This Single
or individual unit is called table. In relational database system Table is
combination of rows and columns which show records andfieldsrespectively.
After great efforts we determine the main entities, there attribute and
relationship among them. After determining all these entities, we design the
table structure as follows:
Fig.7 Table.1
62
Fig.8-Table 2
63
Fig.9-Table 2
64
Fig.9-Table 2
65
Fig.10-Table 2
66
Fig.11-Table 2
67
Fig.12-Table 2
CHAPTER 7
68
CONCLUSION&FUTURE SCOPE
The future scope of the project should be determined so that the quality of
website project in terms of flexibility and enhancement can be measured and
specified. If theproject has no future scope, we would be unable to make any
further changes and further enhancement. The future scope of my website
can be specified as follows: -
69
This project is very flexible because if any changes occur in future
then it can be easily accomplished in it. Thus the future extensibility
is easily possible.
If the organization grows upper level then this website can easily
handle small modification.
CHAPTER 8
70
REFERENCES AND APPENDICES
1. “Software Engineering”- PankajJalote.
2. “Database Management System”- Elmasri and Navathe.
3. http//www.wikipedia.com
4. Black book of SQL server 2008
5. http://www.asp.net
6. http://www.google.com
7. “Real-time Efficient FPGA Implementation of AES
8. Algorithm”, IEEE International SOC Conference
9.(SOCC), page 203-208, Sept 2013.
10.M.Sambasiva Reddy and Mr.Y.AmarBabu, “Evaluation
11.Microblaze and Implementation Of AES Algorithm
12. Spartan-3E”, International Journal of Advanced
13.Research in Electrical, Electronics and Instrumentation
14.Engineering, Vol. 2, Issue 7, page 3341-3347, July 2013.
15. Implementation of The Advanced Encryption Standard
algorithm”, IEEE International Conference on
16. Ho Chi Minh city, 2012.
17. Kamali S.H, Shakerian R, Hedayati M and Rahmani M,
18. “A new modied version of Advanced Encryption
19. Standard based algorithm for image encryption”, (ICEIE)
20. International Conference On Electronics and Information
21. Engineering, volume 1, page 1250-1255, Aug 2010.
22. Ahmad N, Hasan R and Jubadi W.M.
71
CHAPTER 9
72
BIO DATA OF EACH GROUP
MEMBER
SHAAHEEN KHAN
EMAIL-kshaheen806@gmail.com
CAREER OBJECTIVE-
TO WORK IN A FIRM WITH A PROFESSIONAL WORK DRIVEN ENVIRONMENT WHERE I CAN UTILIZE
AND APPLY MY KNOWLEDGE AND SKILLS WHICH WOULD ENABLE ME AS A FRESH GRADUATE TO
GROW WHILE FULFILLING ORGANIZATIONAL GOALS.
ACADEMIC CREDENTIALS-
TECHNICAL KNOWLEDGE
C,C++
DBMS
VB,HTML
INTERPERSONAL SKILLS-
ABILITY TO RAPIDLY BUILD RELATIONSHIP AND SET UP TRUST.
CONFIDENT AND DETERMINED
ABILITY TO COPE UP WITH DIFFERENT SITUATIONS.
FIELDS OF INTEREST-
73
SOFTWARE BASED CODING
WEB DESIGNING
ACADEMIC PROJECTS-
E-CLASSROOM
PERSONAL DETAILS
Gender Female
E-mail kshaheen806@gmail.com
Mobile 9451912546
DECLARATION:
I HEREBY DECLARE THAT ALL THE INFORMATION GIVEN ABOVE ABOUT ME IS TRUE TO THE BEST OF
MY KNOWLEDGE.
Date:-26th June, 2016 Place:-Lucknow, U.P.
AASTHA RAIZADA
74
EMAIL-aastharaizada91@gmail.com
CAREER OBJECTIVE-
TO WORK IN A FIRM WITH A PROFESSIONAL WORK DRIVEN ENVIRONMENT WHERE I CAN UTILIZE
AND APPLY MY KNOWLEDGE AND SKILLS WHICH WOULD ENABLE ME AS A FRESH GRADUATE TO
GROW WHILE FULFILLING ORGANIZATIONAL GOALS.
ACADEMIC CREDENTIALS-
TECHNICAL KNOWLEDGE
C,C++
DBMS
VB,HTML
INTERPERSONAL SKILLS-
ABILITY TO RAPIDLY BUILD RELATIONSHIP AND SET UP TRUST.
CONFIDENT AND DETERMINED
ABILITY TO COPE UP WITH DIFFERENT SITUATIONS.
FIELDS OF INTEREST-
SOFTWARE BASED CODING
WEB DESIGNING
ACADEMIC PROJECTS-
ONLINE RESTAURANT
PERSONAL DETAILS
75
Gender Female
E-mail aastharaizada91@gmail.com
Mobile 9984843649
DECLARATION:
I HEREBY DECLARE THAT ALL THE INFORMATION GIVEN ABOVE ABOUT ME IS TRUE TO THE BEST OF
MY KNOWLEDGE.
Date:-31/05/2017Place:-Lucknow, U.P.
76