LATEST IEEE PROJECTS ABSTRACT FOR ECE-OFDM BASED BLOW-FISH ALGORITHM USING MILITARY APPLICATIONS
Upcoming SlideShare
Loading in...5
×
 

LATEST IEEE PROJECTS ABSTRACT FOR ECE-OFDM BASED BLOW-FISH ALGORITHM USING MILITARY APPLICATIONS

on

  • 1,210 views

OFDM Based Wireless Encryption and Decryption Message Transfer System for Military Applications using BlowFish Algorithm ...

OFDM Based Wireless Encryption and Decryption Message Transfer System for Military Applications using BlowFish Algorithm
What is OFDM
Short for Orthogonal Frequency Division Multiplexing, an FDM modulation technique for transmitting large amounts of digital data over a radio wave. OFDM works by splitting the radio signal into multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver. OFDM reduces the amount of crosstalk in signal transmissions


Dear students,

Maastech offer Ieee projects based on embedded systems related any type of applications..

ipt/final year projects full details....

pre/final year project abstract pl download http://www.slideshare.net/maastech

Ieee Based Embedded System Projects(hardware projects)/FIinal Year Projects/Mini Projects/DiplomaProjects

Inplant Training Details, (ece/eee/it/mechatronics/biomedical

automobiles...

Industrial visit ,project details/ipt details/project discussion/idea sharing......dont hesitate, pl call me..........,dont hesitate, pl call me..........,

Project100% Output... We Deliver The Projects Send To The Courier To Ur Place...

Project Cost nclude Report&Ckt Diagram&Software Programming(Cd)

final year projects/ieee projects on embedded systems pl call me---http://www.maastechindia.com

thanks
R.Ashok kumar
MAASTECH
89. Rangarajapuram main road,(Near SBI Bank)
Kodambakkam
Chennai-600024, http://www.maastechindia.com


PH:044-24844676
R.Ashok kumar-098402 34766
B. Mail velan-098841 01622


ipt/projects full details....Pl visit maastechindia.com (projects list,abstract,video,photo gallery)

Statistics

Views

Total Views
1,210
Views on SlideShare
1,210
Embed Views
0

Actions

Likes
0
Downloads
27
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

LATEST IEEE PROJECTS ABSTRACT FOR ECE-OFDM BASED BLOW-FISH ALGORITHM USING MILITARY APPLICATIONS LATEST IEEE PROJECTS ABSTRACT FOR ECE-OFDM BASED BLOW-FISH ALGORITHM USING MILITARY APPLICATIONS Document Transcript

  • OFDM Based Wireless Encryption and Decryption Message Transfer System for Military Applications using BlowFish Algorithm What is OFDM Short for Orthogonal Frequency Division Multiplexing, an FDM modulation technique for transmitting large amounts of digital data over a radio wave. OFDM works by splitting the radio signal into multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver. OFDM reduces the amount of crosstalk in signal transmissions Need: The need for this project arises when we want the data communication to be protected from others. This is highly essential in the military field and especially during war times. Because during war periods when a particular army wants to send a message to remotely located units, which belong to the same army, in between any person can trap the data when it is transmitted through wireless. Our aim of the project is to protect the data from the ensnares. To accomplish this, we have used a PC as a sender and PIC microcontroller as a receiver station. The message to be sent is fed in to the computer for different units. The computer will Encrypt the data using generating a duplicate Character for a real one. At the receiving end the PIC microcontroller then Decrypts the Received data and displays the message on the display. The 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com
  • communication takes place through a Wireless RF Transmitter and Receiver operating at 433.92 MHz we can also use CRO at the transmitting point to view the Encrypted data. To ensure the security level at the receiving end we have a password protection. Once the Message is received the unit will give an alarm message so that one can know that the message has arrived. Then he 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com
  • must enter the password through the keypad. If the password matches then he is allowed to view the data. 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com
  • BlowFish Encryption Algorithm Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses. Blowfish has a 64-bit block size and a variable key length from 32 up to 448 bits [1]. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. It is similar in structure to CAST-128, which uses fixed S-boxes. 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com
  • The Feistel structure of Blowfish The diagram to the left shows the action of Blowfish. Each line represents 32 bits. The algorithm keeps two subkey arrays: the 18-entry P-array and four 256entry S-boxes. The S-boxes accept 8-bit input and produce 32-bit output. One entry of the P-array is used every round, and after the final round, each half of the data block is XORed with one of the two remaining unused P-entries. The diagram to the right shows Blowfish's F-function. The function splits the 32bit input into four eight-bit quarters, and uses the quarters as input to the Sboxes. The outputs are added modulo 232 and XORed to produce the final 32-bit output. Since Blowfish is a Feistel network, it can be inverted simply by XORing P 17 and P18 to the ciphertext block, then using the P-entries in reverse order. 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com
  • Blowfish's key schedule starts by initializing the P-array and S-boxes with values derived from the hexadecimal digits of pi, which contain no obvious pattern (see nothing up my sleeve number). The secret key is then XORed with the P-entries in order (cycling the key if necessary). A 64-bit all-zero block is then encrypted with the algorithm as it stands. The resultant ciphertext replaces P1 and P2. The ciphertext is then encrypted again with the new subkeys, and P3 and P4 are replaced by the new ciphertext. This continues, replacing the entire P-array and all the S-box entries. In all, the Blowfish encryption algorithm will run 521 times to generate all the subkeys - about 4KB of data is processed. 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com
  • 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com
  • Block Diagram RS232 COMMUNICATION FOR SERIEL DATA RF Tx Module1 RF Tx Module2 RF Rx Module1 315 MHZ PIC EMBEDDED MC-16F877 RF Rx Module2 433.92 MHZ dsPIC 30F4013 ADVANCED EMBEDDED Microcontroller Alarm Output(M ESSAGE PIC EMBEDDED MC-16F877 Visual Alert(MESS AGE) 4 X 3 Matrix Key Pad. Password entry +5v Power Supply 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com +5v Power Supply