Submit Search
Upload
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
•
0 likes
•
3 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i7/IRJET-V9I758.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET Journal
Meter SCADA
Meter SCADA
IRJET Journal
Underground Cable Fault Detection Using Arduino
Underground Cable Fault Detection Using Arduino
IRJET Journal
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET Journal
Arduino Based Smart Parking System
Arduino Based Smart Parking System
IRJET Journal
IRJET- Android based Home Automation System with Power Optimization Modes
IRJET- Android based Home Automation System with Power Optimization Modes
IRJET Journal
Automatic Car Parking
Automatic Car Parking
IRJET Journal
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET Journal
Recommended
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET- Static Analysis of the Roll Cage of All-Terrain Vehicle
IRJET Journal
Meter SCADA
Meter SCADA
IRJET Journal
Underground Cable Fault Detection Using Arduino
Underground Cable Fault Detection Using Arduino
IRJET Journal
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET- Design & Implementation of Black Box in Automobiles System
IRJET Journal
Arduino Based Smart Parking System
Arduino Based Smart Parking System
IRJET Journal
IRJET- Android based Home Automation System with Power Optimization Modes
IRJET- Android based Home Automation System with Power Optimization Modes
IRJET Journal
Automatic Car Parking
Automatic Car Parking
IRJET Journal
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET- Arduino based Smart Grid Power Monitoring and Control by using IoT
IRJET Journal
IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET Journal
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET Journal
Decibel meter using IoT with notice board
Decibel meter using IoT with notice board
IRJET Journal
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
VLSICS Design
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET Journal
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET Journal
IRJET- IoT based Solar Street Light Intensity Control System
IRJET- IoT based Solar Street Light Intensity Control System
IRJET Journal
SMART LATHE MACHINE
SMART LATHE MACHINE
IRJET Journal
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
IRJET Journal
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
IRJET Journal
3 Axis Drawing Machine
3 Axis Drawing Machine
IRJET Journal
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
IRJET Journal
IOT Based Three Phase Transmission Line Fault Detection and Classification
IOT Based Three Phase Transmission Line Fault Detection and Classification
IRJET Journal
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginners
ijtsrd
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
DeepakK547422
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET Journal
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
IRJET Journal
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
IRJET Journal
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
IRJET Journal
Home Automation Using Arduino Uno and HC-05
Home Automation Using Arduino Uno and HC-05
Vidhi Shah
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET Journal
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET Journal
Decibel meter using IoT with notice board
Decibel meter using IoT with notice board
IRJET Journal
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
VLSICS Design
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET Journal
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET Journal
IRJET- IoT based Solar Street Light Intensity Control System
IRJET- IoT based Solar Street Light Intensity Control System
IRJET Journal
SMART LATHE MACHINE
SMART LATHE MACHINE
IRJET Journal
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
IRJET Journal
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
IRJET Journal
3 Axis Drawing Machine
3 Axis Drawing Machine
IRJET Journal
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
IRJET Journal
IOT Based Three Phase Transmission Line Fault Detection and Classification
IOT Based Three Phase Transmission Line Fault Detection and Classification
IRJET Journal
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginners
ijtsrd
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
DeepakK547422
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET Journal
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
IRJET Journal
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
IRJET Journal
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
IRJET Journal
Home Automation Using Arduino Uno and HC-05
Home Automation Using Arduino Uno and HC-05
Vidhi Shah
Similar to ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
(20)
IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
Decibel meter using IoT with notice board
Decibel meter using IoT with notice board
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- IoT based Solar Street Light Intensity Control System
IRJET- IoT based Solar Street Light Intensity Control System
SMART LATHE MACHINE
SMART LATHE MACHINE
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
3 Axis Drawing Machine
3 Axis Drawing Machine
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
IOT Based Three Phase Transmission Line Fault Detection and Classification
IOT Based Three Phase Transmission Line Fault Detection and Classification
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginners
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
Home Automation Using Arduino Uno and HC-05
Home Automation Using Arduino Uno and HC-05
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
RajaP95
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Recently uploaded
(20)
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 320 ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS MR. A Y PRABHAKAR, ANKIT PATHAK, AVANISH PAL, AYUSH MAHESHWARI Professor, Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Previously, encryptionkeysfordigitalsystems had been generated using hardware and software techniques. However, these techniques can be duplicated because they are pseudo-random. Because of this, a hacker can readily duplicate and enhance the method that produces the encryption key in software. This problem can be resolved bycreatingarandomencryption key that doesn't adhere to any algorithm or pattern. To generate this kind of key, a hybrid methodology issuggestedin this research. The digital and analogue components are combined in the suggested circuit. The analogue domain is represented by Chua's circuit with a random noise source. Two capacitors, a resistor, and an inductor make up Chua's circuit, which may generate an oscillating waveform with a distinct output. The Chua's circuit is fueled by a randomized input thanks to the addition of noise in the circuits, which produces a much more random output. The key is generated, and then the data is stored on a digital storage medium. Sd card is used to store the digital bits, and Proteus8 is used to simulate the analogue component. RXD TXD Virtual Terminal may display the circuit's 8-bit digital output signals. The system makes use of an analogue circuit diagram, a digital circuit diagram, a virtual terminal, and an SD card to represent the key kept on a memory block. The project's final output is a randomly generated 8-bit encryption key for digital systems Key Words: Chua’s circuit, Noise generator, Multisim, Proteus 8. 1. INTRODUCTION Numerous techniques have been developed by humans to protect sensitive data from unauthorized access. People in ancient Greece wrote messages on wood that had been covered with wax to send a secret letter.Inthesameway,we must hide important information in the digital age. To accomplish this, we also work to create it "cover" for our private data. The technical word for this process is encryption. Digital systems frequently encrypt data using hardware or software techniques that generate an encryption key. In these tactics, algorithms that generate random keys are frequently employed. But any algorithm can contain a small amount of randomness. After a predetermined number of repetitions, the process will be repeated, enabling a hacker to obtain the encryption key and steal sensitive data. Pseudo-randomness is used in the vast majority of encryption key generation techniques. Since they are based on a particular algorithm, it is possible to generate the encryption key by deciphering its pattern or using reverse engineering methods. Making an encryption key that defies algorithmic analysis and cannot be reverse-engineered is the solution to this problem. How to achieve this goal is explained in this project. Since no algorithm will be used in the method for generating encryption keys outlined in this project, the encryption key will not contain any repetitions. This study will present a novel approach to producing encryption keys for digital systems. The keys will be generated using a hybrid strategy that connects an analogue circuit to a digital circuit. The analogue circuit will incorporate Chua's circuit as well as a short chain of inverters. Chua's circuit, which is only a straightforward configuration of electrical parts, generates oscillations with no recurring output. The Chua's circuit has various requirements.twocapacitors,onenonlinearcomponent, and one resistor.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 321 The circuit will be given a noise signal to make the encryption key more random. A voltage device that simulates the noise signals foundindigital systemsisused to represent the noise signal. This technique will provide unpredictability intheencryptionkey,makingtracingitback extremely difficult because there is no precise mechanism for producing the encryption key. As the weather circumstances vary, such as temperature and cross signals, the noise signal will shift. Regenerating theencryptionkeyis nearly hard, even by the same manufacturer. The encryption key must be transformed into a digital format after it has been generated. The encryption key will be used in digital circuits even if it is generated in the analogue domain. For this reason, the analogue signal is transformed into a digital signal. A converter from analogue to digital can be used for this. The speed and voltage requirements of digital andanaloguecircuitsweretakeninto consideration when designing this digital convenor. This hybrid approach will help create a highly random encryption key that is impossible to duplicate using any algorithm or reverse engineering. 2.IMPLEMENTATION In this project, a novel method for creating the encryption key for digital systems will be presented.Ananaloguecircuit will be connected to a digital circuit as part of a hybrid method for key generation. Chua's circuit and a short chain of inverters will also be present in the analogue circuit. A straightforward arrangement of electrical parts, Chua's circuit will oscillate such that the output is never repeated. The analogue circuit is connected to the ADC converter, which produces a binary or numeric output. The produced 8-bit binary output will always be distinct. In order to decrypt the message signal, the output is then placed into the memory card along with the encrypted key. 3.WORKING When a circuit is a built-in combination with Chua's oscillator and a Noise Generator, the output always generates a random waveform. Suppose we input a sine waveform into the circuit and change the resistance value of the combined circuit, we get the randomized waveform of a sine wave. These random signals are then converted into digital signals using an Analog-Digital Converter(A- D converter). Now, these digital signals are then converted into binary, finally, a test bench is written in Verilog to simulate the circuit and the expected output 8-bit encryption key is generated. 4.RESULTS Step 1: Initially, we created Chua’s circuit which consists of inductors, capacitors, and resistors. Step 2: As we move forward, we have generated a random signal by combing Chua's circuit with a noise generator. Step 3:
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 322 Now we have connected all 8 Chua's circuits in parallel to generate an 8-bit random binary signal. Step 4: Now the 8-bit random key is stored in the memory card to forward on the decryption side to encrypt the message signal. Step 5: This is the final output in Virtual Terminal, this8-bitrandom output changes after every interval. 5. CONCLUSION This work put up a fresh idea for digital system encryption key generation using a mixed-signal approach. The study also underlines the significance of noise and fluctuating signals in digital systems. Using a mixed-signal approach, the model circuit for the encryption key generator was constructed. Phase 1 involves designing and simulating Chua's circuit. It was challenging to determine the ideal values for the circuit's properties to achieve the Chua effect. By utilizing Kirchhoff's rules, numerous equationsweredevelopedto get around this obstacle. The components of the circuit were selected to increase the circuit's overall efficiency. The design is appropriate for low power applications because of this feature. In addition to the power advantage, the circuit has a parallel bit generating approach that makes it extremely efficient. The second phase entails creating a noise generator thatcan simulate actual noise. Numerous noise equations, random number generators, and software were employed to accomplish this. The Arduino, which includes an integrated ADCconverter, is the focus of phase three. We have coded the analogue signal in Arduino to produce digital output. This programcompiles analogue values and outputs binary values, 0 and 1, as a result. The memory card that is connectedtoArduinoisthen given these binary values. The binary values are kept on the memory card here. We can see the output on the terminal display with the aid of Rxd and Txd terminals. 6. FUTURE SCOPE The key's length can be changed to make a significant difference. Another aspect that the hacker will research is the length of the encryption key. The length of the data that has to be encrypted can set a range for the key's potential length. The encryption key will gain a new level of robustness thanks to this functionality. Another element thatmight makeanencryptionkey particularly unpredictable is varying sample time. By using a variety of random sampling rates with respect to the oscillation frequency of the Chua's circuit, the implementation can be carried out. The time it takes to produce the key will be highly variable due to the fluctuating sample rate. The encryption key may be more secure and random thanks to this function. 7. REFERENCES https://www.scribd.com/document/141906870/ Chua-s-Circuit-Implementations https://en.wikipedia.org/wiki/The_Codebreakers https://www.researchgate.net/publication/2611 26433_Sampling_Circuits_That_Break_the_kTC_Ther mal_Noise_Limit https://store.arduino.cc/products/arduino- mega-2560-rev3 https://ieeexplore.ieee.org/document/9278996 https://en.wikipedia.org/wiki/History_of_crypto graphy https://randomnerdtutorials.com/guide-to-sd- card-module-with-arduino/
Download now