SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 320
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS
USING ANALOG CIRCUITS
MR. A Y PRABHAKAR, ANKIT PATHAK, AVANISH PAL, AYUSH MAHESHWARI
Professor, Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Previously, encryptionkeysfordigitalsystems had
been generated using hardware and software techniques.
However, these techniques can be duplicated because they are
pseudo-random. Because of this, a hacker can readily
duplicate and enhance the method that produces the
encryption key in software.
This problem can be resolved bycreatingarandomencryption
key that doesn't adhere to any algorithm or pattern. To
generate this kind of key, a hybrid methodology issuggestedin
this research. The digital and analogue components are
combined in the suggested circuit.
The analogue domain is represented by Chua's circuit with a
random noise source. Two capacitors, a resistor, and an
inductor make up Chua's circuit, which may generate an
oscillating waveform with a distinct output.
The Chua's circuit is fueled by a randomized input thanks to
the addition of noise in the circuits, which produces a much
more random output.
The key is generated, and then the data is stored on a digital
storage medium. Sd card is used to store the digital bits, and
Proteus8 is used to simulate the analogue component. RXD
TXD Virtual Terminal may display the circuit's 8-bit digital
output signals. The system makes use of an analogue circuit
diagram, a digital circuit diagram, a virtual terminal, and an
SD card to represent the key kept on a memory block.
The project's final output is a randomly generated 8-bit
encryption key for digital systems
Key Words: Chua’s circuit, Noise generator, Multisim,
Proteus 8.
1. INTRODUCTION
Numerous techniques have been developed by humans to
protect sensitive data from unauthorized access. People in
ancient Greece wrote messages on wood that had been
covered with wax to send a secret letter.Inthesameway,we
must hide important information in the digital age. To
accomplish this, we also work to create it "cover" for our
private data. The technical word for this process is
encryption. Digital systems frequently encrypt data using
hardware or software techniques that generate an
encryption key. In these tactics, algorithms that generate
random keys are frequently employed.
But any algorithm can contain a small amount of
randomness. After a predetermined number of repetitions,
the process will be repeated, enabling a hacker to obtain the
encryption key and steal sensitive data.
Pseudo-randomness is used in the vast majority of
encryption key generation techniques. Since they are based
on a particular algorithm, it is possible to generate the
encryption key by deciphering its pattern or using reverse
engineering methods.
Making an encryption key that defies algorithmic analysis
and cannot be reverse-engineered is the solution to this
problem. How to achieve this goal is explained in this
project. Since no algorithm will be used in the method for
generating encryption keys outlined in this project, the
encryption key will not contain any repetitions.
This study will present a novel approach to producing
encryption keys for digital systems. The keys will be
generated using a hybrid strategy that connects an analogue
circuit to a digital circuit. The analogue circuit will
incorporate Chua's circuit as well as a short chain of
inverters. Chua's circuit, which is only a straightforward
configuration of electrical parts, generates oscillations with
no recurring output. The Chua's circuit has various
requirements.twocapacitors,onenonlinearcomponent, and
one resistor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 321
The circuit will be given a noise signal to make the
encryption key more random. A voltage device that
simulates the noise signals foundindigital systemsisused to
represent the noise signal. This technique will provide
unpredictability intheencryptionkey,makingtracingitback
extremely difficult because there is no precise mechanism
for producing the encryption key. As the weather
circumstances vary, such as temperature and cross signals,
the noise signal will shift. Regenerating theencryptionkeyis
nearly hard, even by the same manufacturer.
The encryption key must be transformed into a digital
format after it has been generated. The encryption key will
be used in digital circuits even if it is generated in the
analogue domain. For this reason, the analogue signal is
transformed into a digital signal. A converter from analogue
to digital can be used for this. The speed and voltage
requirements of digital andanaloguecircuitsweretakeninto
consideration when designing this digital convenor.
This hybrid approach will help create a highly random
encryption key that is impossible to duplicate using any
algorithm or reverse engineering.
2.IMPLEMENTATION
In this project, a novel method for creating the encryption
key for digital systems will be presented.Ananaloguecircuit
will be connected to a digital circuit as part of a hybrid
method for key generation. Chua's circuit and a short chain
of inverters will also be present in the analogue circuit.
A straightforward arrangement of electrical parts, Chua's
circuit will oscillate such that the output is never repeated.
The analogue circuit is connected to the ADC converter,
which produces a binary or numeric output.
The produced 8-bit binary output will always be distinct. In
order to decrypt the message signal, the output is then
placed into the memory card along with the encrypted key.
3.WORKING
 When a circuit is a built-in combination with Chua's
oscillator and a Noise Generator, the output always
generates a random waveform.
 Suppose we input a sine waveform into the circuit
and change the resistance value of the combined
circuit, we get the randomized waveform of a sine
wave.
 These random signals are then converted into
digital signals using an Analog-Digital Converter(A-
D converter).
 Now, these digital signals are then converted into
binary, finally, a test bench is written in Verilog to
simulate the circuit and the expected output 8-bit
encryption key is generated.
4.RESULTS
Step 1:
Initially, we created Chua’s circuit which consists of
inductors, capacitors, and resistors.
Step 2:
As we move forward, we have generated a random signal by
combing Chua's circuit with a noise generator.
Step 3:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 322
Now we have connected all 8 Chua's circuits in parallel to
generate an 8-bit random binary signal.
Step 4:
Now the 8-bit random key is stored in the memory card to
forward on the decryption side to encrypt the message
signal.
Step 5:
This is the final output in Virtual Terminal, this8-bitrandom
output changes after every interval.
5. CONCLUSION
This work put up a fresh idea for digital system encryption
key generation using a mixed-signal approach. The study
also underlines the significance of noise and fluctuating
signals in digital systems.
Using a mixed-signal approach, the model circuit for the
encryption key generator was constructed.
Phase 1 involves designing and simulating Chua's circuit. It
was challenging to determine the ideal values for the
circuit's properties to achieve the Chua effect. By utilizing
Kirchhoff's rules, numerous equationsweredevelopedto get
around this obstacle. The components of the circuit were
selected to increase the circuit's overall efficiency. The
design is appropriate for low power applications because of
this feature. In addition to the power advantage, the circuit
has a parallel bit generating approach that makes it
extremely efficient.
The second phase entails creating a noise generator thatcan
simulate actual noise. Numerous noise equations, random
number generators, and software were employed to
accomplish this.
The Arduino, which includes an integrated ADCconverter, is
the focus of phase three. We have coded the analogue signal
in Arduino to produce digital output. This programcompiles
analogue values and outputs binary values, 0 and 1, as a
result. The memory card that is connectedtoArduinoisthen
given these binary values. The binary values are kept on the
memory card here. We can see the output on the terminal
display with the aid of Rxd and Txd terminals.
6. FUTURE SCOPE
 The key's length can be changed to make a
significant difference. Another aspect that the
hacker will research is the length of the encryption
key. The length of the data that has to be encrypted
can set a range for the key's potential length. The
encryption key will gain a new level of robustness
thanks to this functionality.
 Another element thatmight makeanencryptionkey
particularly unpredictable is varying sample time.
By using a variety of random sampling rates with
respect to the oscillation frequency of the Chua's
circuit, the implementation can be carried out. The
time it takes to produce the key will be highly
variable due to the fluctuating sample rate. The
encryption key may be more secure and random
thanks to this function.
7. REFERENCES
 https://www.scribd.com/document/141906870/
Chua-s-Circuit-Implementations
 https://en.wikipedia.org/wiki/The_Codebreakers
 https://www.researchgate.net/publication/2611
26433_Sampling_Circuits_That_Break_the_kTC_Ther
mal_Noise_Limit
 https://store.arduino.cc/products/arduino-
mega-2560-rev3
 https://ieeexplore.ieee.org/document/9278996
 https://en.wikipedia.org/wiki/History_of_crypto
graphy
 https://randomnerdtutorials.com/guide-to-sd-
card-module-with-arduino/

More Related Content

Similar to ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS

IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Monitoring and Measurement of Solar Parameters using IoTIRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Monitoring and Measurement of Solar Parameters using IoTIRJET Journal
 
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET- Bluetooth Controlled Metal Detecting Robot with Message AlertIRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET- Bluetooth Controlled Metal Detecting Robot with Message AlertIRJET Journal
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice boardIRJET Journal
 
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGFAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGVLSICS Design
 
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...IRJET Journal
 
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller CounterIRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller CounterIRJET Journal
 
IRJET- IoT based Solar Street Light Intensity Control System
IRJET- IoT based Solar Street Light Intensity Control SystemIRJET- IoT based Solar Street Light Intensity Control System
IRJET- IoT based Solar Street Light Intensity Control SystemIRJET Journal
 
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
DESIGN OF POWER EFFICIENT PRIORITY ENCODERDESIGN OF POWER EFFICIENT PRIORITY ENCODER
DESIGN OF POWER EFFICIENT PRIORITY ENCODERIRJET Journal
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTIRJET Journal
 
3 Axis Drawing Machine
3 Axis Drawing Machine3 Axis Drawing Machine
3 Axis Drawing MachineIRJET Journal
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGIRJET Journal
 
IOT Based Three Phase Transmission Line Fault Detection and Classification
IOT Based Three Phase Transmission Line Fault Detection and ClassificationIOT Based Three Phase Transmission Line Fault Detection and Classification
IOT Based Three Phase Transmission Line Fault Detection and ClassificationIRJET Journal
 
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for BeginnersFPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginnersijtsrd
 
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IOT Vehicle Fuel Theft Detection System Using Arduino.pptxIOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IOT Vehicle Fuel Theft Detection System Using Arduino.pptxDeepakK547422
 
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET Journal
 
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET Journal
 
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUDENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUDIRJET Journal
 
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUDENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUDIRJET Journal
 
Home Automation Using Arduino Uno and HC-05
Home Automation Using Arduino Uno and HC-05Home Automation Using Arduino Uno and HC-05
Home Automation Using Arduino Uno and HC-05Vidhi Shah
 

Similar to ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS (20)

IRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Monitoring and Measurement of Solar Parameters using IoTIRJET- Monitoring and Measurement of Solar Parameters using IoT
IRJET- Monitoring and Measurement of Solar Parameters using IoT
 
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET- Bluetooth Controlled Metal Detecting Robot with Message AlertIRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
IRJET- Bluetooth Controlled Metal Detecting Robot with Message Alert
 
Decibel meter using IoT with notice board
Decibel meter using IoT with notice boardDecibel meter using IoT with notice board
Decibel meter using IoT with notice board
 
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATINGFAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
FAULT SECURE ENCODER AND DECODER WITH CLOCK GATING
 
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...IRJET-  	  Note to Coin Converter using Digital Image Correlation Technique i...
IRJET- Note to Coin Converter using Digital Image Correlation Technique i...
 
IRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller CounterIRJET- Design and Development of IoT based Geiger Muller Counter
IRJET- Design and Development of IoT based Geiger Muller Counter
 
IRJET- IoT based Solar Street Light Intensity Control System
IRJET- IoT based Solar Street Light Intensity Control SystemIRJET- IoT based Solar Street Light Intensity Control System
IRJET- IoT based Solar Street Light Intensity Control System
 
SMART LATHE MACHINE
SMART LATHE MACHINESMART LATHE MACHINE
SMART LATHE MACHINE
 
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
DESIGN OF POWER EFFICIENT PRIORITY ENCODERDESIGN OF POWER EFFICIENT PRIORITY ENCODER
DESIGN OF POWER EFFICIENT PRIORITY ENCODER
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
 
3 Axis Drawing Machine
3 Axis Drawing Machine3 Axis Drawing Machine
3 Axis Drawing Machine
 
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLINGAUTOMATIC SMART SHOPPING TROLLY WITH BILLING
AUTOMATIC SMART SHOPPING TROLLY WITH BILLING
 
IOT Based Three Phase Transmission Line Fault Detection and Classification
IOT Based Three Phase Transmission Line Fault Detection and ClassificationIOT Based Three Phase Transmission Line Fault Detection and Classification
IOT Based Three Phase Transmission Line Fault Detection and Classification
 
FPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for BeginnersFPGA Based Digital Logic Circuits Operation for Beginners
FPGA Based Digital Logic Circuits Operation for Beginners
 
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IOT Vehicle Fuel Theft Detection System Using Arduino.pptxIOT Vehicle Fuel Theft Detection System Using Arduino.pptx
IOT Vehicle Fuel Theft Detection System Using Arduino.pptx
 
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
IRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling SystemIRJET-  	  Smart Energy Meter Billing, Monitoring and Controlling System
IRJET- Smart Energy Meter Billing, Monitoring and Controlling System
 
IRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mallIRJET- IOT and RFID based shopping mall
IRJET- IOT and RFID based shopping mall
 
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUDENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
 
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUDENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
ENERGY METER READING SYSTEM WITH AUTOMATIC BILLING USING CLOUD
 
Home Automation Using Arduino Uno and HC-05
Home Automation Using Arduino Uno and HC-05Home Automation Using Arduino Uno and HC-05
Home Automation Using Arduino Uno and HC-05
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 

Recently uploaded (20)

Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 

ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 320 ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS MR. A Y PRABHAKAR, ANKIT PATHAK, AVANISH PAL, AYUSH MAHESHWARI Professor, Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Previously, encryptionkeysfordigitalsystems had been generated using hardware and software techniques. However, these techniques can be duplicated because they are pseudo-random. Because of this, a hacker can readily duplicate and enhance the method that produces the encryption key in software. This problem can be resolved bycreatingarandomencryption key that doesn't adhere to any algorithm or pattern. To generate this kind of key, a hybrid methodology issuggestedin this research. The digital and analogue components are combined in the suggested circuit. The analogue domain is represented by Chua's circuit with a random noise source. Two capacitors, a resistor, and an inductor make up Chua's circuit, which may generate an oscillating waveform with a distinct output. The Chua's circuit is fueled by a randomized input thanks to the addition of noise in the circuits, which produces a much more random output. The key is generated, and then the data is stored on a digital storage medium. Sd card is used to store the digital bits, and Proteus8 is used to simulate the analogue component. RXD TXD Virtual Terminal may display the circuit's 8-bit digital output signals. The system makes use of an analogue circuit diagram, a digital circuit diagram, a virtual terminal, and an SD card to represent the key kept on a memory block. The project's final output is a randomly generated 8-bit encryption key for digital systems Key Words: Chua’s circuit, Noise generator, Multisim, Proteus 8. 1. INTRODUCTION Numerous techniques have been developed by humans to protect sensitive data from unauthorized access. People in ancient Greece wrote messages on wood that had been covered with wax to send a secret letter.Inthesameway,we must hide important information in the digital age. To accomplish this, we also work to create it "cover" for our private data. The technical word for this process is encryption. Digital systems frequently encrypt data using hardware or software techniques that generate an encryption key. In these tactics, algorithms that generate random keys are frequently employed. But any algorithm can contain a small amount of randomness. After a predetermined number of repetitions, the process will be repeated, enabling a hacker to obtain the encryption key and steal sensitive data. Pseudo-randomness is used in the vast majority of encryption key generation techniques. Since they are based on a particular algorithm, it is possible to generate the encryption key by deciphering its pattern or using reverse engineering methods. Making an encryption key that defies algorithmic analysis and cannot be reverse-engineered is the solution to this problem. How to achieve this goal is explained in this project. Since no algorithm will be used in the method for generating encryption keys outlined in this project, the encryption key will not contain any repetitions. This study will present a novel approach to producing encryption keys for digital systems. The keys will be generated using a hybrid strategy that connects an analogue circuit to a digital circuit. The analogue circuit will incorporate Chua's circuit as well as a short chain of inverters. Chua's circuit, which is only a straightforward configuration of electrical parts, generates oscillations with no recurring output. The Chua's circuit has various requirements.twocapacitors,onenonlinearcomponent, and one resistor.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 321 The circuit will be given a noise signal to make the encryption key more random. A voltage device that simulates the noise signals foundindigital systemsisused to represent the noise signal. This technique will provide unpredictability intheencryptionkey,makingtracingitback extremely difficult because there is no precise mechanism for producing the encryption key. As the weather circumstances vary, such as temperature and cross signals, the noise signal will shift. Regenerating theencryptionkeyis nearly hard, even by the same manufacturer. The encryption key must be transformed into a digital format after it has been generated. The encryption key will be used in digital circuits even if it is generated in the analogue domain. For this reason, the analogue signal is transformed into a digital signal. A converter from analogue to digital can be used for this. The speed and voltage requirements of digital andanaloguecircuitsweretakeninto consideration when designing this digital convenor. This hybrid approach will help create a highly random encryption key that is impossible to duplicate using any algorithm or reverse engineering. 2.IMPLEMENTATION In this project, a novel method for creating the encryption key for digital systems will be presented.Ananaloguecircuit will be connected to a digital circuit as part of a hybrid method for key generation. Chua's circuit and a short chain of inverters will also be present in the analogue circuit. A straightforward arrangement of electrical parts, Chua's circuit will oscillate such that the output is never repeated. The analogue circuit is connected to the ADC converter, which produces a binary or numeric output. The produced 8-bit binary output will always be distinct. In order to decrypt the message signal, the output is then placed into the memory card along with the encrypted key. 3.WORKING  When a circuit is a built-in combination with Chua's oscillator and a Noise Generator, the output always generates a random waveform.  Suppose we input a sine waveform into the circuit and change the resistance value of the combined circuit, we get the randomized waveform of a sine wave.  These random signals are then converted into digital signals using an Analog-Digital Converter(A- D converter).  Now, these digital signals are then converted into binary, finally, a test bench is written in Verilog to simulate the circuit and the expected output 8-bit encryption key is generated. 4.RESULTS Step 1: Initially, we created Chua’s circuit which consists of inductors, capacitors, and resistors. Step 2: As we move forward, we have generated a random signal by combing Chua's circuit with a noise generator. Step 3:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 322 Now we have connected all 8 Chua's circuits in parallel to generate an 8-bit random binary signal. Step 4: Now the 8-bit random key is stored in the memory card to forward on the decryption side to encrypt the message signal. Step 5: This is the final output in Virtual Terminal, this8-bitrandom output changes after every interval. 5. CONCLUSION This work put up a fresh idea for digital system encryption key generation using a mixed-signal approach. The study also underlines the significance of noise and fluctuating signals in digital systems. Using a mixed-signal approach, the model circuit for the encryption key generator was constructed. Phase 1 involves designing and simulating Chua's circuit. It was challenging to determine the ideal values for the circuit's properties to achieve the Chua effect. By utilizing Kirchhoff's rules, numerous equationsweredevelopedto get around this obstacle. The components of the circuit were selected to increase the circuit's overall efficiency. The design is appropriate for low power applications because of this feature. In addition to the power advantage, the circuit has a parallel bit generating approach that makes it extremely efficient. The second phase entails creating a noise generator thatcan simulate actual noise. Numerous noise equations, random number generators, and software were employed to accomplish this. The Arduino, which includes an integrated ADCconverter, is the focus of phase three. We have coded the analogue signal in Arduino to produce digital output. This programcompiles analogue values and outputs binary values, 0 and 1, as a result. The memory card that is connectedtoArduinoisthen given these binary values. The binary values are kept on the memory card here. We can see the output on the terminal display with the aid of Rxd and Txd terminals. 6. FUTURE SCOPE  The key's length can be changed to make a significant difference. Another aspect that the hacker will research is the length of the encryption key. The length of the data that has to be encrypted can set a range for the key's potential length. The encryption key will gain a new level of robustness thanks to this functionality.  Another element thatmight makeanencryptionkey particularly unpredictable is varying sample time. By using a variety of random sampling rates with respect to the oscillation frequency of the Chua's circuit, the implementation can be carried out. The time it takes to produce the key will be highly variable due to the fluctuating sample rate. The encryption key may be more secure and random thanks to this function. 7. REFERENCES  https://www.scribd.com/document/141906870/ Chua-s-Circuit-Implementations  https://en.wikipedia.org/wiki/The_Codebreakers  https://www.researchgate.net/publication/2611 26433_Sampling_Circuits_That_Break_the_kTC_Ther mal_Noise_Limit  https://store.arduino.cc/products/arduino- mega-2560-rev3  https://ieeexplore.ieee.org/document/9278996  https://en.wikipedia.org/wiki/History_of_crypto graphy  https://randomnerdtutorials.com/guide-to-sd- card-module-with-arduino/