Submit Search
Upload
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 Algorithm and Scrambling
•
0 likes
•
5 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I533.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Performance Analysis of IEEE 802.15.4 Transceiver System under Adaptive White...
Performance Analysis of IEEE 802.15.4 Transceiver System under Adaptive White...
IJECEIAES
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interface
eSAT Publishing House
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
IRJET Journal
My paper
My paper
Venkat Malai Avichi
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
IJERA Editor
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3G
IJECEIAES
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET Journal
Recommended
Performance Analysis of IEEE 802.15.4 Transceiver System under Adaptive White...
Performance Analysis of IEEE 802.15.4 Transceiver System under Adaptive White...
IJECEIAES
Transfer of ut information from fpga through ethernet interface
Transfer of ut information from fpga through ethernet interface
eSAT Publishing House
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
IRJET Journal
My paper
My paper
Venkat Malai Avichi
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
High Speed VLSI Architecture for AES-Galois/Counter Mode
High Speed VLSI Architecture for AES-Galois/Counter Mode
IJERA Editor
Optimized architecture for SNOW 3G
Optimized architecture for SNOW 3G
IJECEIAES
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET- VLSI Architecture for Reversible Radix-2 FFT Algorithm using Programma...
IRJET Journal
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
Low complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acs
IAEME Publication
Vhdl modeling of the sram module and state machine controller smc module of r...
Vhdl modeling of the sram module and state machine controller smc module of r...
IAEME Publication
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
IJERA Editor
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Radita Apriana
Rems final
Rems final
Gaurav Bansod
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
IRJET Journal
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
I044024549
I044024549
IJERA Editor
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technology
IAEME Publication
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
IJMER
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
K0216571
K0216571
IOSR Journals
40120140504012
40120140504012
IAEME Publication
High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...
IJMER
Implementation of switching controller for the internet router
Implementation of switching controller for the internet router
IAEME Publication
IJSRED-V1I1P2
IJSRED-V1I1P2
IJSRED
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET Journal
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
VIT-AP University
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
More Related Content
What's hot
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
IRJET Journal
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
Low complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acs
IAEME Publication
Vhdl modeling of the sram module and state machine controller smc module of r...
Vhdl modeling of the sram module and state machine controller smc module of r...
IAEME Publication
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
IJERA Editor
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Radita Apriana
Rems final
Rems final
Gaurav Bansod
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
IRJET Journal
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
IJMTST Journal
I044024549
I044024549
IJERA Editor
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technology
IAEME Publication
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
IJMER
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
K0216571
K0216571
IOSR Journals
40120140504012
40120140504012
IAEME Publication
High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...
IJMER
Implementation of switching controller for the internet router
Implementation of switching controller for the internet router
IAEME Publication
IJSRED-V1I1P2
IJSRED-V1I1P2
IJSRED
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET Journal
What's hot
(20)
Design of A New Lightweight Encryption for Embedded Security
Design of A New Lightweight Encryption for Embedded Security
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
Low complexity turbo decoder with modified acs
Low complexity turbo decoder with modified acs
Vhdl modeling of the sram module and state machine controller smc module of r...
Vhdl modeling of the sram module and state machine controller smc module of r...
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Study on Adaptive PID Control Algorithm Based on RBF Neural Network
Rems final
Rems final
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Optimizing Data Encoding Technique For Dynamic Power Reduction In Network On ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
Novel Adaptive Hold Logic Circuit for the Multiplier using Add Round Key and ...
I044024549
I044024549
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technology
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Implementation of Low Power and High Speed encryption Using Crypto-Hardware
Fpga based encryption design using vhdl
Fpga based encryption design using vhdl
K0216571
K0216571
40120140504012
40120140504012
High speed customized serial protocol for IP integration on FPGA based SOC ap...
High speed customized serial protocol for IP integration on FPGA based SOC ap...
Implementation of switching controller for the internet router
Implementation of switching controller for the internet router
IJSRED-V1I1P2
IJSRED-V1I1P2
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
Similar to IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 Algorithm and Scrambling
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
VIT-AP University
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET Journal
Watermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved Encryption
Editor IJCATR
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
IJERA Editor
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IJNSA Journal
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
IJECEIAES
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
IRJET Journal
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET Journal
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
International Journal of Reconfigurable and Embedded Systems
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
IRJET Journal
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
IJERA Editor
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET Journal
IRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning System
IRJET Journal
Field-programmable gate array design of image encryption and decryption usin...
Field-programmable gate array design of image encryption and decryption usin...
IJECEIAES
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
IOSR Journals
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
IOSR Journals
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
Similar to IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 Algorithm and Scrambling
(20)
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
Watermarking of JPEG2000 Compressed Images with Improved Encryption
Watermarking of JPEG2000 Compressed Images with Improved Encryption
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
IRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning System
Field-programmable gate array design of image encryption and decryption usin...
Field-programmable gate array design of image encryption and decryption usin...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
upamatechverse
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Recently uploaded
(20)
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
IRJET- A Novel Hybrid Security System for OFDM-PON using Highly Improved RC6 Algorithm and Scrambling
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 163 A Novel Hybrid Security system for OFDM-PON using Highly Improved RC6 Algorithm and Scrambling Rensu Elsa Chacko1, Sruthi Maria Abraham2, Hari s3 1PG Scholar, Dept. of ECE, Mount Zion College of Engineering, Kadammanitta 2,3Assistant Professor, Dept. of ECE, Mount Zion College of Engineering, Kadammanitta, Kerala, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - This paper proposes a scheme for security enhancement in the orthogonal frequency division multiplexing passive optical network (OFDM-PON) based on highly Improved RC6 algorithm and scrambling technique. Here the data stream is scrambled and then performs the highly improved RC6 algorithm to make the data encryption more secure. Scrambling using morlet wavelet method is efficient for altering the data in the spatial domain without losing the data. The highly improved RC6 algorithm is the modified version of the improved RC6 algorithmwhich ismore beneficial and secure for the encryption process. By using scrambling along with the highly improved rc6 algorithm, encryption security standard will improve without any extra module with low complexity. Usage of MIMO-OFDM and SIC makes this system more attractive. We are also testing this system with the LTE communication system. After decryption, the signal loss is compensated by the signal enhancement at the receiver end. Key Words: Orthogonal FrequencyDivisionMultiplexing (OFDM), Highly Improved Rivest Cipher6 (hirc6) algorithm, Walsh Hadamard Transform 1. INTRODUCTION To meet the demands of next generation networks in optical communication systems,theorthogonal frequency division multiplexing passive optical network (OFDM-PON) [1] has introduced because of its spectral efficiency, flexibility and relatively high signal transmission capability [2]. Also communication security is becoming a great requirement in our society. Since the processes like encryption, decryption and authentication protocols are available, increasing security in transmission level is also a vital concern. Digital chaos algorithms [3] and analog chaos algorithms [4] are used at the physical layer to increase the security level of OFDM-PON systems. Noise like characteristics and sensitivitytoinitial parametersmade the chaos algorithm more efficient for data transmission in a highly secure manner. Pseudo random characteristics, huge parameter space [5], [6] and good compatibility with the digital signal processing technology make thedigital chaosalgorithmvery suitable nowadays. Chaotic scrambling [7], [8], [9], chaotic constellation manipulation [10] and chaos IQ encryption techniques [11] are proposed and implemented in several papers. In chaotic coding, the QAM symbols are rotated in the constellation and its phases are changed,andatthesame time the symbol to carrier or symbol to time mappings are not interrupted. In modern schemes, the iteration processis done by using floating point algorithm with high computational precision. The main disadvantage of the floating point algorithm includes its computational complexity and hence calculation speedislimited.Soseveral OFDM frames uses same chaotic sequences, which reduces the security. The RC6 algorithm [12] is a secure block cipher algorithm which was a final candidate project in the AES (Advanced Encryption Standard)projectoftheUnitedStates and NESSIE (New European Schemes for Signatures, Integrity, and Encryption) project of Europe. The block cipher is classified into Feistel structure and SPN (Substitution Permutation Network) [13]-[14]. Fiestel structure uses the same algorithm between encryption and decryption whereas the SPN uses different algorithm between encryption and decryption. Therefore the SPN structure uses twice the area than Fiestel structure when implemented via hardware. The RC6 algorithm has a modified Fiestel structure and uses different algorithm between encryption and decryption. Thus it uses double space for implementation on hardware. So an improved version of RC6 is introduced which uses the same structure for encryption and decryption. The improved RC6 encryption algorithm is implemented by using a symmetric layer between encryption and decryption process. The symmetric layer is inserted by using simple rotation and XOR operations. Here the half of the whole algorithm performs encryption process and the rest performs decryption and in between these two the symmetric layer is introduced. This paper introduces a highly improved RC6 (HIRC6) algorithm which increases the security of our system. Data integrity is the main concern in our modern world. Thus improving efficient RC6 algorithm makes our encryption standard security more efficient without using any extra module with low complexity. Here we are improving the algorithm by creating more security for two registers A and C and thus making it more efficient and secure. This paper also uses a technique called scrambling based on Morlet Wavelet transform for the secure transmission of data in OFDM-PON. The dynamical degradation problemisrenovatedbyintroducingthenatural
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 164 impermanence of the data. Secure transmission of the encrypted OFDM signal isexperimentallydemonstrated. The low implementation complexity and high security performance necessities are considered here. 2. PRINCIPLE The principle of this system is to first scramble the data using morlet wavelet and then do highly improved RC6 (HIRC6) encryption algorithm for high security. Implementing the two techniques together gives two tier security for our system. After scrambling operation the data is once encrypted and then doing encryption algorithm in this scrambled data makes our system double secure. Here, we are using an interleaver forincreasingtherandomnature of our key which is used in the HIRC6 encryption technique. MIMO-OFDM and a Signal to Interference Canceller (SIC) is used which makes this system more efficient than the previous works. The scrambling technique using morlet wavelet method is shown in the figure 1. The morlet wavelet splits the incoming data into two frequency domain as high frequency component and low frequency component by passing it through a high pass filter and a low pass filter. Then these are separately down sampled to reduce its size and then take the low frequency signals since it contains more number of information than high frequency. Then these low frequency signals are then shuffled using Walsh Hadamard transform. The walsh hadamard transform is a non sinusoidal, orthogonal transformationtechnique, which is used to scramble the data withoutanyloss.Thusthedata is encrypted once. (a) (b) Figure: 1. (a) Scrambling based on morlet wavelet transform. (b) Reconstruction of the scrambled signal The HIRC6 encryption and decryption algorithms are given below. Thus this scrambleddata isagainencrypted by using HIRC6 encryption technique. The scrambleddata is stored in four registers named A, B, C and D and then performs the encryption. RC6 algorithm is symbolically presented as RC6-w/r/b in whichwmeansthewordsize(32 bits), r denotes the number of rounds and b denotes the number of key (16 byte). Six basic operations in RC6 are as follows: 1. a + b integer addition modulo 2W 2. a - b integer subtraction modulo 2W 3. a ⊕ b bitwise exclusive-or of w-bit words 4. a X b integer multiplication modulo 2W 5. a<< >>b rotate the w-bit word a to the left by the amount given by the least significant lg w bits of b 6. a>><<b rotate the w-bit word a to the right by the amount given by the least significant lg w bits of b HIRC6 Encryption Algorithm B = B + S [0] D = D + S [1] for i = 1 to r do t = (B X (2B + 1)) <<< lg w u = (D X (2D + 1)) <<< lg w A = ((A ⊕ t) <<< u) + S [2i] A1 = ((A ⊕ t) <<< u) + S [2i] A2= ((A ⊕ t) <<<u) + S [2i] A=(A1+A2)/2 C = ((C ⊕ u) <<< t) + S [2i+ 1]
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 165 C1 = ((C ⊕ u) <<< t) + S [2i+ 1] C 2= ((C ⊕ u) >>>t) + S [2i+ 1] C=(C1+C2)/2 end HIRC6 Decryption Algorithm C = C – S [2r+3]; A = A – S [2r+2]; for i = r down to 1 do { (A, B, C, D) = (D, A, B, C) u = (D* (2D + 1)) ⋘ lg w t = (B *(2B + 1)) ⋘ lg w C = ((C – S [2i+1]) ⋙ t) ⊕ u A = ((A – S [2i]) ⋙ u) ⊕ t } D = D – S [1] B = B - S[0] 3. BLOCK DIAGRAM The below figure 2 shows the block diagram of the system. The key stream generation process is done by C program and the encryption and decryption process is done by offline MATLAB. Figure 2: Block diagram of the system In the block diagram, the input data is first scrambled using the morlet wavelet method. This includes walsh hadamard transform which is a non-sinusoidal, orthogonal transformation technique which makes the source data as a perturbed data for reducing the dynamical degradation problem. Then this scrambleddata isencrypted by using the highly improved RC6 algorithm which makes the data secure. Encrypting data after scrambling process makes this system more resistant to eavesdroppers. Then it is transmitted using MIMO-OFDM, which has greatest spectral efficiency and thus delivers highest capacity and data throughput. It is transmitted through Rayleighchannel, which is a frequency varying channel that reduces channel noise and thus data can be decrypted easily. A combiner is used to combine data from the multiple antennas. Signal to interference canceller [SIC] is added for reducing interference at the receiver and can be used to reduce the effects of noises in the transmitted and received data. 4. RESULT The experimental result is shown in figure 3. It shows the bit error rate (BER), symbol error rate (SER) and theory error rate. This result shows the performance of the system and here the BER and SER is small enough to show better performance of our system. Here, both the bit error rate and symbol error rate should be low when the signal to noise ratio increases. The black color line shows the theoretical value. The bit error rate is used to find the error between the received bits and original transmitted bits. The symbol error rate is used to find the error between received distorted symbol andoriginal symbol.Thustheexperimental result shows that the data encryption and decryption process are much secure and is well efficient. Figure 3: The experimental results showing bit error, symbol error and theory error rates curve with the improved performance of the system
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 166 5. CONCLUSIONS Here we proposed a secure scheme for OFDM-PON based on highly improved RC6 encryption and scrambling with low computational precision. The dynamic generation of the key stream reduces the strength against attacks. Meanwhile, the dynamical degradation of the digital chaotic system is improved by introducing the endemic impermanence of the data source. The need for low implementation complexity and high security performance can be met together. This security upgraded OFDM-PON has potential applications in secure communications at the physical layer. The main work in this paper includes, a technique scrambling using morlet wavelet is used with highly improved RC6 encryption algorithm for increasing security. Thus a two tier security is provided. Here MIMO-OFDM is used which increases the efficiency of the system. Using an interleaver instead of a pseudo random binary sequence [PRBS] generator increases the randomness of the data and makes it more secure transmission. Frequency varying channel for transmission is used which reduces the channel noise and thus the data can decrypted easily. Signal to interference canceller [SIC] is added for reducing interference at the receiver and can be used to reduce the effects of noises in the transmitted and received data. REFERENCES [1]. Shanshan Li, Mengfan Cheng, Lei Deng, Songnian Fu, Minming Zhang, Ming Tang, Ping Shum, and Deming Liu, “Secure Strategy for OFDM-PON Using Digital Chaos Algorithm with Fixed-Point Implementation”, IEEE Lightwave Technol. Vol. 36 , Issue. 20 , Oct.15, 2018. [2]. N. Cvijetic, "OFDM for Next-Generation Optical Access Networks", J. Light wave Technol., vol. 30, no.4,pp.384-398, Feb. 2012. [3]. B. Liu, L. Zhang, X. Xin and N. Liu, "Piecewise Chaotic Permutation Method for Physical Layer Security in OFDM- PON", IEEE Photonics Technol. Lett.,vol.28,no.21,pp.2359- 2362, Nov. 1, 2016. [4]. N. Jiang, D. Liu, C. Zhang and K. Qiu, "Modeling and Simulation of Chaos-Based Security-Enhanced WDM-PON", IEEE Photonics Technol. Lett., vol. 25, no. 19, pp.1912-1915, Oct. 1, 2013. [5] M. Cheng, L. Deng, X. Gao, H. Li, M. Tang, S. Fu, P. Shum and D. Liu, "Enhanced Secure Strategy for OFDM-PON System by UsingHyperchaotic SystemandFractional Fourier Transformation ", IEEE Photonics J., vol. 6, no. 6, Dec. 2014, Art. no. 7903409. [6]. Z. Shen, X. Yang, H. He and W. Hu, "Secure Transmission of Optical DFT-S-OFDM Data Encrypted by Digital Chaos", IEEE Photonics J., vol. 8, no. 3, Jun. 2016, Art. no. 7904609. [7] W. Zhang, C. Zhang, C. Chen, H. Zhang and K. Qiu, "Brownian Motion Encryption for Physical-Layer Security Improvement in CO-OFDM-PON", IEEE Photonics Technol. Lett., vol. 29, no. 12, pp. 1023-1026, Jun. 15, 2017. [8] L. Zhang, X. Xin, B. Liu and X. Yin, "Physical secure enhancement in optical OFDMA-PON based on two- dimensional scrambling", Opt. Exp., vol. 20, no. 26, pp. B32- B37, Nov. 2012. [9] C. Zhang, W. Zhang, C. Chen, X. He and K. Qiu, "Physical- enhanced Secure Strategy for OFDMA-PON Using Chaos and Deoxyribonucleic Acid Encoding."J.Lightw.Technol.,vol. 36, no. 9, pp. 1707-1712, May 1, 2018. [10] J. Zhong, X. Yang and W. Hu, "Performance-Improved Secure OFDM Transmission Using Chaotic Active Constellation Extension", IEEE Photonics Technol. Lett., vol. 29, no. 12, pp. 991-994, Jun. 15, 2017. [11]. W. Zhang, C. Zhang, C. Chen, H. Zhang, W. Jin and K. Qiu, "Hybrid Chaotic Confusion and Diffusion for Physical Layer Security in OFDM-PON", IEEE Photonics J., vol. 9, no. 2, Apr. 2017, Art. no. 7201010. [12]. Gil-Ho Kim, Jong-Nam Kim, Gyeong-Yeon Cho, “An improved RC6 algorithm with the same structure of encryption and decryption”, Feb. 15-18, 2009 ICACT 2009. [13]. H. Feistel, “Cryptography and Computer Privacy,” Scientific American, Vol.228, No.5, pp. 15-23, 1973. [14]. C. E. Shannon, “Communication theory of secrecy system,” Bell System Technical Journal, Vol.28, No.4, pp.656- 715, 1949.
Download now