SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 219
Cryptographic Communication between Two ESP32 Devices
Jenish Rudani1, Daksh Khorana2, Yagnesh Savaliya3
1-3Student, Dharmsinh Desai University (DDU), Nadiad, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Embedded Systems are widely used in virtually
every industry all over the world. The low footprint allows
such systems to be tailor made for the set of specific tasks and
are relatively cheap to manufacture. Contemporary research
in security at application level has introduced multiple
amelioration over traditional techniques. However,embedded
system is a laggard in this regard. In this paper, we introduce
communication technique between two ESP32 IoT devices,
which is secured by RSA-256 cryptography algorithm.
Key Words: Embedded Systems, ESP32, IoT, RSA256,
Cryptography
1. INTRODUCTION
2020 decade is going to bring vast majority of IoT devices
from handheld kitchen appliances, wearables to heavy
industrial tools, and military duty devices able to withstand
extreme Earth Conditions. With ever increasing amount of
IoT device, the major concern is of privacy. Although many
areas are now further secured by better, secure and reliable
software systems, EmbeddedDevices arelaggingbehind due
to limited set of specifications, which doesn’t always allow
such complex cryptosystems to be implementedonmemory
constraint embedded devices. This paper exploresoneofthe
cryptosystem RSA which is considered highly secure and
reliable system on an inexpensive and famous IoT device
ESP-32.
1.1 What is RSA?
RSA stands for “Rivest–Shamir–Adleman”, it is a
cryptographic algorithm used by most modern computersto
encrypt and decryptmessagesorinformation.RSAfollowsan
asymmetric key pattern that allows users to have two
different keys, a public key and a private key [1]. The public
key can be given to anyone to encrypt the message, whereas
the private key can be kept with the intended decryptor of
the message.
Once the message has beenencryptedwiththepublickey,
it can only be decrypted with a private key, due to the math
behind the algorithm.
1.2 Where is RSA Algorithm used?
The RSA algorithm is not used to encrypt the messages
directly as it is a heavy algorithm and requires more
computational power than symmetric key encryption. So,
RSA is used with some other encrypting algorithm to make
use of its complexity. The file or message is generally
encrypted with a symmetric key and the symmetric key is
then encrypted with RSA.
RSA was one of the first keys to be widely used as public
encryption keys and so it laid the foundation in secure
communication we use today. It was first used in TLS and
also the first algorithm to be used for PGP encryption.
These days RSA is majorly used for digital signature
authentication, emails and VNC software. RSA plays an
important role in VPN as there are multiple handshakes
while initiating a secure connection in a VPN, and these
handshakes are secured by RSA. RSA is quite often
implemented in wolfCrypt, cryptlib, and a number of other
crypto libraries.
2. The Algorithm
The algorithm works in a certain wayofprimesandmodulus.
1. Two prime numbers p & q are to be selected.
2. We find the product n= p x q.
3. A totient is calculated as : ɸ(n) = (p - 1) ( q - 1)
a. An integer is selected such that it lies
between 1 < ϵ<ɸ(n)such that ϵ is co-prime.
b. The ϵ is a public key exponent.
4. d is computed to satisfy the congruencerelation.Itis
the private key exponent
a. d is calculated as : d = ( 1 + x(ɸ(n))/ϵ : for
some integer x .
b. d should satisfy the condition gcd(ɸ, ϵ) =
ɸ(x) + ϵ y = 1 [2]
5. For encrypting the message m
a. c = mϵ mod n
b. Here c is the encrypted message and m is
the original message.
6. For decrypting the message c
a. med = m mod pq (Applying Chinese
remainder theorem we yield these two
congruences.)
b. cd = m mod n
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 220
c. m = cd mod n (Here m is obtained as a
decrypted message.)
Example:
Note for the ease of understanding we would be taking
smaller prime numbers for p and q.
 p=3 , q=11
 Following above steps, we get:
o n = 33
o ɸ(n)= 20
o ϵ = 19
o d = 19
 The message m here is 3:
o The cipher text would be c = mϵ mod n
o c = 319 mod 33
o c = 15 (Encrypted Message)
 To decrypt the message, we use the following:
o cd = m mod n
o m = cd mod n
o 1519 mod 33 = 3
o m = 3 (Decrypted Message)
We looked at a simple RSA algorithm to encrypt a number
message “3” and the encrypted message we derived is 15,
and as we further proceed with decryption, we finally
calculated the original message to be 3. This example
demonstrates a basic RSA Encryption/Decryptionbutinreal
world the keys are much longer, the prime values are much
longer. So there are different RSA algorithms available, and
depending upon system specification such as processing
speed, RAM and ROM, we would choose one out of RSA-256,
RSA-512, RSA-1024, RSA-2048 and so on. We have chosen
RSA-256 algorithm for this paper[3].
2. What is IoT?
IoT or Internet of Things is a system of interrelated devices
or gadgets that communicate with each other over wireless
internet without intervention of a human. The things or
gadgets here can be defined as devices that are capable of
recording and transmitting data via embedded devices such
as Kitchen appliances, cars, thermostats, Air Conditioners,
Lights, Televisions, and many more.
The range of devices are not just limited to consumer
products; these are more proficiently implemented in
industries to automate the tasks. The emergence of IoT
devices has been more prolific in this era of time because of
the following things:
 Access to low cost and low power consuming
sensors.
 Read access to internet
 A central hub to process the commands.
IoT is used to improve the life of humans and ease the
redundant tasks as it helps the users have a all in one
control, that would enable themtodothephysical tasks such
as setting up temperature, or have the lightsturnonoroff by
detecting the presence of humans. The smart devices are
connected to one central hub which processes and handles
the command distribution to the node devices (IoT), and
further using MachineLearningandArtificial Intelligence the
use case scenario of these devices cannot be bound by any
metrics.
2.1 Security Issue Faced in IoT
The devices connected in the IoT ecosystem are not
equipped with efficient security measures making them
vulnerable to security attacks such as data leak, override
controls, and the authenticity of the message.
The IoT devices are not yet implemented to transmit data
securely as the computational power and the bandwidth
required by the devices to transmit data securely are not yet
implemented successfully.
The preventive side to be taken where confidentiality of the
data is at utmost priority is in the field of Home Automation,
here we will discuss some of the security issues faced by
home automation products.
 Privacy attacks
o The smart home devices are the most
susceptible platform for attackers as
private information is shared in these
networks, so an encrypted channel is a
must for the devices being used in a home
as there are a lot of private messages
floating over the network.
 DDoS Attacks
o The attacker can take down the network
and infiltrate it by sending PoD(Ping of
Death) messages to gain access to the
network or even disable certain security
devices.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 221
 Masquerade
o The attacker can masquerade as an
authorized device as there is no system
check maintained to check the authenticity
of the device.
2.2. Why is ESP32 Preferred for consumer IoT?
The ESP32 is a low power, low cost SoC(System on a Chip)
device which contains a built-in Wifi and Bluetooth module.
The SoC comes in two variants, one is single core and one in
dual core model to handle the processing of the incoming
and outgoing data.
Here is a brief data sheet of ESP32:
ESP-32 DESCRIPTION
CORE 2 (Simultaneous Execution)
ARCHITECTURE 32 Bits
CLOCK Tensilica Xtensa LX106 (160-240
Mhz)
BLUETOOTH Yes - Classic & BLE
WIFI IEEE802.11 B/G/N
RAM 520 to 8192 Kb
FLASH Extern QSPI - 16MB
GPIO 22 Pins
ADC 18 Bit
INTERFACES SPI-I2C-UART-I2S-CAN
Table -1: Specifications of ESP32
NETWORK - The embedded Networking module in the
ESP32 providesfora moreclosedandmonitorednetworking
with the device, resulting in more secure and controlled
connections over a network, which instead with an external
networking adapter would lead to more possible point of
intrusions.
CPU - The included CPU in the device makes it easier to
process complex algorithms which we would be
implementing to encrypt and decrypt the messages shared
by using the ESP32.
P2P - The device can communicate directly with other ESP
devices using the IoT P2P connectivity.
WEB - The module can directly access and read the pages
written in XML or other developmental languages to verify
the authenticity or configuration of the connected device.
These peculiar features of the ESP32 make it a susceptible
chip to be used for fast prototyping and suitable for
consumer IoT. Also, the main reason behind using this
particular device to demonstrate Communication
Demonstrate by RSA-256 cryptography.
3. Flow Chart
Fig-1: Flowchart of the system
Above diagram describes the working model of this
system[4]. As per diagram, one ESP32 acts as a hub for the
experiment and rest of ESP32s from 1 to n acts as nodes
which actually communicates with the hub through
Bluetooth interface. This setup is ideal for an example home
automation application. Here, hub ESP32 first encrypts a
message according to application and transmits the
encrypted hash through Bluetooth peripheral and
subsequently at the node, ESP32 would decryptthemessage
using embedded public key. Here, the message encrypted by
hub ESP32 can only be decrypted by the public key of node
ESP32. This ensures the security of the entire system as to
even if the man in the middle attack happens, the attacker
would not have any means of decryptingthemessage,except
the brute force methods, which could take a long time.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072
© 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 222
However, there is one fault in this system, and that is one
could reverse engineer the ESP32itself,andbylookingat the
internal flash memory of ESP32, after careful analysis, it is
quite possible to retrieve the public and private key and the
security would be breached. To solve this problem, we used
flash encryption [5] and that ensures that it would be
extremely difficult to retrieve the public and private keys,
which further increases the security.
4. CONCLUSION
This paper presents a way to ameliorate security at low
overhead in Embedded Devices, specifically a famous IoT
device ESP32 using RSA-256algorithm.Itdescribesa system
which communicates under a secure, reliable and fast
cryptographic algorithm-RSA256. We analyzed the working
of RSA algorithm and understood it by an Example.
REFERENCES
[1] Wikipedia, (December, 2020). RSA (cryptosystem),
Available:
https://en.wikipedia.org/wiki/RSA_(cryptosystem)
[2] Machie, Edmond K. (29 March 2013). Network security
traceback attack and react in the United States
Department of Defense network. p. 167. ISBN 978-
1466985742.
[3] Heninger, Nadia (February 15, 2012). “New research:
There's no need to panic over factorable keys–justmind
your Ps and Qs”. Freedom to Tinker, Available PDF :
https://freedom-to-tinker.com/blog/nadiah/new-
research-theres-no-need-panic-over-factorable-keys-
just-mind-your-ps-and-qs
[4] RSA Algorithm Implementation C++ (November, 2020)
Available Source Code:
https://github.com/espressif/arduino-
esp32/blob/master/tools/sdk/include/mbedtls/mbedtl
s/rsa.h
[5] Espressif Documentation (November, 2020). “Flash
Encryption Security in ESP32”, Available Source Code:
https://docs.espressif.com/projects/esp-
idf/en/latest/esp32/security/flash-encryption.html

More Related Content

What's hot

The interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditionThe interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditioneSAT Publishing House
 
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.IRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...
IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...
IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...IRJET Journal
 
Wireless e-passport using smart card technology
Wireless e-passport using smart card technologyWireless e-passport using smart card technology
Wireless e-passport using smart card technologyIRJET Journal
 
Smart Home Automation using Wi-Fi
Smart Home Automation using Wi-FiSmart Home Automation using Wi-Fi
Smart Home Automation using Wi-Fiijtsrd
 
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...IRJET Journal
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET Journal
 
Bi directional visitor counter
Bi directional visitor counter Bi directional visitor counter
Bi directional visitor counter JanhviThombre
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
 
IRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart City
IRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart CityIRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart City
IRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart CityIRJET Journal
 
Covid-19 fever symptom detection based on IoT cloud
Covid-19 fever symptom detection based on IoT cloud Covid-19 fever symptom detection based on IoT cloud
Covid-19 fever symptom detection based on IoT cloud IJECEIAES
 
IRJET - Real Time Fuel Monitoring and Theft Detection System using IoT
IRJET  -  	  Real Time Fuel Monitoring and Theft Detection System using IoTIRJET  -  	  Real Time Fuel Monitoring and Theft Detection System using IoT
IRJET - Real Time Fuel Monitoring and Theft Detection System using IoTIRJET Journal
 

What's hot (19)

The interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic conditionThe interconnecting mechanism for monitoring regular domestic condition
The interconnecting mechanism for monitoring regular domestic condition
 
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
Environmental Monitoring using Wireless Sensor Networks (WSN) based on IOT.
 
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THINGCOMPARATIVE STUDY BETWEEN VARIOUS  PROTOCOLS USED IN INTERNET OF THING
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
 
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
 
IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...
IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...
IRJET- IoT based Waste Management System and Attendance Monitoring of Workers...
 
Wireless e-passport using smart card technology
Wireless e-passport using smart card technologyWireless e-passport using smart card technology
Wireless e-passport using smart card technology
 
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PIIMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
IMAGE PROCESSING BASED INTRUDER DETECTION USING RASPBERRY PI
 
Smart Home Automation using Wi-Fi
Smart Home Automation using Wi-FiSmart Home Automation using Wi-Fi
Smart Home Automation using Wi-Fi
 
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...Designing an Architecture  for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...IRJET- Home Automation System for Disable People using Bluetooth Technology a...
IRJET- Home Automation System for Disable People using Bluetooth Technology a...
 
SENSOR DATA COMMUNICATION TO THNIGSPEAK IOT PLATFORM USING RASPBERRY P
SENSOR DATA COMMUNICATION TO THNIGSPEAK  IOT PLATFORM USING RASPBERRY PSENSOR DATA COMMUNICATION TO THNIGSPEAK  IOT PLATFORM USING RASPBERRY P
SENSOR DATA COMMUNICATION TO THNIGSPEAK IOT PLATFORM USING RASPBERRY P
 
Bi directional visitor counter
Bi directional visitor counter Bi directional visitor counter
Bi directional visitor counter
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
 
IRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart City
IRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart CityIRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart City
IRJET- Wireless Sensor Network(WSN) Implementation in IoT based Smart City
 
Covid-19 fever symptom detection based on IoT cloud
Covid-19 fever symptom detection based on IoT cloud Covid-19 fever symptom detection based on IoT cloud
Covid-19 fever symptom detection based on IoT cloud
 
IRJET - Real Time Fuel Monitoring and Theft Detection System using IoT
IRJET  -  	  Real Time Fuel Monitoring and Theft Detection System using IoTIRJET  -  	  Real Time Fuel Monitoring and Theft Detection System using IoT
IRJET - Real Time Fuel Monitoring and Theft Detection System using IoT
 

Similar to IRJET - Cryptographic Communication between Two ESP32 Devices

Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.pptAliSalman110
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...IRJET Journal
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSIAEME Publication
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowiaemedu
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSamantha Randall
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 

Similar to IRJET - Cryptographic Communication between Two ESP32 Devices (20)

Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Internet of Things (IoT) Security using stream cipher.ppt
Internet of Things (IoT)  Security using stream cipher.pptInternet of Things (IoT)  Security using stream cipher.ppt
Internet of Things (IoT) Security using stream cipher.ppt
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Iot Security
Iot SecurityIot Security
Iot Security
 
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET-  	  Enhanced SIT Algorithm for Embedded SystemsIRJET-  	  Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKSA SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 
DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol DNA computing based stream cipher for internet of things using MQTT protocol
DNA computing based stream cipher for internet of things using MQTT protocol
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Iot
IotIot
Iot
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

IRJET - Cryptographic Communication between Two ESP32 Devices

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 219 Cryptographic Communication between Two ESP32 Devices Jenish Rudani1, Daksh Khorana2, Yagnesh Savaliya3 1-3Student, Dharmsinh Desai University (DDU), Nadiad, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Embedded Systems are widely used in virtually every industry all over the world. The low footprint allows such systems to be tailor made for the set of specific tasks and are relatively cheap to manufacture. Contemporary research in security at application level has introduced multiple amelioration over traditional techniques. However,embedded system is a laggard in this regard. In this paper, we introduce communication technique between two ESP32 IoT devices, which is secured by RSA-256 cryptography algorithm. Key Words: Embedded Systems, ESP32, IoT, RSA256, Cryptography 1. INTRODUCTION 2020 decade is going to bring vast majority of IoT devices from handheld kitchen appliances, wearables to heavy industrial tools, and military duty devices able to withstand extreme Earth Conditions. With ever increasing amount of IoT device, the major concern is of privacy. Although many areas are now further secured by better, secure and reliable software systems, EmbeddedDevices arelaggingbehind due to limited set of specifications, which doesn’t always allow such complex cryptosystems to be implementedonmemory constraint embedded devices. This paper exploresoneofthe cryptosystem RSA which is considered highly secure and reliable system on an inexpensive and famous IoT device ESP-32. 1.1 What is RSA? RSA stands for “Rivest–Shamir–Adleman”, it is a cryptographic algorithm used by most modern computersto encrypt and decryptmessagesorinformation.RSAfollowsan asymmetric key pattern that allows users to have two different keys, a public key and a private key [1]. The public key can be given to anyone to encrypt the message, whereas the private key can be kept with the intended decryptor of the message. Once the message has beenencryptedwiththepublickey, it can only be decrypted with a private key, due to the math behind the algorithm. 1.2 Where is RSA Algorithm used? The RSA algorithm is not used to encrypt the messages directly as it is a heavy algorithm and requires more computational power than symmetric key encryption. So, RSA is used with some other encrypting algorithm to make use of its complexity. The file or message is generally encrypted with a symmetric key and the symmetric key is then encrypted with RSA. RSA was one of the first keys to be widely used as public encryption keys and so it laid the foundation in secure communication we use today. It was first used in TLS and also the first algorithm to be used for PGP encryption. These days RSA is majorly used for digital signature authentication, emails and VNC software. RSA plays an important role in VPN as there are multiple handshakes while initiating a secure connection in a VPN, and these handshakes are secured by RSA. RSA is quite often implemented in wolfCrypt, cryptlib, and a number of other crypto libraries. 2. The Algorithm The algorithm works in a certain wayofprimesandmodulus. 1. Two prime numbers p & q are to be selected. 2. We find the product n= p x q. 3. A totient is calculated as : ɸ(n) = (p - 1) ( q - 1) a. An integer is selected such that it lies between 1 < ϵ<ɸ(n)such that ϵ is co-prime. b. The ϵ is a public key exponent. 4. d is computed to satisfy the congruencerelation.Itis the private key exponent a. d is calculated as : d = ( 1 + x(ɸ(n))/ϵ : for some integer x . b. d should satisfy the condition gcd(ɸ, ϵ) = ɸ(x) + ϵ y = 1 [2] 5. For encrypting the message m a. c = mϵ mod n b. Here c is the encrypted message and m is the original message. 6. For decrypting the message c a. med = m mod pq (Applying Chinese remainder theorem we yield these two congruences.) b. cd = m mod n
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 220 c. m = cd mod n (Here m is obtained as a decrypted message.) Example: Note for the ease of understanding we would be taking smaller prime numbers for p and q.  p=3 , q=11  Following above steps, we get: o n = 33 o ɸ(n)= 20 o ϵ = 19 o d = 19  The message m here is 3: o The cipher text would be c = mϵ mod n o c = 319 mod 33 o c = 15 (Encrypted Message)  To decrypt the message, we use the following: o cd = m mod n o m = cd mod n o 1519 mod 33 = 3 o m = 3 (Decrypted Message) We looked at a simple RSA algorithm to encrypt a number message “3” and the encrypted message we derived is 15, and as we further proceed with decryption, we finally calculated the original message to be 3. This example demonstrates a basic RSA Encryption/Decryptionbutinreal world the keys are much longer, the prime values are much longer. So there are different RSA algorithms available, and depending upon system specification such as processing speed, RAM and ROM, we would choose one out of RSA-256, RSA-512, RSA-1024, RSA-2048 and so on. We have chosen RSA-256 algorithm for this paper[3]. 2. What is IoT? IoT or Internet of Things is a system of interrelated devices or gadgets that communicate with each other over wireless internet without intervention of a human. The things or gadgets here can be defined as devices that are capable of recording and transmitting data via embedded devices such as Kitchen appliances, cars, thermostats, Air Conditioners, Lights, Televisions, and many more. The range of devices are not just limited to consumer products; these are more proficiently implemented in industries to automate the tasks. The emergence of IoT devices has been more prolific in this era of time because of the following things:  Access to low cost and low power consuming sensors.  Read access to internet  A central hub to process the commands. IoT is used to improve the life of humans and ease the redundant tasks as it helps the users have a all in one control, that would enable themtodothephysical tasks such as setting up temperature, or have the lightsturnonoroff by detecting the presence of humans. The smart devices are connected to one central hub which processes and handles the command distribution to the node devices (IoT), and further using MachineLearningandArtificial Intelligence the use case scenario of these devices cannot be bound by any metrics. 2.1 Security Issue Faced in IoT The devices connected in the IoT ecosystem are not equipped with efficient security measures making them vulnerable to security attacks such as data leak, override controls, and the authenticity of the message. The IoT devices are not yet implemented to transmit data securely as the computational power and the bandwidth required by the devices to transmit data securely are not yet implemented successfully. The preventive side to be taken where confidentiality of the data is at utmost priority is in the field of Home Automation, here we will discuss some of the security issues faced by home automation products.  Privacy attacks o The smart home devices are the most susceptible platform for attackers as private information is shared in these networks, so an encrypted channel is a must for the devices being used in a home as there are a lot of private messages floating over the network.  DDoS Attacks o The attacker can take down the network and infiltrate it by sending PoD(Ping of Death) messages to gain access to the network or even disable certain security devices.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 221  Masquerade o The attacker can masquerade as an authorized device as there is no system check maintained to check the authenticity of the device. 2.2. Why is ESP32 Preferred for consumer IoT? The ESP32 is a low power, low cost SoC(System on a Chip) device which contains a built-in Wifi and Bluetooth module. The SoC comes in two variants, one is single core and one in dual core model to handle the processing of the incoming and outgoing data. Here is a brief data sheet of ESP32: ESP-32 DESCRIPTION CORE 2 (Simultaneous Execution) ARCHITECTURE 32 Bits CLOCK Tensilica Xtensa LX106 (160-240 Mhz) BLUETOOTH Yes - Classic & BLE WIFI IEEE802.11 B/G/N RAM 520 to 8192 Kb FLASH Extern QSPI - 16MB GPIO 22 Pins ADC 18 Bit INTERFACES SPI-I2C-UART-I2S-CAN Table -1: Specifications of ESP32 NETWORK - The embedded Networking module in the ESP32 providesfora moreclosedandmonitorednetworking with the device, resulting in more secure and controlled connections over a network, which instead with an external networking adapter would lead to more possible point of intrusions. CPU - The included CPU in the device makes it easier to process complex algorithms which we would be implementing to encrypt and decrypt the messages shared by using the ESP32. P2P - The device can communicate directly with other ESP devices using the IoT P2P connectivity. WEB - The module can directly access and read the pages written in XML or other developmental languages to verify the authenticity or configuration of the connected device. These peculiar features of the ESP32 make it a susceptible chip to be used for fast prototyping and suitable for consumer IoT. Also, the main reason behind using this particular device to demonstrate Communication Demonstrate by RSA-256 cryptography. 3. Flow Chart Fig-1: Flowchart of the system Above diagram describes the working model of this system[4]. As per diagram, one ESP32 acts as a hub for the experiment and rest of ESP32s from 1 to n acts as nodes which actually communicates with the hub through Bluetooth interface. This setup is ideal for an example home automation application. Here, hub ESP32 first encrypts a message according to application and transmits the encrypted hash through Bluetooth peripheral and subsequently at the node, ESP32 would decryptthemessage using embedded public key. Here, the message encrypted by hub ESP32 can only be decrypted by the public key of node ESP32. This ensures the security of the entire system as to even if the man in the middle attack happens, the attacker would not have any means of decryptingthemessage,except the brute force methods, which could take a long time.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 01 | Jan 2021 www.irjet.net p-ISSN: 2395-0072 © 2021, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 222 However, there is one fault in this system, and that is one could reverse engineer the ESP32itself,andbylookingat the internal flash memory of ESP32, after careful analysis, it is quite possible to retrieve the public and private key and the security would be breached. To solve this problem, we used flash encryption [5] and that ensures that it would be extremely difficult to retrieve the public and private keys, which further increases the security. 4. CONCLUSION This paper presents a way to ameliorate security at low overhead in Embedded Devices, specifically a famous IoT device ESP32 using RSA-256algorithm.Itdescribesa system which communicates under a secure, reliable and fast cryptographic algorithm-RSA256. We analyzed the working of RSA algorithm and understood it by an Example. REFERENCES [1] Wikipedia, (December, 2020). RSA (cryptosystem), Available: https://en.wikipedia.org/wiki/RSA_(cryptosystem) [2] Machie, Edmond K. (29 March 2013). Network security traceback attack and react in the United States Department of Defense network. p. 167. ISBN 978- 1466985742. [3] Heninger, Nadia (February 15, 2012). “New research: There's no need to panic over factorable keys–justmind your Ps and Qs”. Freedom to Tinker, Available PDF : https://freedom-to-tinker.com/blog/nadiah/new- research-theres-no-need-panic-over-factorable-keys- just-mind-your-ps-and-qs [4] RSA Algorithm Implementation C++ (November, 2020) Available Source Code: https://github.com/espressif/arduino- esp32/blob/master/tools/sdk/include/mbedtls/mbedtl s/rsa.h [5] Espressif Documentation (November, 2020). “Flash Encryption Security in ESP32”, Available Source Code: https://docs.espressif.com/projects/esp- idf/en/latest/esp32/security/flash-encryption.html