SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 583
Mobile Communication Security using Encryption and Decryption
Uzmasaman Aejaz Chanderki
Trainee Engineer, Prasar Bharti, All India Radio, Mumbai.
---------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract - We live in a world where there are many secret
agencies, one of them are secret organization which taps our
telephonic calls. Over a million mobile phones of different
service provider are under the surveillance of a central
organization in India. Our private and important
conversation over phones is recorded. This privacy can be
secured by a security system. The proposed system is a
security solution which will retain and if necessary the
conversation can be made accessible to the Government
using Authentication protocol and Cryptography.
Keywords- Mobile Communication, Base Station, RF
signal, Transmitter, Receiver, Antenna, Cryptography,
Encryption, decryption, AES, CHAP, Authentication
protocols.
1. INTRODUCTION
Privacy of our data is a major concern nowadays. But
private conversations are no private anymore. Over more
than 6000 mobile phones are tapped in New Delhi. The
information obtained through this can be misused against
anyone. We never know what are the intention of the
hackers are. According to a law under the general
provision of section 5 of the India Telegraph Act. Due to
this provision it mobile tampering is held at large extends.
Fig: 1.1 Ordinary Mobile Communications.
An ordinary mobile communication working starts with
Mobile A calling Mobile B. the both can be anywhere in this
world. When A starts calling it scans for the best cell. The
base station further informs MTSO. MTSO verifies the SIM
card number, balance available, checks available channel.
If channel capacity is full then call drops or the call is
initiated. MTSO also checks the same factors of B as it
checked for A. If everything is clear it troughs the voice
channel between these two mobiles and rings the Mobile
B. Here the voice transmitted is not encrypted and secured.
It can be tampered, misused or manipulated by the hacker.
Fig: 1.2 Required Mobile Communications.
The required system should be designed in such a way that
the original voice data should only be with the people who
are communicating. Rest of the data transmission should
in encrypted form so that even if a hacker breaks in he
won’t be able to understand or decode the data. Such
strong encryption is done by Advance Encryption
Standard. Even though the data is encrypted the voice data
will still can be accessed by Government only through
strong authentication protocol known as CHAP.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 584
2. EXISTING MOBILE COMMUNICATION PROCESS
This block diagram is a general transmitter. The speech
signal is given to microphone. The audio signal which is
the output of microphone is given to the Preamplifier
which boosts the level of the modulating signal. The local
oscillator generates carrier signal which is modulated with
the modulating signal in a Modulator. The power amplifier
increases the power of signal makes it powerful enough to
be transmitted.
Fig 2.1 General block diagram of a transmitter.
The RF signal is then given to the antenna. This system has
no security. The data flow is as it is easy for hackers to
break in.
Fig: 2.2 General block diagram of a receiver
RF signal received will be amplified in an RF amplifier.
Mixer is a nonlinear circuit which will mix the amplified RF
signal and local frequency to produce intermediate
frequencies. The signal is then limited and demodulated
send to the speaker after power boosting. Hence in the
entire process we didn’t see any cryptography and the data
is out there without any security.
3. PROPOSED SYSTEM.
The working of the new transmitter and receiver will be
same but 2 new blocks will be added to increase the
security.
Fig: 2.3 Secured transmitter using Encryption
Voice recorder block is kept for legal purposes. Only
Government official will have the correct authentication to
access the voice recorder as and when it is needed. So that
the data’s originality is preserved even though it is
encrypted. Authentication protocol which will be used is
CHAP. Challenge Handshake Authentication Protocol is a
more secure procedure for connecting to a system. The
output of the voice recorder will be given to encryption
which will use AES.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 585
Fig: 2.4 AES Design
256-bit encryption is a data or file encryption technique
that makes use of a 256-bit key to encrypt and decrypt
data or files. It is one of the most secure and strongest
encryption methods after 128- and 192-bit encryption, and
is used in most modern encryption algorithms, protocols
and technologies including AES and SSL. It can encrypt
folder, file, mp3, audio even a single sentence. After
encryption the operation will be same as previous process.
An encrypted RF waves will be sent on air which will be
protected from hackers.
Fig: 2.4 Secured Receivers.
In receiver when encrypted signal is process in reversed
way of transmitter we get the same result signal we had at
the starting point of transmitter after encryption. This
same signal is decrypted again recorded. It is then given to
speaker of the receiver handset.
4. RESULT
CHAP Authentication protocol which will protect the
authenticity of voice recorded and its access.
Fig: 4.1 CHAP Authentication. (prototype)
AES encryption and decryption which are used in
transmitter and receiver.
Fig: 4.2 AES Encryption & Decryption (prototype)
5. CONCLUSION
This proposal is simple, practical yet cost effective.
Hardware changes are minimal and affordable by every
service provider, mobile handset manufacturer. This
system can be made even more secured by adding
stronger protocol. Such systems are needed when highly
confidential conversation will take place like VVIP person,
military and so on. This can be implemented in telephone,
data call, voice calls.
REFERENCES
[1] P. Carroll, B. Fortz, M. Labbe, and S. McGarraghy,
“Improved Formulations for the Ring Spur Assignment
´ Problem,” in INOC 2011, Hamburg, Germany, pp. 24–
36, 2011.
[2] A. Merwaday and I. Guvenc, “UAV assisted
heterogeneous networks for public safety
communications,” in IEEE Wireless Communications
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 586
and Networking Conference Workshops, pp. 329–334,
2015.
[3] Understanding GPS: Principles and Applications
(Artech House Telecommunications Library), Elliott D.
Kaplan (Editor) / Hardcover / (1996)
[4] Alex Fares,”GSM systems engineering and network
management,” 2003.
[5] O. Fagbohun, "Comparative studies on 3G, 4G and 5G
wireless technology," IOSR Journal of Electronics and
Communication Engineering, vol. 9, pp. 88-94, 2014
[6] J. M. Keenan, A. J. Motley, Personal communication
radio coverage in buildings at 900 MHz and 1700 MHz,
ElectronicsLetters, 24(12), 1988, 763 – 764.
[7] D. C. Cox, 910 MHz urban mobile radio propagation:
Multipath characteristics in New York City, IEEE
Transactions on VehicularTechnology, 22(4), 1973,
104-110.
[8] T. S. Rappaport, S. Y. Seidel, Path loss prediction in
multi floored buildings at 914MHz. ElectronicsLetters,
27(15), 1991, 1384-1387.
[9] V. Duan, Electrocardiographicartifactdueto a mobile
phone mimicking ventricular tachycardia. Journal of
Electrocardiology, 47 (3), 2014, 33–34.
[10] M. Periyasamy, andR. Dhanasekaran, Evaluation of
electromagnetic interference between critical medical
devices and new generation cellular phones. Journal of
MicrowavePowerEnergy, 49 (3), 2015, 160–70.

More Related Content

What's hot

Comparison of 5 Wireless Communication Technologies
Comparison of 5 Wireless Communication TechnologiesComparison of 5 Wireless Communication Technologies
Comparison of 5 Wireless Communication TechnologiesAntenna Manufacturer Coco
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET Journal
 
Apresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no BrasilApresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no BrasilTI Safe
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...Mehraj U Din
 
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...IRJET Journal
 
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fiThe characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fizaidinvisible
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs BluetoothArun ACE
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityIOSR Journals
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationwayn
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
4g security presentation
4g security presentation4g security presentation
4g security presentationKyle Ly
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology Karun Kumar
 

What's hot (20)

Comparison of 5 Wireless Communication Technologies
Comparison of 5 Wireless Communication TechnologiesComparison of 5 Wireless Communication Technologies
Comparison of 5 Wireless Communication Technologies
 
IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
 
Narrowband internet of things technology
Narrowband internet of things technologyNarrowband internet of things technology
Narrowband internet of things technology
 
Apresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no BrasilApresentação Técnica - Infecções por Malware no Brasil
Apresentação Técnica - Infecções por Malware no Brasil
 
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
smart-home-automation-and-security-system-using-gsm-and-arm7-IJERTCONV5IS1800...
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...IRJET-  	  A Review on Intelligent Agriculture Service Platform with Lora Bas...
IRJET- A Review on Intelligent Agriculture Service Platform with Lora Bas...
 
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fiThe characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fi
 
6 NB-IoT Applications
6 NB-IoT Applications6 NB-IoT Applications
6 NB-IoT Applications
 
Wi-Fi vs Bluetooth
Wi-Fi vs BluetoothWi-Fi vs Bluetooth
Wi-Fi vs Bluetooth
 
Latest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless SecurityLatest Developments in WirelessNetworking and Wireless Security
Latest Developments in WirelessNetworking and Wireless Security
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
4g security presentation
4g security presentation4g security presentation
4g security presentation
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Characteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocolsCharacteristics of the 6 wireless protocols
Characteristics of the 6 wireless protocols
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology
 

Similar to IRJET- Mobile Communication Security using Encryption and Decryption

IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile DetectorIRJET Journal
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military OperationsIRJET Journal
 
IRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPSIRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPSIRJET Journal
 
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTStudy on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTIRJET Journal
 
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET Journal
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET Journal
 
A novel password based authentication technique for 4 g mobile communications
A novel password based authentication technique for 4 g mobile communicationsA novel password based authentication technique for 4 g mobile communications
A novel password based authentication technique for 4 g mobile communicationseSAT Journals
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...eSAT Publishing House
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityDustin Pytko
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMIRJET Journal
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possibleIJNSA Journal
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open networkeSAT Publishing House
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET Journal
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSIJNSA Journal
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationDr. Edwin Hernandez
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communicationardhita banu adji
 
The Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMasterThe Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMasterWoMaster
 

Similar to IRJET- Mobile Communication Security using Encryption and Decryption (20)

IRJET- Mobile Detector
IRJET-  	  Mobile DetectorIRJET-  	  Mobile Detector
IRJET- Mobile Detector
 
IRJET- Signal Jammer in Military Operations
IRJET-  	  Signal Jammer in Military OperationsIRJET-  	  Signal Jammer in Military Operations
IRJET- Signal Jammer in Military Operations
 
IRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPSIRJET- GSM based ATM Security System with GPS
IRJET- GSM based ATM Security System with GPS
 
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTStudy on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOT
 
B010331019
B010331019B010331019
B010331019
 
IRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRaIRJET - Range Enhancement of IoT Devices using LoRa
IRJET - Range Enhancement of IoT Devices using LoRa
 
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...IRJET-  	  Cryptographic Efficient Data Transmission in Defence Stations usin...
IRJET- Cryptographic Efficient Data Transmission in Defence Stations usin...
 
A novel password based authentication technique for 4 g mobile communications
A novel password based authentication technique for 4 g mobile communicationsA novel password based authentication technique for 4 g mobile communications
A novel password based authentication technique for 4 g mobile communications
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
Comprehensive survey of possible
Comprehensive survey of possibleComprehensive survey of possible
Comprehensive survey of possible
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound WavesIRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
IRJET- Data Transmission for Proximity Devices using Ultrasonic Sound Waves
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
Securing 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and VirtualizationSecuring 4G and LTE systems with Deep Learning and Virtualization
Securing 4G and LTE systems with Deep Learning and Virtualization
 
Security management systemofcellular_communication
Security management systemofcellular_communicationSecurity management systemofcellular_communication
Security management systemofcellular_communication
 
The Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMasterThe Ace of Smart City Construction. White Paper. WoMaster
The Ace of Smart City Construction. White Paper. WoMaster
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 

IRJET- Mobile Communication Security using Encryption and Decryption

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 583 Mobile Communication Security using Encryption and Decryption Uzmasaman Aejaz Chanderki Trainee Engineer, Prasar Bharti, All India Radio, Mumbai. ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract - We live in a world where there are many secret agencies, one of them are secret organization which taps our telephonic calls. Over a million mobile phones of different service provider are under the surveillance of a central organization in India. Our private and important conversation over phones is recorded. This privacy can be secured by a security system. The proposed system is a security solution which will retain and if necessary the conversation can be made accessible to the Government using Authentication protocol and Cryptography. Keywords- Mobile Communication, Base Station, RF signal, Transmitter, Receiver, Antenna, Cryptography, Encryption, decryption, AES, CHAP, Authentication protocols. 1. INTRODUCTION Privacy of our data is a major concern nowadays. But private conversations are no private anymore. Over more than 6000 mobile phones are tapped in New Delhi. The information obtained through this can be misused against anyone. We never know what are the intention of the hackers are. According to a law under the general provision of section 5 of the India Telegraph Act. Due to this provision it mobile tampering is held at large extends. Fig: 1.1 Ordinary Mobile Communications. An ordinary mobile communication working starts with Mobile A calling Mobile B. the both can be anywhere in this world. When A starts calling it scans for the best cell. The base station further informs MTSO. MTSO verifies the SIM card number, balance available, checks available channel. If channel capacity is full then call drops or the call is initiated. MTSO also checks the same factors of B as it checked for A. If everything is clear it troughs the voice channel between these two mobiles and rings the Mobile B. Here the voice transmitted is not encrypted and secured. It can be tampered, misused or manipulated by the hacker. Fig: 1.2 Required Mobile Communications. The required system should be designed in such a way that the original voice data should only be with the people who are communicating. Rest of the data transmission should in encrypted form so that even if a hacker breaks in he won’t be able to understand or decode the data. Such strong encryption is done by Advance Encryption Standard. Even though the data is encrypted the voice data will still can be accessed by Government only through strong authentication protocol known as CHAP.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 584 2. EXISTING MOBILE COMMUNICATION PROCESS This block diagram is a general transmitter. The speech signal is given to microphone. The audio signal which is the output of microphone is given to the Preamplifier which boosts the level of the modulating signal. The local oscillator generates carrier signal which is modulated with the modulating signal in a Modulator. The power amplifier increases the power of signal makes it powerful enough to be transmitted. Fig 2.1 General block diagram of a transmitter. The RF signal is then given to the antenna. This system has no security. The data flow is as it is easy for hackers to break in. Fig: 2.2 General block diagram of a receiver RF signal received will be amplified in an RF amplifier. Mixer is a nonlinear circuit which will mix the amplified RF signal and local frequency to produce intermediate frequencies. The signal is then limited and demodulated send to the speaker after power boosting. Hence in the entire process we didn’t see any cryptography and the data is out there without any security. 3. PROPOSED SYSTEM. The working of the new transmitter and receiver will be same but 2 new blocks will be added to increase the security. Fig: 2.3 Secured transmitter using Encryption Voice recorder block is kept for legal purposes. Only Government official will have the correct authentication to access the voice recorder as and when it is needed. So that the data’s originality is preserved even though it is encrypted. Authentication protocol which will be used is CHAP. Challenge Handshake Authentication Protocol is a more secure procedure for connecting to a system. The output of the voice recorder will be given to encryption which will use AES.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 585 Fig: 2.4 AES Design 256-bit encryption is a data or file encryption technique that makes use of a 256-bit key to encrypt and decrypt data or files. It is one of the most secure and strongest encryption methods after 128- and 192-bit encryption, and is used in most modern encryption algorithms, protocols and technologies including AES and SSL. It can encrypt folder, file, mp3, audio even a single sentence. After encryption the operation will be same as previous process. An encrypted RF waves will be sent on air which will be protected from hackers. Fig: 2.4 Secured Receivers. In receiver when encrypted signal is process in reversed way of transmitter we get the same result signal we had at the starting point of transmitter after encryption. This same signal is decrypted again recorded. It is then given to speaker of the receiver handset. 4. RESULT CHAP Authentication protocol which will protect the authenticity of voice recorded and its access. Fig: 4.1 CHAP Authentication. (prototype) AES encryption and decryption which are used in transmitter and receiver. Fig: 4.2 AES Encryption & Decryption (prototype) 5. CONCLUSION This proposal is simple, practical yet cost effective. Hardware changes are minimal and affordable by every service provider, mobile handset manufacturer. This system can be made even more secured by adding stronger protocol. Such systems are needed when highly confidential conversation will take place like VVIP person, military and so on. This can be implemented in telephone, data call, voice calls. REFERENCES [1] P. Carroll, B. Fortz, M. Labbe, and S. McGarraghy, “Improved Formulations for the Ring Spur Assignment ´ Problem,” in INOC 2011, Hamburg, Germany, pp. 24– 36, 2011. [2] A. Merwaday and I. Guvenc, “UAV assisted heterogeneous networks for public safety communications,” in IEEE Wireless Communications
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 586 and Networking Conference Workshops, pp. 329–334, 2015. [3] Understanding GPS: Principles and Applications (Artech House Telecommunications Library), Elliott D. Kaplan (Editor) / Hardcover / (1996) [4] Alex Fares,”GSM systems engineering and network management,” 2003. [5] O. Fagbohun, "Comparative studies on 3G, 4G and 5G wireless technology," IOSR Journal of Electronics and Communication Engineering, vol. 9, pp. 88-94, 2014 [6] J. M. Keenan, A. J. Motley, Personal communication radio coverage in buildings at 900 MHz and 1700 MHz, ElectronicsLetters, 24(12), 1988, 763 – 764. [7] D. C. Cox, 910 MHz urban mobile radio propagation: Multipath characteristics in New York City, IEEE Transactions on VehicularTechnology, 22(4), 1973, 104-110. [8] T. S. Rappaport, S. Y. Seidel, Path loss prediction in multi floored buildings at 914MHz. ElectronicsLetters, 27(15), 1991, 1384-1387. [9] V. Duan, Electrocardiographicartifactdueto a mobile phone mimicking ventricular tachycardia. Journal of Electrocardiology, 47 (3), 2014, 33–34. [10] M. Periyasamy, andR. Dhanasekaran, Evaluation of electromagnetic interference between critical medical devices and new generation cellular phones. Journal of MicrowavePowerEnergy, 49 (3), 2015, 160–70.