SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 245
Simulation based design and analysis of combined effect of various
data security techniques used during the transmission of 128-bit
digital data generated from 128-bit data generation unit written in
VHDL Code using Xilinx ISE 9.2i software
1Paresh Kumar Pasayat, Asst.Professor, IGIT Government Engineering College, Odisha, India
2
Sony Naik, M.Tech student, IGIT Government Engineering College, Odisha, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In the recent years, data security has become an
important issue due to the hacking of data. In order to
overcome this problem, a technique known as encryption has
come up as a solution, and plays an important role in
information security system. The desired 128-bit data is
encrypted using modified DES and Hamming (224,128) code
technique in addition to the use of modified iterated product
cipher to produce 256-bit encrypted data. As the proposed
design is having the combined effect of modified DES,
Hamming (224,128) code and modified iterated product
cipher data security techniques, the security level is very high
as compared to the design having individual data security
technique. Due to the increment of key size from 56-bits to
112-bits in modified DES, the design is more resistive to the
Brute-Force Attack. The other advantages of the proposed
work are: Confidentiality, Authentication and Integrity. This
can be used in the field of Automated teller machine (ATM)
transactions, Banking sector, Military sector and protecting
confidential company information. The proposedworkis done
by using VHDL language. The code is tested and simulated
using Xilinx ISE9.2i software.
Key Words: ALU (Arithmetic Logic Unit), Encryption,
Decryption, VHDL (Very High speed Integrated Circuit
Hardware Description Language).
1. INTRODUCTION
For the transmission of 128-bit digital data, the first
thing is to generate the data usingdatagenerationunit.
The data generation unit consistsofthreecomponents.
First componentisthecontrolunitwhichgeneratesthe
control signals. Second componentisthedatapathunit
which consists of one Arithmetic and Logic Unit (ALU)
and backup unit and the ALU performs different
operations based on the value of the control signal.
Third component is the memory unit which is used to
store the 128-bit data. The memory unit is controlled
by one chip enable signal (C). When the value of C is ‘1’,
then the memory unit gives output. It gives no output
when the value of C is ‘0’. When C=’0’, the result is
obtained from the backup unit. If the digital data is
transmitted directly without using encryption
technique, then there is more probability of hacking
and corruption of data by the attacker. Due to which,
the various data security techniques have been
designed by the designer to provide security to the
data. The transformation of original data into a data
which is not in the readable form is known as
encryption and the process of reversing it back to a
readable form is known as decryption. The proposed
design shows how the 128-bit data is transmitted into
space after doing encryption using modified DES and
Hamming (224,128) code techniques.
1.1 Project Model
Fig-1: Project Model of the proposed work
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 246
1.2 LOGIC USED IN THE PROPOSED DESIGN
The flow chart of the proposed design is given as follows:
Fig-2: Flow chart of the proposed design
The logic used in the modified DES encryption is given as
follows:
Fig-3: Flow chart of modified DES encryption
ROUND KEY GENERATOR:
KEY_OUT_1 <= KEY_IN(0) & KEY_IN(95 DOWNTO 1);
KEY_OUT_2 <= KEY_IN(1)& KEY_IN(0) & KEY_IN(95
DOWNTO 2);
KEY_OUT_3 <= KEY_IN(2) & KEY_IN(1)& KEY_IN(0) &
KEY_IN(95 DOWNTO 3);
KEY_OUT_4 <= KEY_IN(3) & KEY_IN(2) & KEY_IN(1)&
KEY_IN(0) & KEY_IN(95 DOWNTO 4);
KEY_OUT_5 <= NOT KEY_IN(95 DOWNTO 0);
KEY_OUT_6 <= NOT KEY_IN(95 DOWNTO 0);
KEY_OUT_7 <= NOT KEY_IN(95 DOWNTO 0);
KEY_OUT_8 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1);
KEY_OUT_9 <= KEY_IN(48) & KEY_IN(95 DOWNTO 1);
KEY_OUT_10 <= KEY_IN(41) & KEY_IN(95 DOWNTO 1);
KEY_OUT_11 <= KEY_IN(45) & KEY_IN(94 DOWNTO 1) &
KEY_IN(90);
KEY_OUT_12 <= KEY_IN(91) & KEY_IN(95 DOWNTO 1);
KEY_OUT_13 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1);
KEY_OUT_14 <= KEY_IN(46) & KEY_IN(95 DOWNTO 1);
KEY_OUT_15 <= KEY_IN(40) & KEY_IN(95 DOWNTO 1);
KEY_OUT_16 <= KEY_IN(1) & KEY_IN(95 DOWNTO 1);
Here KEY_IN is the 112-bit cipher keyandKEY_OUTisthe16
nos. of keys generated from the Round Key Generator.
The logic used for the implementation of thedifferent blocks
of modified DES is given as follows:
INITIAL PERMUTATION UNIT:
IPU_DATA_OUT(0) <= IPU_DATA_IN(127);
IPU_DATA_OUT(1) <= IPU_DATA_IN(126);
IPU_DATA_OUT(2) <= IPU_DATA_IN(125);
IPU_DATA_OUT(3) <= IPU_DATA_IN(124);
IPU_DATA_OUT(123 DOWNTO 4) <= IPU_DATA_IN(123
DOWNTO 4);
IPU_DATA_OUT(124) <= IPU_DATA_IN(3);
IPU_DATA_OUT(125) <= IPU_DATA_IN(2);
IPU_DATA_OUT(126) <= IPU_DATA_IN(1);
IPU_DATA_OUT(127) <= IPU_DATA_IN(0);
Here IPU_DATA_IN and IPU_DATA_OUTarethe128-bitinput
and output datas of the initial permutation block.
16 ROUNDS IN DES:
DES uses 16 rounds of operations. Each round consists
of following units performing different types operations.
BIT SEPERATOR UNIT:
The output of the initial permutation block is given to thebit
separator unit.
BS_OUT_DATA_ONE<=BS_IN_DATA(127 DOWNTO 64);
BS_OUT_DATA_TWO<=BS_IN_DATA(63 DOWNTO 0);
FIESTAL CIPHER UNITXOR UNIT:
The block diagram showing the Fiestal Cipher Unit is
given as follows:
Fig-4: Flow chart of Fiestal Cipher Unit
Then, the two outputs of the bit separator unit is giventothe
Fiestal Cipher Unit and the different performed are given as
follows.
S_EX_P_BOX_OUTPUT := FCU_IN_DATA( 31 DOWNTO 0) &
FCU_IN_DATA(63 DOWNTO 32) &
"00000000000000000000000000000000";
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 247
S_XOR_OUTPUT := S_EX_P_BOX_OUTPUT XOR KEY_INPUT;
S_SUBT_BOX_OUTPUT := S_XOR_OUTPUT(31 DOWNTO 0)
& S_XOR_OUTPUT(63 DOWNTO 32) & S_XOR_OUTPUT(95
DOWNTO 64);
FCU_OUT_DATA <= S_SUBT_BOX_OUTPUT(15 DOWNTO 0)
& S_SUBT_BOX_OUTPUT(31 DOWNTO 16) &
S_SUBT_BOX_OUTPUT(63 DOWNTO 32);
The different operations that are performed in the Fiestal
Cipher Unit are XOR operation, swapping operation, bit
append operation.
DES FUNCTION[F(R,KEY)]:
The different units of the DES function used in the Fiestal
Cipher is given as follows:
Fig-5: Flow chart of DES function used in the Fiestal Cipher
XOR UNIT:
XU_OUT_DATA <= XU_IN_DATA_ONE XOR
XU_IN_DATA_TWO;
SWAP UNIT:
SU_OUT_DATA_ONE <= SU_IN_DATA_TWO;
SU_OUT_DATA_TWO <= SU_IN_DATA_ONE;
BIT APPEND UNIT:
BAU_OUT_DATA <= BAU_IN_DATA_ONE &
BAU_IN_DATA_TWO;
There are 16 nos. of round in the modified DES and after the
completion of the round 16, the final permutation operation
is performed.
FINAL PERMUTATION:
FPU_DATA_OUT(0) <= FPU_DATA_IN(127);
FPU_DATA_OUT(1) <= FPU_DATA_IN(126);
FPU_DATA_OUT(2) <= FPU_DATA_IN(125);
FPU_DATA_OUT(3) <= FPU_DATA_IN(124);
FPU_DATA_OUT(123 DOWNTO 4) <= FPU_DATA_IN(123
DOWNTO 4);
FPU_DATA_OUT(124) <= FPU_DATA_IN(3);
FPU_DATA_OUT(125) <= FPU_DATA_IN(2);
FPU_DATA_OUT(126) <= FPU_DATA_IN(1);
FPU_DATA_OUT(127) <= FPU_DATA_IN(0);
Algorithm For Hamming (224,128) code Encryption Unit
Step 1
First, 128-bit data is divided into 32 nos. of words each
consisting of 4-bit data.
Step 2
The 7-bit Hamming (7,4) code encoding technique is applied
to each word. For each word, the encoding unit generates 7-bit
encoded data. The logic for implementing the Hamming code
technique is given as follows:
Suppose, the 4-bit data (B) to be encoded is B3B2B1B0 and
the 7-bit Hamming code (H) generated is
H6H5H4H3H2H1H0.
Here, the value for each bit of H is given as follows:
H6 = B3 xor B2 xor B0
H5 = B3 xor B1 xor B0
H4 = B2 xor B1 xor B0
H3 = B3
H2 = B2
H1 = B1
H0 = B0
Step 3
After that the Hamming codes corresponding to each word are
appended to form the desired 224-bit encoded data.
The block diagram showing the encryption process using the
above algorithm is shown as follows:
Fig-6: Block diagram Hamming (224,128) code Encryption
Unit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 248
Flow chart for modified iterated product cipher
unit:
Fig-7 Flow chart of the modified iterated product cipher
Each product cipher unit is having the following flow chart:
Fig-8 Flow chart of the product cipher unit
Where i varies from 1 to 4.
2. RESULTS AND DISCUSSION
The VHDL code of the proposed project is compiled,
synthesized and simulated using Xilinx ISE 9.2i software and
the desired results have been obtained.
The simulation result of the 128-bit digital data generation unit
is given as follows:
Fig-9: Simulation result of data generation unit for C=’0’
Fig-10: Simulation result of data generation unit for C=’1’
The simulation result of the 128-bit digital data given to the DES
encryption block to produce 128-bit middle data is shown as
follows:
Fig-11: Simulation result of modified DES encryption block
The simulation result of the 128-bit middle data given to the
Hamming (224,128) code encryption block to produce 224-bit
encrypted data is shown as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 249
Fig-12: Simulation result of modified Hamming (224,128)
code encryption block
The simulation result of the 224-bit to 256-bit converter is
given as follows:
Fig-13: Simulation result of 224-bit to 256-bit converter
The simulation result of modified iterated product cipher
unit is given as follows:
Fig-14: Simulation result modified iterated product cipher
The comparison study has been done based on the
maximum combinational path delays of different data
security algorithms obtained from the Xilinx software
written VHDL code which is shown as follows:
Table -1: Comparison study
3. CONCLUSIONS
The data generation unit is able to generate the 128-
bit digital data as per the requirement and it is fed to the
data security unit for its encryption. As the proposed design
is having the combined effect of modified DES,Hamming
(224,128) code and modified iterated product cipher data
security techniques, the security level is very high as
compared to the design having individual data security
technique. Due to the use of 128-bit key size in modified
iterated product cipher and the enhancement of key size in
modified DES from 56-bits to 112-bits, the design is having
more immunity towards the Brute-Force Attack.
REFERENCES
[1] W.Stallings,“Cryptography and Network Security”, 2nd
Edition, Prentice Hall.
[2] Christof Paar, Jan Pelzl, "The Data Encryption Standard
(DES) and Alternatives", "Understanding Cryptography",
Springer.
[3] Bruce Schneir: Applied Cryptography, 2nd edition, John
Wiley & Sons.
[4] A.Litwin, “Cryptography and Network Security” LOS
Alamitos,CA:IEEE computer society press.
[5] Douglas L. Perry. “VHDL Programming by Examples”,
TMH.
[6] Hamacher, Vranesic, and Zaky. Computer Organization,
5th edition, New York: McGraw-Hill Companies.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 250
[7] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData
Encryption Standard using time variable permutations”,
International Conference on Microelectronics
(ICM),IEEE,pp.126-129,2015.
[8] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar
, ”An efficient VLSI architecture for data encryptionstandard
and its FPGA implementation”,VLSISATA,IEEEInternational
Conference,pp.1-5,2016.
[9] Ramadhan J. Mstafa; Khaled M. Elleithy, ”A highly secure
video steganography using Hamming code (7, 4)”, Systems,
Applications and Technology Conference (LISAT), IEEE
Conference,pp.1-6,2014.
[10] B.A. Farouzan, “Cryptography and Network Security”,
Tata McGraw Hill Publication.
[11] W.Diffie; M.E.Hell man, “ New Directions in
Cryptography” ,IEEE transaction theory, Nov, pp 644-654.
[12] RanjanBose, “Information Theory, Coding and
Cryptography” , chapter-8 .
[13] Ke Wang ,“ An encrypt and decrypt algorithm
implementationonFPGAS”,IEEE,Departmentofinformation
engineering, 2009.
[14] Garfinkel, S.L, “Public Key Cryptography” , Computer,
IEEE, Volume: 29, Issue:6.
[15] H. Lee Kwang , “ Basic Encryption and Decryption” ,
Computer and Electrical.

More Related Content

Similar to Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software

IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET Journal
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...IRJET Journal
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET Journal
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONcscpconf
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...IRJET Journal
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...IRJET Journal
 
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...IRJET Journal
 
IEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdfIEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdffanov8
 
IRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior CitizensIRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior CitizensIRJET Journal
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...eSAT Publishing House
 
Software control systems for smart antenna
Software control systems for smart antennaSoftware control systems for smart antenna
Software control systems for smart antennaeSAT Journals
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...IRJET Journal
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...rahulmonikasharma
 
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITSENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITSIRJET Journal
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using SteganographyIRJET Journal
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationIRJET Journal
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationIRJET Journal
 

Similar to Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software (20)

IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
 
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
 
IEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdfIEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdf
 
IRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior CitizensIRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior Citizens
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
Software control systems for smart antenna
Software control systems for smart antennaSoftware control systems for smart antenna
Software control systems for smart antenna
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
 
G05124550
G05124550G05124550
G05124550
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...
 
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITSENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
 
SMART LATHE MACHINE
SMART LATHE MACHINESMART LATHE MACHINE
SMART LATHE MACHINE
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 

Recently uploaded (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 245 Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software 1Paresh Kumar Pasayat, Asst.Professor, IGIT Government Engineering College, Odisha, India 2 Sony Naik, M.Tech student, IGIT Government Engineering College, Odisha, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In the recent years, data security has become an important issue due to the hacking of data. In order to overcome this problem, a technique known as encryption has come up as a solution, and plays an important role in information security system. The desired 128-bit data is encrypted using modified DES and Hamming (224,128) code technique in addition to the use of modified iterated product cipher to produce 256-bit encrypted data. As the proposed design is having the combined effect of modified DES, Hamming (224,128) code and modified iterated product cipher data security techniques, the security level is very high as compared to the design having individual data security technique. Due to the increment of key size from 56-bits to 112-bits in modified DES, the design is more resistive to the Brute-Force Attack. The other advantages of the proposed work are: Confidentiality, Authentication and Integrity. This can be used in the field of Automated teller machine (ATM) transactions, Banking sector, Military sector and protecting confidential company information. The proposedworkis done by using VHDL language. The code is tested and simulated using Xilinx ISE9.2i software. Key Words: ALU (Arithmetic Logic Unit), Encryption, Decryption, VHDL (Very High speed Integrated Circuit Hardware Description Language). 1. INTRODUCTION For the transmission of 128-bit digital data, the first thing is to generate the data usingdatagenerationunit. The data generation unit consistsofthreecomponents. First componentisthecontrolunitwhichgeneratesthe control signals. Second componentisthedatapathunit which consists of one Arithmetic and Logic Unit (ALU) and backup unit and the ALU performs different operations based on the value of the control signal. Third component is the memory unit which is used to store the 128-bit data. The memory unit is controlled by one chip enable signal (C). When the value of C is ‘1’, then the memory unit gives output. It gives no output when the value of C is ‘0’. When C=’0’, the result is obtained from the backup unit. If the digital data is transmitted directly without using encryption technique, then there is more probability of hacking and corruption of data by the attacker. Due to which, the various data security techniques have been designed by the designer to provide security to the data. The transformation of original data into a data which is not in the readable form is known as encryption and the process of reversing it back to a readable form is known as decryption. The proposed design shows how the 128-bit data is transmitted into space after doing encryption using modified DES and Hamming (224,128) code techniques. 1.1 Project Model Fig-1: Project Model of the proposed work
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 246 1.2 LOGIC USED IN THE PROPOSED DESIGN The flow chart of the proposed design is given as follows: Fig-2: Flow chart of the proposed design The logic used in the modified DES encryption is given as follows: Fig-3: Flow chart of modified DES encryption ROUND KEY GENERATOR: KEY_OUT_1 <= KEY_IN(0) & KEY_IN(95 DOWNTO 1); KEY_OUT_2 <= KEY_IN(1)& KEY_IN(0) & KEY_IN(95 DOWNTO 2); KEY_OUT_3 <= KEY_IN(2) & KEY_IN(1)& KEY_IN(0) & KEY_IN(95 DOWNTO 3); KEY_OUT_4 <= KEY_IN(3) & KEY_IN(2) & KEY_IN(1)& KEY_IN(0) & KEY_IN(95 DOWNTO 4); KEY_OUT_5 <= NOT KEY_IN(95 DOWNTO 0); KEY_OUT_6 <= NOT KEY_IN(95 DOWNTO 0); KEY_OUT_7 <= NOT KEY_IN(95 DOWNTO 0); KEY_OUT_8 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1); KEY_OUT_9 <= KEY_IN(48) & KEY_IN(95 DOWNTO 1); KEY_OUT_10 <= KEY_IN(41) & KEY_IN(95 DOWNTO 1); KEY_OUT_11 <= KEY_IN(45) & KEY_IN(94 DOWNTO 1) & KEY_IN(90); KEY_OUT_12 <= KEY_IN(91) & KEY_IN(95 DOWNTO 1); KEY_OUT_13 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1); KEY_OUT_14 <= KEY_IN(46) & KEY_IN(95 DOWNTO 1); KEY_OUT_15 <= KEY_IN(40) & KEY_IN(95 DOWNTO 1); KEY_OUT_16 <= KEY_IN(1) & KEY_IN(95 DOWNTO 1); Here KEY_IN is the 112-bit cipher keyandKEY_OUTisthe16 nos. of keys generated from the Round Key Generator. The logic used for the implementation of thedifferent blocks of modified DES is given as follows: INITIAL PERMUTATION UNIT: IPU_DATA_OUT(0) <= IPU_DATA_IN(127); IPU_DATA_OUT(1) <= IPU_DATA_IN(126); IPU_DATA_OUT(2) <= IPU_DATA_IN(125); IPU_DATA_OUT(3) <= IPU_DATA_IN(124); IPU_DATA_OUT(123 DOWNTO 4) <= IPU_DATA_IN(123 DOWNTO 4); IPU_DATA_OUT(124) <= IPU_DATA_IN(3); IPU_DATA_OUT(125) <= IPU_DATA_IN(2); IPU_DATA_OUT(126) <= IPU_DATA_IN(1); IPU_DATA_OUT(127) <= IPU_DATA_IN(0); Here IPU_DATA_IN and IPU_DATA_OUTarethe128-bitinput and output datas of the initial permutation block. 16 ROUNDS IN DES: DES uses 16 rounds of operations. Each round consists of following units performing different types operations. BIT SEPERATOR UNIT: The output of the initial permutation block is given to thebit separator unit. BS_OUT_DATA_ONE<=BS_IN_DATA(127 DOWNTO 64); BS_OUT_DATA_TWO<=BS_IN_DATA(63 DOWNTO 0); FIESTAL CIPHER UNITXOR UNIT: The block diagram showing the Fiestal Cipher Unit is given as follows: Fig-4: Flow chart of Fiestal Cipher Unit Then, the two outputs of the bit separator unit is giventothe Fiestal Cipher Unit and the different performed are given as follows. S_EX_P_BOX_OUTPUT := FCU_IN_DATA( 31 DOWNTO 0) & FCU_IN_DATA(63 DOWNTO 32) & "00000000000000000000000000000000";
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 247 S_XOR_OUTPUT := S_EX_P_BOX_OUTPUT XOR KEY_INPUT; S_SUBT_BOX_OUTPUT := S_XOR_OUTPUT(31 DOWNTO 0) & S_XOR_OUTPUT(63 DOWNTO 32) & S_XOR_OUTPUT(95 DOWNTO 64); FCU_OUT_DATA <= S_SUBT_BOX_OUTPUT(15 DOWNTO 0) & S_SUBT_BOX_OUTPUT(31 DOWNTO 16) & S_SUBT_BOX_OUTPUT(63 DOWNTO 32); The different operations that are performed in the Fiestal Cipher Unit are XOR operation, swapping operation, bit append operation. DES FUNCTION[F(R,KEY)]: The different units of the DES function used in the Fiestal Cipher is given as follows: Fig-5: Flow chart of DES function used in the Fiestal Cipher XOR UNIT: XU_OUT_DATA <= XU_IN_DATA_ONE XOR XU_IN_DATA_TWO; SWAP UNIT: SU_OUT_DATA_ONE <= SU_IN_DATA_TWO; SU_OUT_DATA_TWO <= SU_IN_DATA_ONE; BIT APPEND UNIT: BAU_OUT_DATA <= BAU_IN_DATA_ONE & BAU_IN_DATA_TWO; There are 16 nos. of round in the modified DES and after the completion of the round 16, the final permutation operation is performed. FINAL PERMUTATION: FPU_DATA_OUT(0) <= FPU_DATA_IN(127); FPU_DATA_OUT(1) <= FPU_DATA_IN(126); FPU_DATA_OUT(2) <= FPU_DATA_IN(125); FPU_DATA_OUT(3) <= FPU_DATA_IN(124); FPU_DATA_OUT(123 DOWNTO 4) <= FPU_DATA_IN(123 DOWNTO 4); FPU_DATA_OUT(124) <= FPU_DATA_IN(3); FPU_DATA_OUT(125) <= FPU_DATA_IN(2); FPU_DATA_OUT(126) <= FPU_DATA_IN(1); FPU_DATA_OUT(127) <= FPU_DATA_IN(0); Algorithm For Hamming (224,128) code Encryption Unit Step 1 First, 128-bit data is divided into 32 nos. of words each consisting of 4-bit data. Step 2 The 7-bit Hamming (7,4) code encoding technique is applied to each word. For each word, the encoding unit generates 7-bit encoded data. The logic for implementing the Hamming code technique is given as follows: Suppose, the 4-bit data (B) to be encoded is B3B2B1B0 and the 7-bit Hamming code (H) generated is H6H5H4H3H2H1H0. Here, the value for each bit of H is given as follows: H6 = B3 xor B2 xor B0 H5 = B3 xor B1 xor B0 H4 = B2 xor B1 xor B0 H3 = B3 H2 = B2 H1 = B1 H0 = B0 Step 3 After that the Hamming codes corresponding to each word are appended to form the desired 224-bit encoded data. The block diagram showing the encryption process using the above algorithm is shown as follows: Fig-6: Block diagram Hamming (224,128) code Encryption Unit
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 248 Flow chart for modified iterated product cipher unit: Fig-7 Flow chart of the modified iterated product cipher Each product cipher unit is having the following flow chart: Fig-8 Flow chart of the product cipher unit Where i varies from 1 to 4. 2. RESULTS AND DISCUSSION The VHDL code of the proposed project is compiled, synthesized and simulated using Xilinx ISE 9.2i software and the desired results have been obtained. The simulation result of the 128-bit digital data generation unit is given as follows: Fig-9: Simulation result of data generation unit for C=’0’ Fig-10: Simulation result of data generation unit for C=’1’ The simulation result of the 128-bit digital data given to the DES encryption block to produce 128-bit middle data is shown as follows: Fig-11: Simulation result of modified DES encryption block The simulation result of the 128-bit middle data given to the Hamming (224,128) code encryption block to produce 224-bit encrypted data is shown as follows:
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 249 Fig-12: Simulation result of modified Hamming (224,128) code encryption block The simulation result of the 224-bit to 256-bit converter is given as follows: Fig-13: Simulation result of 224-bit to 256-bit converter The simulation result of modified iterated product cipher unit is given as follows: Fig-14: Simulation result modified iterated product cipher The comparison study has been done based on the maximum combinational path delays of different data security algorithms obtained from the Xilinx software written VHDL code which is shown as follows: Table -1: Comparison study 3. CONCLUSIONS The data generation unit is able to generate the 128- bit digital data as per the requirement and it is fed to the data security unit for its encryption. As the proposed design is having the combined effect of modified DES,Hamming (224,128) code and modified iterated product cipher data security techniques, the security level is very high as compared to the design having individual data security technique. Due to the use of 128-bit key size in modified iterated product cipher and the enhancement of key size in modified DES from 56-bits to 112-bits, the design is having more immunity towards the Brute-Force Attack. REFERENCES [1] W.Stallings,“Cryptography and Network Security”, 2nd Edition, Prentice Hall. [2] Christof Paar, Jan Pelzl, "The Data Encryption Standard (DES) and Alternatives", "Understanding Cryptography", Springer. [3] Bruce Schneir: Applied Cryptography, 2nd edition, John Wiley & Sons. [4] A.Litwin, “Cryptography and Network Security” LOS Alamitos,CA:IEEE computer society press. [5] Douglas L. Perry. “VHDL Programming by Examples”, TMH. [6] Hamacher, Vranesic, and Zaky. Computer Organization, 5th edition, New York: McGraw-Hill Companies.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 250 [7] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData Encryption Standard using time variable permutations”, International Conference on Microelectronics (ICM),IEEE,pp.126-129,2015. [8] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar , ”An efficient VLSI architecture for data encryptionstandard and its FPGA implementation”,VLSISATA,IEEEInternational Conference,pp.1-5,2016. [9] Ramadhan J. Mstafa; Khaled M. Elleithy, ”A highly secure video steganography using Hamming code (7, 4)”, Systems, Applications and Technology Conference (LISAT), IEEE Conference,pp.1-6,2014. [10] B.A. Farouzan, “Cryptography and Network Security”, Tata McGraw Hill Publication. [11] W.Diffie; M.E.Hell man, “ New Directions in Cryptography” ,IEEE transaction theory, Nov, pp 644-654. [12] RanjanBose, “Information Theory, Coding and Cryptography” , chapter-8 . [13] Ke Wang ,“ An encrypt and decrypt algorithm implementationonFPGAS”,IEEE,Departmentofinformation engineering, 2009. [14] Garfinkel, S.L, “Public Key Cryptography” , Computer, IEEE, Volume: 29, Issue:6. [15] H. Lee Kwang , “ Basic Encryption and Decryption” , Computer and Electrical.