Beruflich Dokumente
Kultur Dokumente
Abstract:The increasing concerns regarding the the data into cryptographic cipher and then there by
security purposes led to the use of encryption during increasing more security by further processing it so that
the transmission of information. Encryption is the the information is more secured and hidden for the
process of converting information or data into a code, outer sources. Thus the data encryption standards are
especially to prevent authorized access. In this paper made by the agencies within contexts of a total security
we developed a three level data encryption process. A programs like security procedures, confidential
cryptography algorithm has implemented using the information, computer systems and network access
Verilog HDL language. This code employed shall controls [10-11].
encrypt the message data at three different levels on the
2. Encryption Methodology and Implementation
transmitter and receiver side to increase security. In this
paper we go for the three level encryption processes
where the encryption is made first by XORing data
with the key phases and then second hamming code and
finally bits shuffling for additional security. We have
used 8-bit data as input and got 13-bit encrypted data.
As we go for the higher level encryption we get the
higher level security for the information.
Key Words: - Encryption, XOR, Hamming code,
Shuffling, Verilog, FPGA.
1. Introduction
In this modern world where the technology is very
advanced and where its importance is enhanced and so
the protection of the information is very essential [1-3]. Figure 1. Flow chart of data encryption
The application of the technology selection and the In this paper, we have three levels. During our first
related safeguard procedures are important level, we take an 8-bit input data (as the binary data is
responsibilities of every prominent organisation in to be expressed as 2-Radix). Then we use QPSK
providing the sufficient security to its electronic data principle. In QPSK, the modulator shifts carrier to one
systems [4-6]. Thus we go for cryptography which is of four possible phases corresponding to the four
the manipulation of the actual message where the actual possible values of the input symbol. We are
message is sent with protection where the confidential implementing the quarter cycle implementation where
data is secured so that the actual content is deciphered the whole cycle of the signal is divided into four parts
by the right agencies. There are many methods for this with phases 45, 90,180 and 360 degrees.As QPSK
information transmission like bfsk, bpsk and qask but gives higher bandwidth, we have incorporated its
we use the principle of qpsk as it has got low bit principle in our encryption process. Now we convert
accuracy error rate and it also has the higher bandwidth the phases 45, 90,180 and 360 degrees into their binary
efficiency [7-9]. values as to be compatible with the input 8-bit binary
This proposed work specifies the quarter cycle data. Figure 1 shows the flow chart of data encryption
cryptographic algorithm methods. Protection of the process. The respective binary values are represented in
information during the transmission is very essential table1.
and also the integrity and the security of the data must
be enhanced while storing the data during the process. Table 1. binary value of phases and their respective
This algorithm explicitly defines the steps to transform selections
423
International Journal of Pure and Applied Mathematics Special Issue
Using input data we can calculate the parity value 3. Synthesis and Simulation Results
using the table 3. Finally we are getting a 13-bit Table 9 give the number of gates that have been used
hamming code data. Therefore the output of our second and the operations and the cycles also the error reports
level is the thirteen bit data. Further in our third level and also the utilisation and also the number of LUTs.
we divide the output of the second level data into five So this report helps us to get the entire details of the
blocks where first four blocks consists of 3 bits each devices used and their number. So we get the number
and the fifth block contains one bit as shown in the of devices or gates or LUTs placed in each level for
Table 4. the performance of the project.
Table 4. Representation of block division of 13-bit data Table 9.Logic utilization table of different phases
424
International Journal of Pure and Applied Mathematics Special Issue
Figure 2 Simulation waveforms of Encryption process [2] Indra Raj Sharma, Vipin Gupta Comparative
Analysis of DES and S-DES, Encryption Algorithm
Thus from step1 output we understand the data bits Using Verilog Coding, International Journal of
d[7:0] which are 8 bit binary numbers are EXOR ed Innovative Research in Electrical, Electronics,
with the phases which are converted into binary bits Instrumentation and Control Engineering, Vol. 1,
dk[8:0] using selection lines s[1:0] where we get an Issue 9, December 2013, PP. 469-473.
exored output of y[8:0] as output.
[3] T. Narendra Babu, Fazal Noorbasha, M. Harita, N.
Tejashree and K. Vamsi Krishna, FPGA
Implementation of High Speed Error Detection
and Correction of Orthogonal Codes using
Figure 3. Simulation waveforms of Hamming code Segmentation Method, Indian Journal of Science
process and Technology, Vol 9(30), August 2016, PP. 1-7.
In step 2 we get the output c[13:1] of 13 binary bits by
applying hamming code to the input which is the output [4] P. M. Durai Raj Vincent, Syed Amber Iqbal, Karan
of the step 1 and then they are converted into 13 bit Bhagat and Kamal Kant Kushwaha,
output by adding parity bits to the input d[9:1] by using Cryptography: a Mathematical Approach, Indian
selection lines s[1:0]. Journal of Science and Technology, Vol 6(12),
December 2013, PP 56075611.
425
International Journal of Pure and Applied Mathematics Special Issue
426
427
428