SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 245
Simulation based design and analysis of combined effect of various
data security techniques used during the transmission of 128-bit
digital data generated from 128-bit data generation unit written in
VHDL Code using Xilinx ISE 9.2i software
1Paresh Kumar Pasayat, Asst.Professor, IGIT Government Engineering College, Odisha, India
2
Sony Naik, M.Tech student, IGIT Government Engineering College, Odisha, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In the recent years, data security has become an
important issue due to the hacking of data. In order to
overcome this problem, a technique known as encryption has
come up as a solution, and plays an important role in
information security system. The desired 128-bit data is
encrypted using modified DES and Hamming (224,128) code
technique in addition to the use of modified iterated product
cipher to produce 256-bit encrypted data. As the proposed
design is having the combined effect of modified DES,
Hamming (224,128) code and modified iterated product
cipher data security techniques, the security level is very high
as compared to the design having individual data security
technique. Due to the increment of key size from 56-bits to
112-bits in modified DES, the design is more resistive to the
Brute-Force Attack. The other advantages of the proposed
work are: Confidentiality, Authentication and Integrity. This
can be used in the field of Automated teller machine (ATM)
transactions, Banking sector, Military sector and protecting
confidential company information. The proposedworkis done
by using VHDL language. The code is tested and simulated
using Xilinx ISE9.2i software.
Key Words: ALU (Arithmetic Logic Unit), Encryption,
Decryption, VHDL (Very High speed Integrated Circuit
Hardware Description Language).
1. INTRODUCTION
For the transmission of 128-bit digital data, the first
thing is to generate the data usingdatagenerationunit.
The data generation unit consistsofthreecomponents.
First componentisthecontrolunitwhichgeneratesthe
control signals. Second componentisthedatapathunit
which consists of one Arithmetic and Logic Unit (ALU)
and backup unit and the ALU performs different
operations based on the value of the control signal.
Third component is the memory unit which is used to
store the 128-bit data. The memory unit is controlled
by one chip enable signal (C). When the value of C is ‘1’,
then the memory unit gives output. It gives no output
when the value of C is ‘0’. When C=’0’, the result is
obtained from the backup unit. If the digital data is
transmitted directly without using encryption
technique, then there is more probability of hacking
and corruption of data by the attacker. Due to which,
the various data security techniques have been
designed by the designer to provide security to the
data. The transformation of original data into a data
which is not in the readable form is known as
encryption and the process of reversing it back to a
readable form is known as decryption. The proposed
design shows how the 128-bit data is transmitted into
space after doing encryption using modified DES and
Hamming (224,128) code techniques.
1.1 Project Model
Fig-1: Project Model of the proposed work
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 246
1.2 LOGIC USED IN THE PROPOSED DESIGN
The flow chart of the proposed design is given as follows:
Fig-2: Flow chart of the proposed design
The logic used in the modified DES encryption is given as
follows:
Fig-3: Flow chart of modified DES encryption
ROUND KEY GENERATOR:
KEY_OUT_1 <= KEY_IN(0) & KEY_IN(95 DOWNTO 1);
KEY_OUT_2 <= KEY_IN(1)& KEY_IN(0) & KEY_IN(95
DOWNTO 2);
KEY_OUT_3 <= KEY_IN(2) & KEY_IN(1)& KEY_IN(0) &
KEY_IN(95 DOWNTO 3);
KEY_OUT_4 <= KEY_IN(3) & KEY_IN(2) & KEY_IN(1)&
KEY_IN(0) & KEY_IN(95 DOWNTO 4);
KEY_OUT_5 <= NOT KEY_IN(95 DOWNTO 0);
KEY_OUT_6 <= NOT KEY_IN(95 DOWNTO 0);
KEY_OUT_7 <= NOT KEY_IN(95 DOWNTO 0);
KEY_OUT_8 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1);
KEY_OUT_9 <= KEY_IN(48) & KEY_IN(95 DOWNTO 1);
KEY_OUT_10 <= KEY_IN(41) & KEY_IN(95 DOWNTO 1);
KEY_OUT_11 <= KEY_IN(45) & KEY_IN(94 DOWNTO 1) &
KEY_IN(90);
KEY_OUT_12 <= KEY_IN(91) & KEY_IN(95 DOWNTO 1);
KEY_OUT_13 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1);
KEY_OUT_14 <= KEY_IN(46) & KEY_IN(95 DOWNTO 1);
KEY_OUT_15 <= KEY_IN(40) & KEY_IN(95 DOWNTO 1);
KEY_OUT_16 <= KEY_IN(1) & KEY_IN(95 DOWNTO 1);
Here KEY_IN is the 112-bit cipher keyandKEY_OUTisthe16
nos. of keys generated from the Round Key Generator.
The logic used for the implementation of thedifferent blocks
of modified DES is given as follows:
INITIAL PERMUTATION UNIT:
IPU_DATA_OUT(0) <= IPU_DATA_IN(127);
IPU_DATA_OUT(1) <= IPU_DATA_IN(126);
IPU_DATA_OUT(2) <= IPU_DATA_IN(125);
IPU_DATA_OUT(3) <= IPU_DATA_IN(124);
IPU_DATA_OUT(123 DOWNTO 4) <= IPU_DATA_IN(123
DOWNTO 4);
IPU_DATA_OUT(124) <= IPU_DATA_IN(3);
IPU_DATA_OUT(125) <= IPU_DATA_IN(2);
IPU_DATA_OUT(126) <= IPU_DATA_IN(1);
IPU_DATA_OUT(127) <= IPU_DATA_IN(0);
Here IPU_DATA_IN and IPU_DATA_OUTarethe128-bitinput
and output datas of the initial permutation block.
16 ROUNDS IN DES:
DES uses 16 rounds of operations. Each round consists
of following units performing different types operations.
BIT SEPERATOR UNIT:
The output of the initial permutation block is given to thebit
separator unit.
BS_OUT_DATA_ONE<=BS_IN_DATA(127 DOWNTO 64);
BS_OUT_DATA_TWO<=BS_IN_DATA(63 DOWNTO 0);
FIESTAL CIPHER UNITXOR UNIT:
The block diagram showing the Fiestal Cipher Unit is
given as follows:
Fig-4: Flow chart of Fiestal Cipher Unit
Then, the two outputs of the bit separator unit is giventothe
Fiestal Cipher Unit and the different performed are given as
follows.
S_EX_P_BOX_OUTPUT := FCU_IN_DATA( 31 DOWNTO 0) &
FCU_IN_DATA(63 DOWNTO 32) &
"00000000000000000000000000000000";
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 247
S_XOR_OUTPUT := S_EX_P_BOX_OUTPUT XOR KEY_INPUT;
S_SUBT_BOX_OUTPUT := S_XOR_OUTPUT(31 DOWNTO 0)
& S_XOR_OUTPUT(63 DOWNTO 32) & S_XOR_OUTPUT(95
DOWNTO 64);
FCU_OUT_DATA <= S_SUBT_BOX_OUTPUT(15 DOWNTO 0)
& S_SUBT_BOX_OUTPUT(31 DOWNTO 16) &
S_SUBT_BOX_OUTPUT(63 DOWNTO 32);
The different operations that are performed in the Fiestal
Cipher Unit are XOR operation, swapping operation, bit
append operation.
DES FUNCTION[F(R,KEY)]:
The different units of the DES function used in the Fiestal
Cipher is given as follows:
Fig-5: Flow chart of DES function used in the Fiestal Cipher
XOR UNIT:
XU_OUT_DATA <= XU_IN_DATA_ONE XOR
XU_IN_DATA_TWO;
SWAP UNIT:
SU_OUT_DATA_ONE <= SU_IN_DATA_TWO;
SU_OUT_DATA_TWO <= SU_IN_DATA_ONE;
BIT APPEND UNIT:
BAU_OUT_DATA <= BAU_IN_DATA_ONE &
BAU_IN_DATA_TWO;
There are 16 nos. of round in the modified DES and after the
completion of the round 16, the final permutation operation
is performed.
FINAL PERMUTATION:
FPU_DATA_OUT(0) <= FPU_DATA_IN(127);
FPU_DATA_OUT(1) <= FPU_DATA_IN(126);
FPU_DATA_OUT(2) <= FPU_DATA_IN(125);
FPU_DATA_OUT(3) <= FPU_DATA_IN(124);
FPU_DATA_OUT(123 DOWNTO 4) <= FPU_DATA_IN(123
DOWNTO 4);
FPU_DATA_OUT(124) <= FPU_DATA_IN(3);
FPU_DATA_OUT(125) <= FPU_DATA_IN(2);
FPU_DATA_OUT(126) <= FPU_DATA_IN(1);
FPU_DATA_OUT(127) <= FPU_DATA_IN(0);
Algorithm For Hamming (224,128) code Encryption Unit
Step 1
First, 128-bit data is divided into 32 nos. of words each
consisting of 4-bit data.
Step 2
The 7-bit Hamming (7,4) code encoding technique is applied
to each word. For each word, the encoding unit generates 7-bit
encoded data. The logic for implementing the Hamming code
technique is given as follows:
Suppose, the 4-bit data (B) to be encoded is B3B2B1B0 and
the 7-bit Hamming code (H) generated is
H6H5H4H3H2H1H0.
Here, the value for each bit of H is given as follows:
H6 = B3 xor B2 xor B0
H5 = B3 xor B1 xor B0
H4 = B2 xor B1 xor B0
H3 = B3
H2 = B2
H1 = B1
H0 = B0
Step 3
After that the Hamming codes corresponding to each word are
appended to form the desired 224-bit encoded data.
The block diagram showing the encryption process using the
above algorithm is shown as follows:
Fig-6: Block diagram Hamming (224,128) code Encryption
Unit
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 248
Flow chart for modified iterated product cipher
unit:
Fig-7 Flow chart of the modified iterated product cipher
Each product cipher unit is having the following flow chart:
Fig-8 Flow chart of the product cipher unit
Where i varies from 1 to 4.
2. RESULTS AND DISCUSSION
The VHDL code of the proposed project is compiled,
synthesized and simulated using Xilinx ISE 9.2i software and
the desired results have been obtained.
The simulation result of the 128-bit digital data generation unit
is given as follows:
Fig-9: Simulation result of data generation unit for C=’0’
Fig-10: Simulation result of data generation unit for C=’1’
The simulation result of the 128-bit digital data given to the DES
encryption block to produce 128-bit middle data is shown as
follows:
Fig-11: Simulation result of modified DES encryption block
The simulation result of the 128-bit middle data given to the
Hamming (224,128) code encryption block to produce 224-bit
encrypted data is shown as follows:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 249
Fig-12: Simulation result of modified Hamming (224,128)
code encryption block
The simulation result of the 224-bit to 256-bit converter is
given as follows:
Fig-13: Simulation result of 224-bit to 256-bit converter
The simulation result of modified iterated product cipher
unit is given as follows:
Fig-14: Simulation result modified iterated product cipher
The comparison study has been done based on the
maximum combinational path delays of different data
security algorithms obtained from the Xilinx software
written VHDL code which is shown as follows:
Table -1: Comparison study
3. CONCLUSIONS
The data generation unit is able to generate the 128-
bit digital data as per the requirement and it is fed to the
data security unit for its encryption. As the proposed design
is having the combined effect of modified DES,Hamming
(224,128) code and modified iterated product cipher data
security techniques, the security level is very high as
compared to the design having individual data security
technique. Due to the use of 128-bit key size in modified
iterated product cipher and the enhancement of key size in
modified DES from 56-bits to 112-bits, the design is having
more immunity towards the Brute-Force Attack.
REFERENCES
[1] W.Stallings,“Cryptography and Network Security”, 2nd
Edition, Prentice Hall.
[2] Christof Paar, Jan Pelzl, "The Data Encryption Standard
(DES) and Alternatives", "Understanding Cryptography",
Springer.
[3] Bruce Schneir: Applied Cryptography, 2nd edition, John
Wiley & Sons.
[4] A.Litwin, “Cryptography and Network Security” LOS
Alamitos,CA:IEEE computer society press.
[5] Douglas L. Perry. “VHDL Programming by Examples”,
TMH.
[6] Hamacher, Vranesic, and Zaky. Computer Organization,
5th edition, New York: McGraw-Hill Companies.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 250
[7] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData
Encryption Standard using time variable permutations”,
International Conference on Microelectronics
(ICM),IEEE,pp.126-129,2015.
[8] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar
, ”An efficient VLSI architecture for data encryptionstandard
and its FPGA implementation”,VLSISATA,IEEEInternational
Conference,pp.1-5,2016.
[9] Ramadhan J. Mstafa; Khaled M. Elleithy, ”A highly secure
video steganography using Hamming code (7, 4)”, Systems,
Applications and Technology Conference (LISAT), IEEE
Conference,pp.1-6,2014.
[10] B.A. Farouzan, “Cryptography and Network Security”,
Tata McGraw Hill Publication.
[11] W.Diffie; M.E.Hell man, “ New Directions in
Cryptography” ,IEEE transaction theory, Nov, pp 644-654.
[12] RanjanBose, “Information Theory, Coding and
Cryptography” , chapter-8 .
[13] Ke Wang ,“ An encrypt and decrypt algorithm
implementationonFPGAS”,IEEE,Departmentofinformation
engineering, 2009.
[14] Garfinkel, S.L, “Public Key Cryptography” , Computer,
IEEE, Volume: 29, Issue:6.
[15] H. Lee Kwang , “ Basic Encryption and Decryption” ,
Computer and Electrical.

More Related Content

Viewers also liked (20)

IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft bodyIRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
IRJET Journal
 
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET Journal
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET Journal
 
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET- 	  A Design Implementation of Single Stage Amplifiers  using  HEMT Tec...IRJET- 	  A Design Implementation of Single Stage Amplifiers  using  HEMT Tec...
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET Journal
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET Journal
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
IRJET Journal
 
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud ComputingIRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET Journal
 
IRJET- Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET- 	  Sensrless Luenberger Observer Based Sliding Mode Control of DC MotorIRJET- 	  Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET- Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET Journal
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET Journal
 
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET Journal
 
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET-Securing Mobile Technology Of Gsm Using A5/1 AlgorithmIRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET Journal
 
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL AcceleratorIRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET Journal
 
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
IRJET- Review of Vapour Absorption System and Vapour Compression System.
IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.
IRJET- Review of Vapour Absorption System and Vapour Compression System.
IRJET Journal
 
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET Journal
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET Journal
 
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air EngineIRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET Journal
 
IRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft bodyIRJET-CFD Analysis of conceptual Aircraft body
IRJET-CFD Analysis of conceptual Aircraft body
IRJET Journal
 
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET-Second Throat Diffuser System at Different Back Pressure for High Altit...
IRJET Journal
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET Journal
 
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET- 	  A Design Implementation of Single Stage Amplifiers  using  HEMT Tec...IRJET- 	  A Design Implementation of Single Stage Amplifiers  using  HEMT Tec...
IRJET- A Design Implementation of Single Stage Amplifiers using HEMT Tec...
IRJET Journal
 
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...IRJET- 	  Assessment of Environmental Impacts during Operational Phase of a T...
IRJET- Assessment of Environmental Impacts during Operational Phase of a T...
IRJET Journal
 
IRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking AlgorithmIRJET-A Blind Watermarking Algorithm
IRJET-A Blind Watermarking Algorithm
IRJET Journal
 
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud ComputingIRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET-A Survey on Stealthy Denial of Service Strategy in Cloud Computing
IRJET Journal
 
IRJET- Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET- 	  Sensrless Luenberger Observer Based Sliding Mode Control of DC MotorIRJET- 	  Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET- Sensrless Luenberger Observer Based Sliding Mode Control of DC Motor
IRJET Journal
 
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting TechniqueIRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET-Reversible Image Watermarking Based on Histogram Shifting Technique
IRJET Journal
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET Journal
 
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET-Review Paper On Usage Of Ferrocement Panels In Lightweight Sandwich Con...
IRJET Journal
 
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET-Securing Mobile Technology Of Gsm Using A5/1 AlgorithmIRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET-Securing Mobile Technology Of Gsm Using A5/1 Algorithm
IRJET Journal
 
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL AcceleratorIRJET-ASIC Implementation for SOBEL Accelerator
IRJET-ASIC Implementation for SOBEL Accelerator
IRJET Journal
 
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET-Power Flow & Voltage Stability Analysis using MATLAB
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
IRJET- Review of Vapour Absorption System and Vapour Compression System.
IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.IRJET- 	  Review of Vapour Absorption System and Vapour Compression System.
IRJET- Review of Vapour Absorption System and Vapour Compression System.
IRJET Journal
 
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET-Design of Pile Foundation for site in Sangli district of Maharashtra: C...
IRJET Journal
 
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET- 	  Missing Value Evaluation in SQL Queries: A SurveyIRJET- 	  Missing Value Evaluation in SQL Queries: A Survey
IRJET- Missing Value Evaluation in SQL Queries: A Survey
IRJET Journal
 
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air EngineIRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET-A Review on Two Stroke Single Cylinder Compressed Air Engine
IRJET Journal
 
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for WatermarkingIRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET-Comparative Analysis of DCT and DWT based novel methods for Watermarking
IRJET Journal
 

Similar to IRJET- Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software (20)

IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET Journal
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
cscpconf
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
IRJET Journal
 
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET Journal
 
IEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdfIEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdf
fanov8
 
IRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior CitizensIRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET Journal
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
Software control systems for smart antenna
Software control systems for smart antennaSoftware control systems for smart antenna
Software control systems for smart antenna
eSAT Journals
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
IRJET Journal
 
G05124550
G05124550G05124550
G05124550
IOSR-JEN
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...
rahulmonikasharma
 
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITSENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
IRJET Journal
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
SMART LATHE MACHINE
SMART LATHE MACHINESMART LATHE MACHINE
SMART LATHE MACHINE
IRJET Journal
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
 
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
IRJET Journal
 
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET- Design and Implementation of 256-Bit Symmetric Key Cryptography Algori...
IRJET Journal
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation IP Core Design of Hight Lightweight Cipher and its Implementation
IP Core Design of Hight Lightweight Cipher and its Implementation
csandit
 
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATIONIP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
IP CORE DESIGN OF HIGHT LIGHTWEIGHT CIPHER AND ITS IMPLEMENTATION
cscpconf
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
IRJET Journal
 
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...IRJET -  	  Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET - Design of RISC-V Bit Manipulation Instruction IP using Bluespec S...
IRJET Journal
 
IEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdfIEEE_Calculator_Verilog2020.pdf
IEEE_Calculator_Verilog2020.pdf
fanov8
 
IRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior CitizensIRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET- Home Automation System for Specially Challenged and Senior Citizens
IRJET Journal
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
Software control systems for smart antenna
Software control systems for smart antennaSoftware control systems for smart antenna
Software control systems for smart antenna
eSAT Journals
 
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
Implementation of an Effective Self-Timed Multiplier for Single Precision Flo...
IRJET Journal
 
High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...High Speed Unified Field Crypto processor for Security Applications using Ver...
High Speed Unified Field Crypto processor for Security Applications using Ver...
rahulmonikasharma
 
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITSENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS
IRJET Journal
 
secure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganographysecure Audio Data Transfer Over Internet Using Steganography
secure Audio Data Transfer Over Internet Using Steganography
IRJET Journal
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
IRJET Journal
 

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 

Recently uploaded (20)

2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic AlgorithmDesign Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Design Optimization of Reinforced Concrete Waffle Slab Using Genetic Algorithm
Journal of Soft Computing in Civil Engineering
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt2.3 Genetically Modified Organisms (1).ppt
2.3 Genetically Modified Organisms (1).ppt
rakshaiya16
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
Empowering Electric Vehicle Charging Infrastructure with Renewable Energy Int...
AI Publications
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 

IRJET- Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 245 Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software 1Paresh Kumar Pasayat, Asst.Professor, IGIT Government Engineering College, Odisha, India 2 Sony Naik, M.Tech student, IGIT Government Engineering College, Odisha, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In the recent years, data security has become an important issue due to the hacking of data. In order to overcome this problem, a technique known as encryption has come up as a solution, and plays an important role in information security system. The desired 128-bit data is encrypted using modified DES and Hamming (224,128) code technique in addition to the use of modified iterated product cipher to produce 256-bit encrypted data. As the proposed design is having the combined effect of modified DES, Hamming (224,128) code and modified iterated product cipher data security techniques, the security level is very high as compared to the design having individual data security technique. Due to the increment of key size from 56-bits to 112-bits in modified DES, the design is more resistive to the Brute-Force Attack. The other advantages of the proposed work are: Confidentiality, Authentication and Integrity. This can be used in the field of Automated teller machine (ATM) transactions, Banking sector, Military sector and protecting confidential company information. The proposedworkis done by using VHDL language. The code is tested and simulated using Xilinx ISE9.2i software. Key Words: ALU (Arithmetic Logic Unit), Encryption, Decryption, VHDL (Very High speed Integrated Circuit Hardware Description Language). 1. INTRODUCTION For the transmission of 128-bit digital data, the first thing is to generate the data usingdatagenerationunit. The data generation unit consistsofthreecomponents. First componentisthecontrolunitwhichgeneratesthe control signals. Second componentisthedatapathunit which consists of one Arithmetic and Logic Unit (ALU) and backup unit and the ALU performs different operations based on the value of the control signal. Third component is the memory unit which is used to store the 128-bit data. The memory unit is controlled by one chip enable signal (C). When the value of C is ‘1’, then the memory unit gives output. It gives no output when the value of C is ‘0’. When C=’0’, the result is obtained from the backup unit. If the digital data is transmitted directly without using encryption technique, then there is more probability of hacking and corruption of data by the attacker. Due to which, the various data security techniques have been designed by the designer to provide security to the data. The transformation of original data into a data which is not in the readable form is known as encryption and the process of reversing it back to a readable form is known as decryption. The proposed design shows how the 128-bit data is transmitted into space after doing encryption using modified DES and Hamming (224,128) code techniques. 1.1 Project Model Fig-1: Project Model of the proposed work
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 246 1.2 LOGIC USED IN THE PROPOSED DESIGN The flow chart of the proposed design is given as follows: Fig-2: Flow chart of the proposed design The logic used in the modified DES encryption is given as follows: Fig-3: Flow chart of modified DES encryption ROUND KEY GENERATOR: KEY_OUT_1 <= KEY_IN(0) & KEY_IN(95 DOWNTO 1); KEY_OUT_2 <= KEY_IN(1)& KEY_IN(0) & KEY_IN(95 DOWNTO 2); KEY_OUT_3 <= KEY_IN(2) & KEY_IN(1)& KEY_IN(0) & KEY_IN(95 DOWNTO 3); KEY_OUT_4 <= KEY_IN(3) & KEY_IN(2) & KEY_IN(1)& KEY_IN(0) & KEY_IN(95 DOWNTO 4); KEY_OUT_5 <= NOT KEY_IN(95 DOWNTO 0); KEY_OUT_6 <= NOT KEY_IN(95 DOWNTO 0); KEY_OUT_7 <= NOT KEY_IN(95 DOWNTO 0); KEY_OUT_8 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1); KEY_OUT_9 <= KEY_IN(48) & KEY_IN(95 DOWNTO 1); KEY_OUT_10 <= KEY_IN(41) & KEY_IN(95 DOWNTO 1); KEY_OUT_11 <= KEY_IN(45) & KEY_IN(94 DOWNTO 1) & KEY_IN(90); KEY_OUT_12 <= KEY_IN(91) & KEY_IN(95 DOWNTO 1); KEY_OUT_13 <= KEY_IN(45) & KEY_IN(95 DOWNTO 1); KEY_OUT_14 <= KEY_IN(46) & KEY_IN(95 DOWNTO 1); KEY_OUT_15 <= KEY_IN(40) & KEY_IN(95 DOWNTO 1); KEY_OUT_16 <= KEY_IN(1) & KEY_IN(95 DOWNTO 1); Here KEY_IN is the 112-bit cipher keyandKEY_OUTisthe16 nos. of keys generated from the Round Key Generator. The logic used for the implementation of thedifferent blocks of modified DES is given as follows: INITIAL PERMUTATION UNIT: IPU_DATA_OUT(0) <= IPU_DATA_IN(127); IPU_DATA_OUT(1) <= IPU_DATA_IN(126); IPU_DATA_OUT(2) <= IPU_DATA_IN(125); IPU_DATA_OUT(3) <= IPU_DATA_IN(124); IPU_DATA_OUT(123 DOWNTO 4) <= IPU_DATA_IN(123 DOWNTO 4); IPU_DATA_OUT(124) <= IPU_DATA_IN(3); IPU_DATA_OUT(125) <= IPU_DATA_IN(2); IPU_DATA_OUT(126) <= IPU_DATA_IN(1); IPU_DATA_OUT(127) <= IPU_DATA_IN(0); Here IPU_DATA_IN and IPU_DATA_OUTarethe128-bitinput and output datas of the initial permutation block. 16 ROUNDS IN DES: DES uses 16 rounds of operations. Each round consists of following units performing different types operations. BIT SEPERATOR UNIT: The output of the initial permutation block is given to thebit separator unit. BS_OUT_DATA_ONE<=BS_IN_DATA(127 DOWNTO 64); BS_OUT_DATA_TWO<=BS_IN_DATA(63 DOWNTO 0); FIESTAL CIPHER UNITXOR UNIT: The block diagram showing the Fiestal Cipher Unit is given as follows: Fig-4: Flow chart of Fiestal Cipher Unit Then, the two outputs of the bit separator unit is giventothe Fiestal Cipher Unit and the different performed are given as follows. S_EX_P_BOX_OUTPUT := FCU_IN_DATA( 31 DOWNTO 0) & FCU_IN_DATA(63 DOWNTO 32) & "00000000000000000000000000000000";
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 247 S_XOR_OUTPUT := S_EX_P_BOX_OUTPUT XOR KEY_INPUT; S_SUBT_BOX_OUTPUT := S_XOR_OUTPUT(31 DOWNTO 0) & S_XOR_OUTPUT(63 DOWNTO 32) & S_XOR_OUTPUT(95 DOWNTO 64); FCU_OUT_DATA <= S_SUBT_BOX_OUTPUT(15 DOWNTO 0) & S_SUBT_BOX_OUTPUT(31 DOWNTO 16) & S_SUBT_BOX_OUTPUT(63 DOWNTO 32); The different operations that are performed in the Fiestal Cipher Unit are XOR operation, swapping operation, bit append operation. DES FUNCTION[F(R,KEY)]: The different units of the DES function used in the Fiestal Cipher is given as follows: Fig-5: Flow chart of DES function used in the Fiestal Cipher XOR UNIT: XU_OUT_DATA <= XU_IN_DATA_ONE XOR XU_IN_DATA_TWO; SWAP UNIT: SU_OUT_DATA_ONE <= SU_IN_DATA_TWO; SU_OUT_DATA_TWO <= SU_IN_DATA_ONE; BIT APPEND UNIT: BAU_OUT_DATA <= BAU_IN_DATA_ONE & BAU_IN_DATA_TWO; There are 16 nos. of round in the modified DES and after the completion of the round 16, the final permutation operation is performed. FINAL PERMUTATION: FPU_DATA_OUT(0) <= FPU_DATA_IN(127); FPU_DATA_OUT(1) <= FPU_DATA_IN(126); FPU_DATA_OUT(2) <= FPU_DATA_IN(125); FPU_DATA_OUT(3) <= FPU_DATA_IN(124); FPU_DATA_OUT(123 DOWNTO 4) <= FPU_DATA_IN(123 DOWNTO 4); FPU_DATA_OUT(124) <= FPU_DATA_IN(3); FPU_DATA_OUT(125) <= FPU_DATA_IN(2); FPU_DATA_OUT(126) <= FPU_DATA_IN(1); FPU_DATA_OUT(127) <= FPU_DATA_IN(0); Algorithm For Hamming (224,128) code Encryption Unit Step 1 First, 128-bit data is divided into 32 nos. of words each consisting of 4-bit data. Step 2 The 7-bit Hamming (7,4) code encoding technique is applied to each word. For each word, the encoding unit generates 7-bit encoded data. The logic for implementing the Hamming code technique is given as follows: Suppose, the 4-bit data (B) to be encoded is B3B2B1B0 and the 7-bit Hamming code (H) generated is H6H5H4H3H2H1H0. Here, the value for each bit of H is given as follows: H6 = B3 xor B2 xor B0 H5 = B3 xor B1 xor B0 H4 = B2 xor B1 xor B0 H3 = B3 H2 = B2 H1 = B1 H0 = B0 Step 3 After that the Hamming codes corresponding to each word are appended to form the desired 224-bit encoded data. The block diagram showing the encryption process using the above algorithm is shown as follows: Fig-6: Block diagram Hamming (224,128) code Encryption Unit
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 248 Flow chart for modified iterated product cipher unit: Fig-7 Flow chart of the modified iterated product cipher Each product cipher unit is having the following flow chart: Fig-8 Flow chart of the product cipher unit Where i varies from 1 to 4. 2. RESULTS AND DISCUSSION The VHDL code of the proposed project is compiled, synthesized and simulated using Xilinx ISE 9.2i software and the desired results have been obtained. The simulation result of the 128-bit digital data generation unit is given as follows: Fig-9: Simulation result of data generation unit for C=’0’ Fig-10: Simulation result of data generation unit for C=’1’ The simulation result of the 128-bit digital data given to the DES encryption block to produce 128-bit middle data is shown as follows: Fig-11: Simulation result of modified DES encryption block The simulation result of the 128-bit middle data given to the Hamming (224,128) code encryption block to produce 224-bit encrypted data is shown as follows:
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 249 Fig-12: Simulation result of modified Hamming (224,128) code encryption block The simulation result of the 224-bit to 256-bit converter is given as follows: Fig-13: Simulation result of 224-bit to 256-bit converter The simulation result of modified iterated product cipher unit is given as follows: Fig-14: Simulation result modified iterated product cipher The comparison study has been done based on the maximum combinational path delays of different data security algorithms obtained from the Xilinx software written VHDL code which is shown as follows: Table -1: Comparison study 3. CONCLUSIONS The data generation unit is able to generate the 128- bit digital data as per the requirement and it is fed to the data security unit for its encryption. As the proposed design is having the combined effect of modified DES,Hamming (224,128) code and modified iterated product cipher data security techniques, the security level is very high as compared to the design having individual data security technique. Due to the use of 128-bit key size in modified iterated product cipher and the enhancement of key size in modified DES from 56-bits to 112-bits, the design is having more immunity towards the Brute-Force Attack. REFERENCES [1] W.Stallings,“Cryptography and Network Security”, 2nd Edition, Prentice Hall. [2] Christof Paar, Jan Pelzl, "The Data Encryption Standard (DES) and Alternatives", "Understanding Cryptography", Springer. [3] Bruce Schneir: Applied Cryptography, 2nd edition, John Wiley & Sons. [4] A.Litwin, “Cryptography and Network Security” LOS Alamitos,CA:IEEE computer society press. [5] Douglas L. Perry. “VHDL Programming by Examples”, TMH. [6] Hamacher, Vranesic, and Zaky. Computer Organization, 5th edition, New York: McGraw-Hill Companies.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 1 | Jan-2017 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 250 [7] Soufiane Oukili,Seddik Bri,”FPGAimplementationofData Encryption Standard using time variable permutations”, International Conference on Microelectronics (ICM),IEEE,pp.126-129,2015. [8] J. G. Pandey,Aanchal Gurawa, Heena Nehra,A. Karmakar , ”An efficient VLSI architecture for data encryptionstandard and its FPGA implementation”,VLSISATA,IEEEInternational Conference,pp.1-5,2016. [9] Ramadhan J. Mstafa; Khaled M. Elleithy, ”A highly secure video steganography using Hamming code (7, 4)”, Systems, Applications and Technology Conference (LISAT), IEEE Conference,pp.1-6,2014. [10] B.A. Farouzan, “Cryptography and Network Security”, Tata McGraw Hill Publication. [11] W.Diffie; M.E.Hell man, “ New Directions in Cryptography” ,IEEE transaction theory, Nov, pp 644-654. [12] RanjanBose, “Information Theory, Coding and Cryptography” , chapter-8 . [13] Ke Wang ,“ An encrypt and decrypt algorithm implementationonFPGAS”,IEEE,Departmentofinformation engineering, 2009. [14] Garfinkel, S.L, “Public Key Cryptography” , Computer, IEEE, Volume: 29, Issue:6. [15] H. Lee Kwang , “ Basic Encryption and Decryption” , Computer and Electrical.
  翻译: