latest ieee projects abstract for ece-ofdm based blow-fish algorithm using military applications

8
OFDM Based Wireless Encryption and Decryption Message Transfer System for Military Applications using BlowFish Algorithm What is OFDM Short for Orthogonal Frequency Division Multiplexing, an FDM modulation technique for transmitting large amounts of digital data over a radio wave. OFDM works by splitting the radio signal into multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver. OFDM reduces the amount of crosstalk in signal transmissions Need: The need for this project arises when we want the data communication to be protected from others. This is highly essential in the military field and especially during war times. Because during war periods when a particular army wants to send a message to remotely located units, which belong to the same army, in between any person can trap the data when it is transmitted through wireless. Our aim of the project is to protect the data from the ensnares. To accomplish this, we have used a PC as a sender and PIC microcontroller as a receiver station. The message to be sent is fed in to the computer for different units. The computer will Encrypt the data using generating a duplicate Character for a real one. At the receiving end the PIC microcontroller then Decrypts the Received data and displays the message on the display. The 89. Rangarajapuram main road,(Near SBI Bank),Kodambakkam Chennai-600024, http://www.maastechindia.com

Upload: ashokkumar-ramar

Post on 16-Jul-2015

1.166 views

Category:

Education


1 download

TRANSCRIPT

OFDM Based Wireless Encryption and

Decryption Message Transfer System for

Military Applications using BlowFish

Algorithm

What is OFDM Short for Orthogonal Frequency Division Multiplexing, an FDM modulation

technique for transmitting large amounts of digital data over a radio wave. OFDM

works by splitting the radio signal into multiple smaller sub-signals that are then

transmitted simultaneously at different frequencies to the receiver. OFDM reduces

the amount of crosstalk in signal transmissions

Need:

The need for this project arises when we want the data communication to

be protected from others. This is highly essential in the military field and

especially during war times. Because during war periods when a particular

army wants to send a message to remotely located units, which belong to

the same army, in between any person can trap the data when it is

transmitted through wireless.

Our aim of the project is to protect the data from the ensnares.

To accomplish this, we have used a PC as a sender and PIC

microcontroller as a receiver station. The message to be sent is fed in to

the computer for different units. The computer will Encrypt the data using

generating a duplicate Character for a real one.

At the receiving end the PIC microcontroller then Decrypts the

Received data and displays the message on the display. The

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

communication takes place through a Wireless RF Transmitter and

Receiver operating at 433.92 MHz

we can also use CRO at the transmitting point to view the Encrypted data.

To ensure the security level at the receiving end we have a password

protection. Once the Message is received the unit will give an alarm

message so that one can know that the message has arrived. Then he

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

must enter the password through the keypad. If the password matches

then he is allowed to view the data.

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

BlowFish Encryption Algorithm

Blowfish is a symmetric block cipher that can be used as a drop-in replacement

for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it

ideal for both domestic and exportable use. Blowfish was designed in 1993 by

Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since

then it has been analyzed considerably, and it is slowly gaining acceptance as a

strong encryption algorithm. Blowfish is unpatented and license-free, and is

available free for all uses.

Blowfish has a 64-bit block size and a variable key length from 32 up to 448 bits

[1]. It is a 16-round Feistel cipher and uses large key-dependent S-boxes. It is

similar in structure to CAST-128, which uses fixed S-boxes.

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

The Feistel structure of Blowfish

The diagram to the left shows the action of Blowfish. Each line represents 32

bits. The algorithm keeps two subkey arrays: the 18-entry P-array and four 256-

entry S-boxes. The S-boxes accept 8-bit input and produce 32-bit output. One

entry of the P-array is used every round, and after the final round, each half of

the data block is XORed with one of the two remaining unused P-entries.

The diagram to the right shows Blowfish's F-function. The function splits the 32-

bit input into four eight-bit quarters, and uses the quarters as input to the S-

boxes. The outputs are added modulo 232 and XORed to produce the final 32-bit

output.

Since Blowfish is a Feistel network, it can be inverted simply by XORing P17 and

P18 to the ciphertext block, then using the P-entries in reverse order.

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

Blowfish's key schedule starts by initializing the P-array and S-boxes with values

derived from the hexadecimal digits of pi, which contain no obvious pattern (see

nothing up my sleeve number). The

secret key is then XORed with the P-entries in order (cycling the key if

necessary). A 64-bit all-zero block is then encrypted with the algorithm as it

stands. The resultant ciphertext replaces P1 and P2. The ciphertext is then

encrypted again with the new subkeys, and P3 and P4 are replaced by the new

ciphertext. This continues, replacing the entire P-array and all the S-box entries.

In all, the Blowfish encryption algorithm will run 521 times to generate all the

subkeys - about 4KB of data is processed.

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

Block Diagram

89. Rangarajapuram main road,(Near SBI Bank),KodambakkamChennai-600024, http://www.maastechindia.com

dsPIC 30F4013ADVANCED EMBEDDEDMicrocontroller

PIC EMBEDDED MC-16F877

RF Tx Module1

RF Rx Module1315 MHZ

4 X 3 Matrix Key Pad.Password entry

Alarm Output(MESSAGE

Visual Alert(MESSAGE)

+5v PowerSupply

+5v PowerSupply

RF Rx Module2433.92 MHZ

RF Tx Module2

PIC EMBEDDEDMC-16F877

RS232COMMUNICATION FOR SERIEL DATA