Simple Password Security System Using Logic Gates in Multisim

Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

SIMPLE PASSWORD SECURITY SYSTEM

USING LOGIC GATES IN MULTISIM

A MINI PROJECT
REPORT

Submitted By,

Aniket Bhaumik, Mitam Samanta, Pranit Adhikary,


Kash Moulik, Antoreep Ghatak

Bachelor of Technology

IN
Applied Electronics and Instrumentation
3rd Year, 6th Semester

Department of Applied Electronics & Instrumentation Engineering


Heritage Institute of Technology

AUGUST 2021
HERITAGE INSTITUTE OF TECHNOLOGY

BONAFIDE CERTIFICATE

Certified that this project report “SIMPLE PASSWORD SECURITY SYSTEM

USING LOGIC GATES IN MULTISIM” is the bonafide work of “Aniket

Bhaumik, Mitam Samanta, Pranit Adhikary, Kash Moulik, Antoreep Ghatak”

who carried out the mini project work under our supervision.

<<Signature of the Supervisor with date>>


<<Name of the Supervisors>>
<<Academic Designation of Supervisor>>

Submitted to the Viva voce Examination held on _____________________


TABLE OF CONTENTS

Chapter Number Contents Page Number

1. INTRODUCTION 4

2. REVIEW OF 5
LITERATURE
3. SOFTWARE USED 5

4. COMPONENTS USED 5

5. PROJECT DESIGN 6

6. RESULTS AND 7
DISCUSSION
7. CONCLUSION 7

8. REFERENCES 7

3
Abstract- Security is a very vital and the other hand, the 8 other switches, which are
integral part of any hardware or software used as “Data Entry Switches”, act as data
system, amongst different kinds of entry points where the code is to be entered to
technologies. We have proposed a simple open the lock. The “Key Code Switches” have
password based security system designed static value and is hidden from the person who
with the help of simple logic gates. The is trying to open the lock. If the person who is
project is a security system which allows trying to open the lock enters the code at
only authorized access to users with a “Data Entry Switches” which is similar to the
password. The system has a feature of code kept static at the “Key Code Switches”
changing the password anytime by the then the green LED will light up and the lock
authorized user as required. This proposed will open while, if he enters the wrong code
system provides a user friendly security then the red LED will light up which is an
system for organizations and homes. It also alarming situation that some wrong person is
has the provision of changing the password. unlocking the lock viz. that the entered
This project was designed on MultisimLive password is wrong. Logic gates are critical to
simulation software. The software industries worldwide. For this project, NOT,
implementation of the proposed circuitry of XOR and NAND gates, switches, LEDs, and
the system was simple and reliable. resistors are used within this project [2]. The
“key code” and “data entry” switches are the
Keywords-Logic gates, Password, Security, two eight position DIP switches. Also,
System whenever a password in the “enter” switch is
pressed in
1. INTRODUCTION – the light will become either red if the
password is incorrect or green if the password
Throughout history, human beings have is correct. Above all, for users, this project
always been cautious of their personal also presents the potential to even receive
livelihood and security over their private life. alerts directly to their mobile devices provided
Over the centuries, many different privacy in time a password has been attempted.
measures have been taken by people. Ranging Materials used for the construction of the
from wooden door locks to access control Circuit were sourced and put together locally.
panels to a posted live human guard, security Because four bits provides a mere sixteen
systems have evolved noticeably throughout possible combinations, this lock circuit is not
the ages [9]. The traditional “lock and key” very sophisticated. If it were used in a real
system have been in use for over 6000 years application such as a home security system,
and it is still the most commonly used privacy the “No” or “Incorrect” output would have to
measure used to prevent unauthorized access be connected to some kind of siren or other
to private properties [8]. Now in an age of alarming device so that the entry of an
electronics and technology, it is now almost incorrect code would deter an unauthorized
mandatory to protect intellectual properties person from attempting another code entry.
and due to the rising rates of Cyber-crimes, In today’s world, copious individuals’ input
malware attacks, phishing scams and many password into their security system to secure
more malicious activities over the Internet and or to unsecure their home and/or
software cloud, privacy has become a very business.There are several research works
crucial and vital aspect of all hardware and present in the literature for security based
software based systems. This paper, therefore, privacy systems. Some of them have been
presents the design analysis of a security lock briefly referenced and reviewed in Section 2.
system using pass code using logic gates. The increasing rate of crime, attacks by
The idea is of this system is that 8 switches, thieves, intruders, vandals etc., despite all
which are termed as “Key Code Switches”, forms of security gadgets and lock constitute
have been used which act as holding the the main factor that prompts the selection of
correct password for unlocking the lock. On this design. Therefore, the main aims of the
4
design are: (1) To design a cheap, simple, most security systems are the numerous
homemade effective security system for usage numbers of inputs bits that leads to a large
in safes, doors etc., (2) To experiment the logic and memory size [7]. This has
application of electronic devices as locks, and necessitated the need for a new security
(3) To prevent unauthorized person from system. This security system is a password
having access to ones properties through the authentication program that is aimed at storing
use of codes. 4-bit security code in memory logic
permanently which can only be changed by
2. REVIEW OF LITERATURE reprogramming the
logic.
There are many different types of security
locks in the market as of today, which 3. SOFTWARE USED
includes password based locks, pattern based
locks, face/voice/image recognition, security The software which was used for this project
questions and answers, PIN code based is called NI Multisim. NI Multisim (formerly
system, smartcard based locks etc. [7] This MultiSIM) is an electronic schematic capture
paper, illustrates a cheap and simple and simulation program which is part of a
homemade password based electronic lock suite of circuit design programs, along with NI
using logic gates. Zviran and Haga (1999) Ultiboard. Multisim is one of the few circuit
conducted a survey on computer users at a design programs to employ the original
Department of Defense installation in Berkeley SPICE based software simulation.
California. [5]. Questionnaires were returned Multisim was originally created by a company
by 997 participants. It was also observed that named Electronics Workbench Group, which
24.9% of the respondents had 4 characters in is now a division of National Instruments.
their passwords. ATMEL, developed [10,11]. Multisim includes microcontroller
AVR245. A Code Lock with 4x4 Keypad and simulation (formerly known as MultiMCU), as
I2C™ LCD, Ideal for low pin count AVRs. It well as integrated import and export features
uses; I/O pins to read 4x4 keypad, to the printed circuit board layout software in
Timer/Counter to control piezoelectric buzzer, the suite, NI Ultiboard. Multisim is widely
USI in TWI mode to communicate with I2C™ used in academia and industry for circuits
LCD, and a firmware written entirely in C education, electronic schematic design and
language [3,13]. SPICE simulation. Multisim was originally
A design of a keyless digital security system called Electronics Workbench and created by
using a hardware programming tool using J-K a company called Interactive Image
Flip-Flops and different combinations of Technologies. At the time it was mainly used
encoders and logic gates comprising of yet as an educational tool to teach electronics
another 4x4 Keypad was proposed by E.O. technician and electronics engineering
Oyetunji* and J. Asare of the Department of programs in colleges and universities.
Computer Science, University for National Instruments has maintained this
Development Studies, Ghana [4]. Muhammad educational legacy, with a specific version of
Yasin, Jeyavijayan (JV) Rajendran, Ozgur Multisim with features developed for teaching
Sinanoglu, and Ramesh Karr of New York electronics. In 1999, Multisim was integrated
University introduce a security metric that with Ultiboard after the original company
guides a logic locking merged with Ultimate Technology, a PCB
technique in inserting key-gates, increasing layout software company. [11]
attacker’s effort to break it. They provide an In 2005, Interactive Image Technologies was
algorithm to increase efficiency and security acquired by National Instruments Electronics
of the said logic gates [6] which was Workbench Group and Multisim was renamed
implemented by a microprocessor based to NI Multisim.
password security system by the same
proposers. The key challenge for 4. COMPONENTS USED
5
comparison of the two bits’ values by the
The materials that were used for the integral XOR gate. The compared bit outputs are then
part of this project include XOR gates (4070 fed to two AND (U9, U10) gates, each AND
quad IC), NOT gates (7404 IC), AND gates (U9, U10) gate is used for combining the
(7408 quad IC) [12], eight-position DIP outputs of the XOR gates so that we have two
switches, light-emitting diodes (one green and AND (U9, U10) gate outputs, one representing
one red), and a pushbutton switch which is the main password and the other one, user
normally open. Other components include defined password.
breadboards, connecting wires, a 6V power
supply (battery), and resistors (10K). The
hardware circuitry was simulated with
Multisim software.

5. PROJECT DESIGN

Fig. 2: The circuit of the Password security system when the


main password and the user given passwords do not match

These two AND (U9, U10) gate outputs are


then fed through another AND (U11) gate
which determines the final value of the circuit.
This final value is split into two parts, one
with a NOT (U14) gate and one without one,
each connected to respective AND (U12,U13)
Fig. 1: The circuit of the Password security system when both
the main password and the user given passwords match gates which in turn is connected to one green
and one red LED. If the final output is ‘0’,
This circuit illustrates the use of XOR (U1, then the NOT gate part of the final output is
U2, U3, and U4) gates as bit comparators. [1]. ‘1’ and the red LED blinks (X2) and if the
Four of these XOR gates compare the final output is ‘1’ then the green LED (X1)
respective bits of two 4-bit binary numbers, blinks. The vacant terminal of these AND
each number “entered” into the circuit via a (U12, U13) gates are connected to a
set of switches (DG1 to DG8). If the two pushbutton switch (DG9). A simple flow of
numbers match, bit for bit, the green LED will the working of the circuit can be illustrated as
light up when the pushbutton switch is follows:
pressed. If the two numbers do not exactly
match, the red LED will light up when the
pushbutton is pressed. Tests were carried out
with different combinations of the main
password and the user given password while
the pushbutton switch was on, for a total of 16
different combinations and results. It is the
nature of an XOR gate to output a “high” (1)
signal if the input signals are not the same
Fig.3: Flow of the circuit
logic state [13]. The four XOR gates’ output
terminals are connected through a network of
NOT (U5, U6, U7, U8) gates which invert the
XOR gate output, which is the result of the
6
6. RESULTS AND DISCUSSION [1] Theraja, B. L., & Theraja, B.K (2002), “A
textbook of Electrical Technology”, S. Chand
The test results good response time and and Company Ltd. New Delhi, India 2002
performance to design specifications.
Different combinations of XOR and NOT [2] Overview of IEEE Standard 91-1984
networks were tried out and it was found that Explanation of Logic Symbols, Doc. No.
the password security system works the SDYZ001A, Texas Instruments
simplest with XOR and AND logic. Semiconductor Group, 1996
Alternatively NOR logic can also be used
within the network, yielding similar results. [3] (http://www.atmel.com ((accessed: August
The key codes can be changed and pre- 2021))
configured, which allows change of the
correct password before allowing the user to [4] Oyetunji, E.O. and Asare, J. “Design of A
enter the input. Thus, the key code that must Keyless Digital Security System”, I
be matched at the data entry switch array nternational Journal of Electrical, Electronics
should be hidden from view. If this were part and Computer Engineering 1(2): 42-50(2012)
of a real security system, the data entry switch
assembly would be located outside the door [5] Zviran, M., and Haga, W.J. "Password
and the key code switch assembly behind the security: An empirical study," Journal of
door with the rest of the circuitry. Also it is Management Information Systems (15:4)
entirely possible to build the circuit using just 1999, p. 161 (125 pages).
a single (8-position) DIP switch assembly. In
conclusion, for this project two bulbs are [6] Muhammad Yasin, “Trustworthy
connected to outputs of two AND gates for Hardware Design: Combinational Logic
valid and invalid password checker and Locking Techniques”, Springer, New York
whenever the values are same of storing and 2013
the user switches XOR gates will give output
zero and NOT gate make it one which will [7] Tocci J.,“Digital Systems Principles and
take AND gate as input and lastly output of Applications”, Prentice-Hall Publishers., India
AND gates are connected to NOT gate and
another AND gate and both are connected to [8] Bellis M. (1972); “The history of locks”
bulbs. www.About.com (28th March, 2007)

7. CONCLUSION [9] Murtala Zungeru, Adamu, “An electronic


digital combination lock: a precise and reliable
A security lock system using passwords and security system”, School of Electrical and
logic gates has been designed, analyzed and Electronic Engineering, University of
implemented. Its advantages cannot be over- Nottingham
emphasized in these modern days of
technological breakthroughs. Security lock [10]
systems using passwords would be found very (https://www.ni.com/enin/shop/electronic-test-
useful in applications which require strong instrumentation/application-software-for-
security protection and authentication such as: electronic-test-and-instrumentation-
Banks, Industrial Facilities, Commercial category/what-is-multisim.html (accessed:
Buildings, Airports, Museums and Fine Art, August 2021))
Warehouses e.t.c.
[11] (https://www.multisim.com (accessed:
8. REFERENCES July 2021))

7
[12] Lowe, Doug, “Digital Electronics:
Integrated Circuit Logic Gates”,
www.dummies.com

[13] (https://en.wikipedia.org/wiki/Atmel
((accessed: August 2021)).

You might also like