The document discusses symmetric key encryption using the Caesar cipher algorithm. It describes how three microcontrollers - MC1, MC2, and MC3 - communicate encrypted data using a Caesar cipher with a key of 3 to control motors, and how MC3 is unable to decrypt the data without the key.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
33 views14 pages
Symmetric Key Algorithm
The document discusses symmetric key encryption using the Caesar cipher algorithm. It describes how three microcontrollers - MC1, MC2, and MC3 - communicate encrypted data using a Caesar cipher with a key of 3 to control motors, and how MC3 is unable to decrypt the data without the key.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14
🔐SYMMETRIC KEY ALGORITHM
There are three microcontrollers here
MC1 (Bob) sends data to MC2 (Alice) for the motor to rotate in 3 levels MC3 (Darth) tries to retrieve data sent from MC1(Bob) to MC2(Alice) Therefore, data must be encrypted because encryption makes data easy to protect hard to detect two requirements for secure use of symmetric encryption: • a strong encryption algorithm • a secret key known only to sender / receiver SUBSTITUTION CIPHER CAESAR CIPHER mathematically give each letter a number a bcde fg hI j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 then have Caesar cipher as: c = E(p) = (p + k) mod (26) p = D(c) = (c – k) mod (26) This keyboard is programmed to send 1 2 3 4 5 6 7 8 9 numbers from 1 to 9 we will use the Caesar Cipher A B C D E F G H I theorem
Shift numbers by key= 3
7 8 9 1 2 3 4 5 6
A B C D E F G H I
c = E(p) = (p + k) mod (9)
p = D(c) = (c – k) mod (9) ENCRYPTION In the encrypt function the data will shift circle right by key = 3. the numbers between 1-6 add the key =3 and between 7-9 sub the key =6. When user send 1 the encrypt function will make it = 4 and in switch case the function will return D
In the decrypt function the data will
shift circle left by key = 3. the numbers between 4-9 sub the key =3 and between 1-3 add the key =6. When user send D in switch case it will be = 4 and the decrypt function will make it = 1 he function will return 1 MC 1 (BOB) In the main function the keyboard sends data between 1-9 to the uart function to send the data to mc2 but the data must be encrypted so that the data is sent to encrypt the function before it is sent to the uart function The encryption function takes the data and then adds the key to the data to make it incomprehensible MC2 (ALICE) in main function the uart function will receive the data from MC1 then decrypt the data to understand the action that motor will do The decrypt function take the data then return the true data After decrypt the data the mc2 will do the right action from 1-3 the first motor will spin in 3 levels, from 4-6 the second motor will spin in 3 levels and from 7-9 the first and second motor3 will spin in 3 levels in different ways and display the action in lcd MC3 (DARTH) The MC3 will receive the data but does not have the decryption function so it will not understand the right action to do it ???????
The Quality or State of Agreeing or Corresponding.a Relation Between Two Numbers Indicatin Gthat The Numbers Give The Same Remainder When Divided by Some Given Number. Compare Residue