0% found this document useful (0 votes)
33 views14 pages

Symmetric Key Algorithm

The document discusses symmetric key encryption using the Caesar cipher algorithm. It describes how three microcontrollers - MC1, MC2, and MC3 - communicate encrypted data using a Caesar cipher with a key of 3 to control motors, and how MC3 is unable to decrypt the data without the key.

Uploaded by

Hager khaled kh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views14 pages

Symmetric Key Algorithm

The document discusses symmetric key encryption using the Caesar cipher algorithm. It describes how three microcontrollers - MC1, MC2, and MC3 - communicate encrypted data using a Caesar cipher with a key of 3 to control motors, and how MC3 is unable to decrypt the data without the key.

Uploaded by

Hager khaled kh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

🔐SYMMETRIC KEY ALGORITHM

There are three microcontrollers here


MC1 (Bob) sends data to MC2 (Alice)
for the motor to rotate in 3 levels
MC3 (Darth) tries to retrieve data sent
from MC1(Bob) to MC2(Alice)
Therefore, data must be encrypted
because encryption makes data easy
to protect hard to detect
two requirements for
secure use of symmetric
encryption:
• a strong encryption
algorithm
• a secret key known
only to sender /
receiver
SUBSTITUTION CIPHER
CAESAR CIPHER
mathematically give each letter a number
a bcde fg hI j k l m n o p q r s t u v w x y z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
then have Caesar cipher as:
c = E(p) = (p + k) mod (26)
p = D(c) = (c – k) mod (26)
This keyboard is programmed to send 1 2 3 4 5 6 7 8 9
numbers from 1 to 9
we will use the Caesar Cipher
A B C D E F G H I
theorem

Shift numbers by key= 3


7 8 9 1 2 3 4 5 6

A B C D E F G H I

c = E(p) = (p + k) mod (9)


p = D(c) = (c – k) mod (9)
ENCRYPTION
In the encrypt function the data will
shift circle right by key = 3. the
numbers between 1-6 add the key
=3 and between 7-9 sub the key =6.
When user send 1 the encrypt
function will make it = 4 and in switch
case the function will return D

In the decrypt function the data will


shift circle left by key = 3. the
numbers between 4-9 sub the key =3
and between 1-3 add the key =6.
When user send D in switch case it will
be = 4 and the decrypt function will
make it = 1 he function will return 1
MC 1
(BOB)
In the main function the keyboard sends data between 1-9 to the uart function to send
the data to mc2 but the data must be encrypted so that the data is sent to encrypt the
function before it is sent to the uart function
The encryption function takes the data and then adds the key to the data to make it
incomprehensible
MC2
(ALICE)
in main function the uart function will receive the data from MC1 then decrypt the
data to understand the action that motor will do
The decrypt function take the data then return the true data
After decrypt the data the mc2 will do the
right action from 1-3 the first motor will spin
in 3 levels, from 4-6 the second motor will
spin in 3 levels and from 7-9 the first and
second motor3 will spin in 3 levels in
different ways and display the action in lcd
MC3
(DARTH)
The MC3 will receive the data but does not have the decryption
function so it will not understand the right action to do it ???????

You might also like