0% found this document useful (0 votes)
175 views25 pages

SWDC

The document describes a secured wireless data communication system using cryptography. It discusses encrypting data transmitted between microcontrollers using monoalphabetic and polyalphabetic substitution ciphers. The system includes a transmitter circuit with a microcontroller, keyboard, and FM transmitter and a receiver circuit with an FM receiver, microcontroller, and LCD display. The microcontroller encrypts data at the transmitter and decrypts the received encrypted data at the receiver.

Uploaded by

Pranav Mehta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views25 pages

SWDC

The document describes a secured wireless data communication system using cryptography. It discusses encrypting data transmitted between microcontrollers using monoalphabetic and polyalphabetic substitution ciphers. The system includes a transmitter circuit with a microcontroller, keyboard, and FM transmitter and a receiver circuit with an FM receiver, microcontroller, and LCD display. The microcontroller encrypts data at the transmitter and decrypts the received encrypted data at the receiver.

Uploaded by

Pranav Mehta
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 25

GOVERMENT ENGINEERING COLLEGE,

BHARUCH

DEPT. OF
ELECTRONICS & COMMUNICATION

E LE SS
D W IR
C U RE
SE
DATA ION
NI CA T
M M U
CO

MAY 2011
Gec, Bharuch 1
SECURED WIRELESS DATA
COMMUNICATION

PREPARED BY:
TRUPESH JADAV (14)
KRUNAL MAJMUDAR (17)
PRANAV MEHTA (21)
Gec, Bharuch 2
INTRODUCTION
 The project “SECURED WIRELESS DATA COMMUNICATION”
means transmitting data between different locations, without any physical
wire connections, using the concept of cryptography.
 The word ‘CRYPTOGRAPHY’ refers to the science of secret
communication. It is a methodology for transforming the representation of
message through a position-scrambling process through some method of
transformation of letters or characters without changing its information
content.
 The original message is called plaintext or clear text and the
transformed message is called cipher text, which is also called a
cryptogram. The plaintext is transformed into cipher text by the process
called Encryption. In our project, the microcontroller does the function of
encryption and decryption process in two methods. The user has the choice
of selecting any one method of encryption
 
  Gec, Bharuch 3
CRYPTOGRAPHY
 Cryptography, which comes from the Greek words
kryptos or “hidden” and graphein or “to write”, is the
science of secret communication. In our project, we have
illustrated this concept of cryptography by way of
establishing a simple serial communication between
microcontrollers.
 In cryptography, the process of changing plaintext to
cipher text is called enciphering or encryption. The
inverse operation that changes cipher text to plaintext is
known as deciphering or decryption.

Gec, Bharuch 4
CLASSIFICATION OF CRYPTOGRAPHY

CRYPTOGRAPHY

Conventional Key Cryptography Public Key Cryptography

Gec, Bharuch 5
Monoalphabetic Substitution
This method is sometimes called the Caesar cipher,
each character is replaced by another character in the
set.
The monoalphabetic encryption algorithm simply
adds a number to the ASCII code of the character; the
decryption algorithm is the reverse of the encryption
operation i.e., the decryption algorithm simply
subtracts the same number from the ASCII code.

Gec, Bharuch 6
Monoalphabetic substitution-based
ciphers
Monoalphabetic substitution-based ciphers replace a
character or characters with a different character or
characters, based upon some key.
Replacing: abcdefghijklmnopqrstuvwxyz
With the key: POIUYTREWQLKJHGFDSAMNBVCXZ
The message: how about lunch at noon
encodes into EGVPO GNMKN HIEPM HGGH

Gec, Bharuch 7
Polyalphabetic Substitution
In polyalphabetic substitution, each occurrence of a
character can have a different substitute. One
polyalphabetic encryption technique is to find the
position of the character in the text and use that value
as the key.
Here the key is defined as “take the position of the
character in the text, and this position be the shifted
value”.

Gec, Bharuch 8
Polyalphabetic substitution-based ciphers
Similar to monoalphabetic ciphers except multiple
alphabetic strings are used to encode the plaintext.
For example, a matrix of strings, 26 rows by 26
characters or columns can be used.
A key such as COMPUTERSCIENCE is placed
repeatedly over the plaintext.
COMPUTERSCIENCECOMPUTERSCIENCECOMPUTER
thisclassondatacommunicationsisthebest

Gec, Bharuch 9
Polyalphabetic substitution-based ciphers
 To encode the message, take the first letter of the
plaintext, and the corresponding key character
immediately above it, C. Go to row C column t in the
26x26 matrix and retrieve the cipher text character V.
Continue with the other characters in the plaintext.

Gec, Bharuch 10
SYMMETRIC ENCRYPTION METHOD
Sender identical keys Receiver

Transmitted
Message

Plaintext encrypt Encoded Plaintext


Message decrypt Message
Message

Same key for encryption and decryption.


How is key shared?
Gec, Bharuch 11 11 11
BLOCK DIAGRAM
MICRO
KEYBOARD CONTROLLER AM TRANSMITTER

LCD DISPLAY

• TRANSMITTER BLOCK DIAGRAM

MICRO
AM RECEIVER
CONTROLLER LCD DISPLAY

• RECEIVER BLOCK DIAGRAM


Gec, Bharuch 12
BLOCK DIAGRAM EXPLANATION
The data to be transmitted is given to the keyboard which converts
scan codes into ASCII codes. In microcontroller the ASCII codes are
encrypted using substitution algorithm. The input data will be
displayed in LCD.

The encrypted data gets combined with address bits in encoder and
are transmitted to receiver by transmitter module using an antenna.

The receiver module receives the transmitted data and the decoder
separates the address and data bits. If the addresses are matched the
data bits are decrypted in the microcontroller and the original data
gets displayed in LCD.

Gec, Bharuch 13
TRANSMITTER CIRCUIT DIAGRAM

• CIRCUIT DIAGRAM OF TRANSMITTER


Gec, Bharuch 14
RECEIVER CIRCUIT DIAGRAM

• CIRCUIT DIAGRAM OF RECEIVER


Gec, Bharuch 15
CIRCUIT DIAGRAM EXPLANATION
The Circuit consists of the Message transmitter and a
Receiver section. The transmitter section has a
microcontroller which gets the text message from the
keyboard. This text message was encrypted by the specified
algorithm and the encrypted data was transmitted
continuously through the FM transmitter.

At the receiving end the FM signal was received by the FM


receiver and the data was fed to the microcontroller and the
microcontroller will decrypt by the specified algorithm and
the decrypted data was displayed it over the LCD display.

Gec, Bharuch 16
S T A RT

CHE C K ED IT
NO
B UT T O N
PR E SS ED

Y ES
G E T D A TA FR O M KE YB O A RD

DIS PL A Y O N L CD

C O NV E RT S CA N CO DE T O A SC II

NO CH EC K SE ND
B UT T O N
PR E SS ED

YES

G ET AP P RO P RIAT E
ALG O RIT HM FR O M US ER

NO YE S
C HE CK F OR M O N O
A LP H AB ET IC

G E T K E Y FR O M US ER G E T K EY F RO M U SE R

A DD KE Y T O
FIRS T C HA RA CT E R A DD K E Y TO
E A CH CH AR AC T ER

INC RE M EN T A ND A DD
K E Y BA S ED O N P O S IT IO N
OF CH A RA CT E R

S EN D D AT A

NO AL L DA T A
SE ND

Gec, Bharuch YES 17


TRANSMITTER FLOW CHART
START

CHECK FOR
START BIT NO
RECEIVED

YES
GET DATA LENGTH

GET DATA ACCORDING TO LENGTH

STORE IT IN MEMORY

SW ITCH ON BUZZER FOR


2 SECONDS

GET APPROPRIATE
ALGORITHM FROM USER

NO YES
CHECK FOR MONO
ALPHABETIC

GET KEY FROM USER GET KEY FROM USER

SUBTRACT KEY FROM


FIRST CHARACTER SUBTRACT KEY FROM
EACH CHARACTER

INCREMENT AND SUBTRACT


KEY BASED ON POSITION
OF CHARACTER

DISPLAY IT ON LCD

Gec, Bharuch 18
RECEIVER FLOW CHART
ADVANTAGES
As we are using microcontroller,
 There is less heat dissipation problem.
 It has built-in heat dissipater.

Microcontroller chip is readily available and also at


cheap cost.  

Gec, Bharuch 19
DISADVANTAGE & LIMITATION
This project limits range of wireless data
communication is 100 feet that depends on RF
modules because RF modules used in this project
works in this range. 

Gec, Bharuch 20
APPLICATIONS
This concept of cryptography is used in military level
communication to maintain secrecy of
communication.

Gec, Bharuch 21
CONCLUSION
This project depicts us a clear view about cryptographic
concept in wireless data communication. By implementing
this system the communications is made better & fast. Thus
we can able to send Text message through RF with the help of
Microcontroller.
Here Microcontroller plays an important role; it is the
heart of this technology. It is more useful in military,
education, business, hospitals etc. Number of character sent
can be get increased (by connecting an external memory) and
message transmission to cell or vice versa is possible in Future
development of this Project. So it is user-friendly in function
and easy, cheap to implement.

Gec, Bharuch 22
SCOPE FOR FUTURE
The number of characters transmitted at a time is 64
in our project, which can be increased by adding
external RAM with the microcontroller.
The transmitting distance can be increased by
increasing the power of the transmitter & Receiver.
The LCD display in our project is 16x2, so that it can
display maximum characters of 64 on it. This can also
be increased more.
Picture messages can also transmitted by using a
graphic display.

Gec, Bharuch 23
REFERENCES
 TEXTS:
Electronics for you (February 2001)
Electronics for you (April 2001)
Electronics for you (February 2003)
Gokhale “Introduction to telecommunications
Hill Associated “TELECOMMUNICATION”- A beginners guide
Kenneth.J.Ayala (Second edition). “The 8051 Microcontroller Architecture, programming and
applications”.
Muhammad Ali Mazidi , Janice Gillispie Mazidi.(2002) -THE 8051 MICROCONTROLLER AND
EMBEDDED SYSTEMS
 Websites:
www.8052.com
www.atmel .com
www.hitachi.com
www.nationalsemiconductor.com
www.dalsemi.com
www.microcontroller.net

Gec, Bharuch 24
THANK YOU

Gec, Bharuch 25

You might also like