SWDC
SWDC
BHARUCH
DEPT. OF
ELECTRONICS & COMMUNICATION
E LE SS
D W IR
C U RE
SE
DATA ION
NI CA T
M M U
CO
MAY 2011
Gec, Bharuch 1
SECURED WIRELESS DATA
COMMUNICATION
PREPARED BY:
TRUPESH JADAV (14)
KRUNAL MAJMUDAR (17)
PRANAV MEHTA (21)
Gec, Bharuch 2
INTRODUCTION
The project “SECURED WIRELESS DATA COMMUNICATION”
means transmitting data between different locations, without any physical
wire connections, using the concept of cryptography.
The word ‘CRYPTOGRAPHY’ refers to the science of secret
communication. It is a methodology for transforming the representation of
message through a position-scrambling process through some method of
transformation of letters or characters without changing its information
content.
The original message is called plaintext or clear text and the
transformed message is called cipher text, which is also called a
cryptogram. The plaintext is transformed into cipher text by the process
called Encryption. In our project, the microcontroller does the function of
encryption and decryption process in two methods. The user has the choice
of selecting any one method of encryption
Gec, Bharuch 3
CRYPTOGRAPHY
Cryptography, which comes from the Greek words
kryptos or “hidden” and graphein or “to write”, is the
science of secret communication. In our project, we have
illustrated this concept of cryptography by way of
establishing a simple serial communication between
microcontrollers.
In cryptography, the process of changing plaintext to
cipher text is called enciphering or encryption. The
inverse operation that changes cipher text to plaintext is
known as deciphering or decryption.
Gec, Bharuch 4
CLASSIFICATION OF CRYPTOGRAPHY
CRYPTOGRAPHY
Gec, Bharuch 5
Monoalphabetic Substitution
This method is sometimes called the Caesar cipher,
each character is replaced by another character in the
set.
The monoalphabetic encryption algorithm simply
adds a number to the ASCII code of the character; the
decryption algorithm is the reverse of the encryption
operation i.e., the decryption algorithm simply
subtracts the same number from the ASCII code.
Gec, Bharuch 6
Monoalphabetic substitution-based
ciphers
Monoalphabetic substitution-based ciphers replace a
character or characters with a different character or
characters, based upon some key.
Replacing: abcdefghijklmnopqrstuvwxyz
With the key: POIUYTREWQLKJHGFDSAMNBVCXZ
The message: how about lunch at noon
encodes into EGVPO GNMKN HIEPM HGGH
Gec, Bharuch 7
Polyalphabetic Substitution
In polyalphabetic substitution, each occurrence of a
character can have a different substitute. One
polyalphabetic encryption technique is to find the
position of the character in the text and use that value
as the key.
Here the key is defined as “take the position of the
character in the text, and this position be the shifted
value”.
Gec, Bharuch 8
Polyalphabetic substitution-based ciphers
Similar to monoalphabetic ciphers except multiple
alphabetic strings are used to encode the plaintext.
For example, a matrix of strings, 26 rows by 26
characters or columns can be used.
A key such as COMPUTERSCIENCE is placed
repeatedly over the plaintext.
COMPUTERSCIENCECOMPUTERSCIENCECOMPUTER
thisclassondatacommunicationsisthebest
Gec, Bharuch 9
Polyalphabetic substitution-based ciphers
To encode the message, take the first letter of the
plaintext, and the corresponding key character
immediately above it, C. Go to row C column t in the
26x26 matrix and retrieve the cipher text character V.
Continue with the other characters in the plaintext.
Gec, Bharuch 10
SYMMETRIC ENCRYPTION METHOD
Sender identical keys Receiver
Transmitted
Message
LCD DISPLAY
MICRO
AM RECEIVER
CONTROLLER LCD DISPLAY
The encrypted data gets combined with address bits in encoder and
are transmitted to receiver by transmitter module using an antenna.
The receiver module receives the transmitted data and the decoder
separates the address and data bits. If the addresses are matched the
data bits are decrypted in the microcontroller and the original data
gets displayed in LCD.
Gec, Bharuch 13
TRANSMITTER CIRCUIT DIAGRAM
Gec, Bharuch 16
S T A RT
CHE C K ED IT
NO
B UT T O N
PR E SS ED
Y ES
G E T D A TA FR O M KE YB O A RD
DIS PL A Y O N L CD
C O NV E RT S CA N CO DE T O A SC II
NO CH EC K SE ND
B UT T O N
PR E SS ED
YES
G ET AP P RO P RIAT E
ALG O RIT HM FR O M US ER
NO YE S
C HE CK F OR M O N O
A LP H AB ET IC
G E T K E Y FR O M US ER G E T K EY F RO M U SE R
A DD KE Y T O
FIRS T C HA RA CT E R A DD K E Y TO
E A CH CH AR AC T ER
INC RE M EN T A ND A DD
K E Y BA S ED O N P O S IT IO N
OF CH A RA CT E R
S EN D D AT A
NO AL L DA T A
SE ND
CHECK FOR
START BIT NO
RECEIVED
YES
GET DATA LENGTH
STORE IT IN MEMORY
GET APPROPRIATE
ALGORITHM FROM USER
NO YES
CHECK FOR MONO
ALPHABETIC
DISPLAY IT ON LCD
Gec, Bharuch 18
RECEIVER FLOW CHART
ADVANTAGES
As we are using microcontroller,
There is less heat dissipation problem.
It has built-in heat dissipater.
Gec, Bharuch 19
DISADVANTAGE & LIMITATION
This project limits range of wireless data
communication is 100 feet that depends on RF
modules because RF modules used in this project
works in this range.
Gec, Bharuch 20
APPLICATIONS
This concept of cryptography is used in military level
communication to maintain secrecy of
communication.
Gec, Bharuch 21
CONCLUSION
This project depicts us a clear view about cryptographic
concept in wireless data communication. By implementing
this system the communications is made better & fast. Thus
we can able to send Text message through RF with the help of
Microcontroller.
Here Microcontroller plays an important role; it is the
heart of this technology. It is more useful in military,
education, business, hospitals etc. Number of character sent
can be get increased (by connecting an external memory) and
message transmission to cell or vice versa is possible in Future
development of this Project. So it is user-friendly in function
and easy, cheap to implement.
Gec, Bharuch 22
SCOPE FOR FUTURE
The number of characters transmitted at a time is 64
in our project, which can be increased by adding
external RAM with the microcontroller.
The transmitting distance can be increased by
increasing the power of the transmitter & Receiver.
The LCD display in our project is 16x2, so that it can
display maximum characters of 64 on it. This can also
be increased more.
Picture messages can also transmitted by using a
graphic display.
Gec, Bharuch 23
REFERENCES
TEXTS:
Electronics for you (February 2001)
Electronics for you (April 2001)
Electronics for you (February 2003)
Gokhale “Introduction to telecommunications
Hill Associated “TELECOMMUNICATION”- A beginners guide
Kenneth.J.Ayala (Second edition). “The 8051 Microcontroller Architecture, programming and
applications”.
Muhammad Ali Mazidi , Janice Gillispie Mazidi.(2002) -THE 8051 MICROCONTROLLER AND
EMBEDDED SYSTEMS
Websites:
www.8052.com
www.atmel .com
www.hitachi.com
www.nationalsemiconductor.com
www.dalsemi.com
www.microcontroller.net
Gec, Bharuch 24
THANK YOU
Gec, Bharuch 25