Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Mini Project Report

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 11

CHAITANYA BHARATHI INSTITUTE OF TECHNOLOGY

(AUTONOMOUS)
Gandipet, Hyderabad – 500 075

MINI PROJECT ON
ENCRYPTION AND
DECRYPTION OF TEXT USING
LABVIEW

BACHELOR OF ENGINEERING
IN
ELECTRONICS AND COMMUNICATION ENGINEERING

SUBMITTED BY:
K.NIKHIL (160116735157)
B.PAVAN KUMAR (160116735158)
K.PRANAY(160116735160)

UNDER THE GUIDANCE OF


Sri G.MALLIKHARUUNA RAO
ASSISTANT PROFESSOR, ECE Dept
CONTENTS

1. Introduction

2. Aim

3. Objective

4. Literature survey

5. Methodology

6. Simulation Results

7. Discussion

8. Conclusion

9. References
INTRODUCTION

Encryption has long been used by militaries and governments to facilitate secret
communication. It is now commonly used in protecting information within many kinds of
civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of
companies surveyed utilized encryption for some of their data in transit, and 53% utilized
encryption for some of their data in storage. Encryption can be used to protect data "at rest",
such as files on computers and storage devices (e.g. USB flash drives). In recent years there
have been numerous reports of confidential data such as customers' personal records being
exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps
protect them should physical security measures fail. Digital rights management systems which
prevent unauthorized use or reproduction of copyrighted material and protect software against
reverse engineering are another somewhat different example of using encryption on data at
rest.

Encryption is also used to protect data in transit, for example data being transferred via
networks (e.g. the Interne ,e-commerce), mobile telephones ,wireless microphones ,wireless
intercom systems, Bluetooth devices and bank automatic teller machines. There have been
numerous reports of data in transit being intercepted in recent years. Encrypting data in
transit also helps to secure it as it is often difficult to physically secure all access to networks.
Encryption, by itself, can protect the confidentiality of messages, but other techniques are
still needed to protect the integrity and authenticity of a message; for example, verification of
a message authentication code (MAC) or a digital signature.

Standards and cryptographic software and hardware to perform encryption are widely
available, but successfully using encryption to ensure security may be a challenging problem.
A single slip-up in system design or execution can allow successful attacks. Sometimes an
adversary can obtain unencrypted information without directly undoing the encryption.
AIM
To Encrypt and decrypt the text content using random string theory in lab view.

OBJECTIVE

 Encrypt the given text using symmetric cryptography similar to caeser cipher.

 Use a random string generator to make text more random and make it less predictive.

 Decrypyt the encrypted text using the decryption keys.

LITERATURE SURVEY

ENCRYPTION:

Data encryption translates data into another form, or code, so that only people with access
to a secret key (formally called a decryption key) or password can read it. Encrypted data is
commonly referred to as cipher text, while unencrypted data is called plaintext. Currently,
encryption is one of the most popular and effective data security methods used by
organizations. Two main types of data encryption exist – asymmetric encryption, also known
as public-key encryption, and symmetric encryption.

The purpose of data encryption is to protect digital data confidentiality as it is stored on


computer systems and transmitted using the internet or other computer networks. The
outdated data encryption standard (DES) has been replaced by modern encryption algorithms
that play a critical role in the security of IT systems and communications.

These algorithms provide confidentiality and drive key security initiatives including
authentication, integrity, and non- repudiation. Authentication allows for the verification of a
message’s origin, and integrity provides proof that a message’s contents have not changed
since it was sent. Additionally, non-repudiation ensures that a message sender cannot deny
sending the message.
Data, or plaintext, is encrypted with an encryption algorithm and an encryption key. The
process results in cipher text, which only can be viewed in its original form if it is decrypted
with the correct key. Symmetric-key ciphers use the same secret key for encrypting and
decrypting a message or file. While symmetric-key encryption is much faster than
asymmetric encryption, the sender must exchange the encryption key with the recipient
before he can decrypt it. As companies find themselves needing to securely distribute and
manage huge quantities of keys, most data encryption services have adapted and use an
asymmetric algorithm to exchange the secret key after using a symmetric algorithm to
encrypt data.

On the other hand, asymmetric cryptography, sometimes referred to as public-key


cryptography, uses two different keys, one public and one private. The public key, as it is
named, may be shared with everyone, but the private key must be protected.

The Rivest-Sharmir-Adleman (RSA) algorithm is a cryptosystem for public-key


encryption that is widely used to secure sensitive data, especially when it is sent over an
insecure network like the internet. The RSA algorithm’s popularity comes from the fact that
both the public and private keys can encrypt a message to assure the confidentiality, integrity,
authenticity, and non- reputability of electronic communications and data through the use of
digital signatures.

The most basic method of attack on encryption today is brute force, or trying random keys
until the right one is found. Of course, the length of the key determines the possible number
of keys and affects the plausibility of this type of attack. Alternative methods of breaking a
cipher include side-channel attacks and cryptanalysis. Side-channel attacks go after the
implementation of the cipher, rather than the actual cipher itself. These attacks tend to
succeed if there is an error in system design or execution. Likewise, cryptanalysis means
finding a weakness in the cipher and exploiting it.

DECRYPTION:

The conversion of encrypted data into its original form is called Decryption. It is generally
a reverse process of encryption. It decodes the encrypted information so that an authorized
user can only decrypt the data because decryption requires a secret key or password. In other
words, Decryption is the process of taking encoded or encrypted text or other data and
converting it back into text that you or the computer can read and understand. Some
companies also encrypt data for general protection of company data and trade secrets.
METHODOLOGY

Here in this project we have employed a cryptography technique similar to caeser cipher
and concatenate the resultant text with the random string sequence to make it less predictive .
The Caesar Cipher technique is one of the earliest and simplest method of encryption technique.
It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter
some fixed number of positions down the alphabet. For example with a shift of 1, A would be
replaced by B, B would become C, and so on.Thus to cipher a given text we need an integer
value, known as shift which indicates the number of position each letter of the text has been
moved down.The encryption can be represented using modular arithmetic by first transforming
the letters into numbers, according to the scheme, A = 0, B = 1,…, Z = 25.

Random string generator is used to make the Caesar cipher output more complex and less
predictive. This random generator works on a while loop whose input control is the number of
characters in the given text to select the case out of 26 cases defined for each letter and
concatenates the characters of all the iterations and displays out on an indicator. This resultant
random string is then concatenated to the string sequence that is given and this cycle goes on .

These resultant random sequences are now converted binary (byte)array and fed to an in place
element structure to avoid the duplicates of these sequences to make sure the encryption
remains unique at any instant.

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic
keys for both encryption of plaintext and decryption of cipher text. The keys may be identical
or there may be a simple transformation to go between the two keys. The keys, in practice,
represent a shared secret between two or more parties that can be used to maintain a private
information link. This requirement that both parties have access to the secret key is one of the
main drawbacks of symmetric key encryption, in comparison to public-key encryption.
SIMULATION RESULTS

Fig.1

DISCUSSION
RANDOM STRING GENERATOR:

1) Use decimal to ASCII numbers for your letters.


2) Generate a random number from 0-25.
3) Add the result to the first letter (A) position which is 65.
4) Repeat 3 times.
5) Convert to U8 and then use Byte Array to String to get your string.

Fig.2

For lower case , change the 25 to 51 and then add 7. If the random number result is greater
than 25.
BLOCK DIAGRAM

ENCRYPTOR:

Fig.3

DECRYPTOR:

Fig.4

FRONT PANEL:

Fig.5
 After the generation of a random string .we now send the binary array of strings to an in
place element structure to avoid multiple or duplicate copies of random string sequences
that are unique at any instant of time.

 At the decryption end we simply perform the inverse of encryption with decryption keys
and encrypted text as control input. The decryption keys are same as the encryption
keys since we have adopted symmetric cryptography technique.

 On running, we get the decrypted text same as the one we have encrypted earlier and a
Boolean led indicator lights up upon successful decryption. In case of wrong pass keys,
we get a random string sequence and the led indicator remains off to indicate the wrong
password.

CONCLUSION

 The original data that is transmitted through encryption is same as the retrieved data
after the decryption process. As information security is one of the growing concern in
various fields like nation security, defense, banking and protection of various
confidential data. The application designed provides a very high security in transmission
of a text file.

 This application can be used as an effective technique in programming scenarios to


secure vital codes and secure transmission in research departments. The application
possesses immense scope for further development. The development relies on the
factors providing transmission security. The application can be further designed for
word documents and other types of text files
REFERENCES

[1. ]. Sruthi, S., Athira Vijay, Shejo Jose, and V. Athira. "Encryption & decryption of
text file and audio using LabVIEW. " In 2017 International Conference on Networks &
Advances in Computational Technologies (NetACT), pp. 462-466. IEEE, 2017.

[2].http://nebula.wsimg.com

[3].https://forums.ni.com/t5/LabVIEW/Simple-Encryption-Using-Labview

[4]. https://www.geeksforgeeks.org/caesar-cipher-in-cryptography

You might also like