Secure Communication With Lossless Data Compression Using Dpd Encoding

Similar documents
A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

A High Performance Binary to BCD Converter for Decimal Multiplication Using VLSI Technique

BS801E-BSCS. Cryptography

A Modified Playfair Encryption Using Fibonacci Numbers

FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E

BLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION

Light Weight Cellular Automata Computations and Symmetric Key for Achieving Efficient Cryptography

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT

Module -10. Encoder. Table of Contents

Pipelined Implementation of Densely Packed Decimal Encoding

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Computers and Security

Improved Design of High Performance Radix-10 Multiplication Using BCD Codes

A Combined Encryption Compression Scheme Using Chaotic Maps

VHDL Implementation of Arithmetic Logic Unit

Cryptography. What is Cryptography?

International Journal of Computer Engineering and Applications, ENCRYPTION & DECRYPTION PROCESS BY USING NEWSO TRANSPOSITION METHOD

RANDOM KEY & THE NTH PRIME NUMBER BASED SYMMETRIC KEY ENCRYPTION ALGORITHM

Cryptography Lesson Plan

IMPORTANCE OF NUMBER THEORY IN CRYPTOGRAPHY

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key

AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS

Advanced Cryptographic Technique Using Double Point Crossover

AN INTEGRATED BLOCK AND STREAM CIPHER APPROACH FOR KEY ENHANCEMENT

Implementation of Full -Parallelism AES Encryption and Decryption

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Information Science 2

A New Encryption and Decryption Algorithm for Block Cipher Using Cellular Automata Rules

Data Encryption on FPGA using Huffman Coding

A.Vinaya Babu Principal, JNTUCE J.N.T.U.H, Hyderabad A.P, India. Ravindra Babu Kallam Research Scholar, J.N.T.U, Hyderabad A.

Journal of Global Research in Computer Science A UNIFIED BLOCK AND STREAM CIPHER BASED FILE ENCRYPTION

16-BIT DECIMAL CONVERTER FOR DECIMAL / BINARY MULTI-OPERAND ADDER

DLD VIDYA SAGAR P. potharajuvidyasagar.wordpress.com. Vignana Bharathi Institute of Technology UNIT 3 DLD P VIDYA SAGAR

A Novel Model for Encryption of Telugu Text Using Visual Cryptography Scheme

ISSN: Page 320

Viability of Cryptography FINAL PROJECT

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Implementation of Hamming code using VLSI

CRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:

I. Introduction. India; 2 Assistant Professor, Department of Electronics & Communication Engineering, SRIT, Jabalpur (M.P.

Bus Matrix Synthesis Based On Steiner Graphs for Power Efficient System on Chip Communications

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

Chapter Three. Digital Components

CHAPTER 17 INFORMATION SCIENCE. Binary and decimal numbers a short review: For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 4731 =

A Proposed Cipher Technique with a Study of Existing Cryptography Techniques

Ciphertext Cryptanalysis Using DES Functionality In Spartan3Upto 4 Round.

CRYPTOGRAPHY & DIGITAL SIGNATURE

An Application of Graph Theory in Cryptography

A Proposed Method for Cryptography using Random Key and Rotation of Text

For decimal numbers we have 10 digits available (0, 1, 2, 3, 9) 10,

Enhanced LSB Based Audio Steganography

International Journal of Advance Engineering and Research Development CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY

II. LITERATURE SURVEY

Written exam for IE1204/5 Digital Design Thursday 29/

An Efficient FPGA Implementation of the Advanced Encryption Standard (AES) Algorithm Using S-Box

A nice outline of the RSA algorithm and implementation can be found at:

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

ECE Lecture 2. Basic Concepts of Cryptology. Basic Vocabulary CRYPTOLOGY. Symmetric Key Public Key Protocols

DataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.

Network Security Issues and Cryptography

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

Design of a New Cryptography Algorithm using Reseeding-Mixing Pseudo Random Number Generator


DESIGN OF DECIMAL / BINARY MULTI-OPERAND ADDER USING A FAST BINARY TO DECIMAL CONVERTER

Digital Image Steganography Using Bit Flipping

International Journal of Computer Engineering and Applications,

Secret Key Cryptography

Implementation of Pipelined Architecture for AES Algorithm using Reversible Logic

Chapter 7 Lab A: Exploring Encryption Methods

Efficient Radix-10 Multiplication Using BCD Codes

FPGA Based Antilog Computation Unit with Novel Shifter

DIGITAL SYSTEM FUNDAMENTALS (ECE 421) DIGITAL ELECTRONICS FUNDAMENTAL (ECE 422) COURSE / CODE NUMBER SYSTEM

DESIGN AND IMPLEMENTATION OF SDR SDRAM CONTROLLER IN VHDL. Shruti Hathwalia* 1, Meenakshi Yadav 2

Computer Sc. & IT. Digital Logic. Computer Sciencee & Information Technology. 20 Rank under AIR 100. Postal Correspondence

Cryptography Worksheet

Optimized AES Algorithm Using FeedBack Architecture Chintan Raval 1, Maitrey Patel 2, Bhargav Tarpara 3 1, 2,

International Journal of Mathematical Archive-7(2), 2016, Available online through ISSN

FPGA Based Design of AES with Masked S-Box for Enhanced Security

Chapter 4. Combinational Logic

Reduced Delay BCD Adder

Enhancement Caesar Cipher for Better Security

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM

D I G I T A L C I R C U I T S E E

FPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

IMPLEMENTATION OF EFFICIENT AND HIGH SPEED AES ALGORITHM FOR SECURED DATA TRANSMISSION

Agenda EE 224: INTRODUCTION TO DIGITAL CIRCUITS & COMPUTER DESIGN. Lecture 1: Introduction. Go over the syllabus 3/31/2010

Performance Analysis of CORDIC Architectures Targeted by FPGA Devices

AES1. Ultra-Compact Advanced Encryption Standard Core AES1. General Description. Base Core Features. Symbol. Applications

Webpage: Volume 5, Issue VII, July 2017 ISSN

CPE 323 REVIEW DATA TYPES AND NUMBER REPRESENTATIONS IN MODERN COMPUTERS

High Throughput Radix-D Multiplication Using BCD

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

Secret Key Cryptography

MODIFIED RECURSIVE MODULO 2 N AND KEY ROTATION TECHNIQUE (MRMKRT) Rajdeep Chakraborty* 1, Avishek Datta 2, J.K. Mandal 3

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

Transcription:

International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Secure Communication With Lossless Data Compression Using Dpd Encoding Er.Aradhana Raju 1, Purabi Mahato 2, Ritto K. Babu 3, Richi Patnaik 4 1-2-3-4 Department of ECE, Silicon Institute of Technology, Bhubaneswar, Khurda (Dist.), Odisha, India 751024 ABSTRACT:- Densely Packed Decimal (DPD) is an refinement of the Chen ho encoding. It gives the same compression and speed advantages but is not limited to multiples of three digits. The DPD encoding allows arbitrary-length decimal numbers to be coded efficiently while keeping decimal digit boundaries accessible. During the last decades, information security has become a major issue. Cryptography plays major roles to the fulfillment of these demands. This paper shows the implementation of the Densely Packed Decimal Encoding, proposed by M. F. Cowlishaw and simulate using available software platforms. Then transmit the compressed data by using secure communication technique. Keywords:-BCD, DPD, Encryption, Decryption. I. INTRODUCTION In communication data transmission occurs in binary form which is based on digital electronics. The most common encoding that is widely used for decimal data is Binary Coded Decimal Encoding (BCD) in which a single decimal digit is represented by four bits. The Binary Coded Decimal encoding has always dominated decimal arithmetic algorithms and their hardware implementation by virtue of ease of conversion between machine- and human-readable formats, as well as a more precise machine-format representation of decimal quantities. 1.1Data Compression As compared to typical binary formats, BCD's principal drawbacks are a small increase in the complexity of the circuits needed to implement basic mathematical operations and less efficient usage of storage facilities.bcd does not make optimal use of storage (about 1/6 of the available memory is not used in packed BCD). Chen and Ho described a scheme for encoding decimal data which is quite efficient. The Chen-Ho encoding, as it is called, compresses three decimal digits into 10 bits with very little waste, giving a 17% more compact encoding than BCD(which uses 12 bits to store three decimal digits).it uses a Huffman code, with most significant bits selecting various digit combinations. The main advantage of Chen-Ho encoding over binary representation in 10 bits is that only simple Boolean operations are needed for conversion to or from BCD; multiplication and divisions are not required. Another encoding technique proposed by M. F. Cowlishaw, Densely Packed Decimal (DPD), uses an equivalent encoding to the Chen-Ho scheme, but it is an improvement over Chen-Ho encoding and hence has further advantages. The main advantage over Chen-Ho encoding is that it is not restricted to the fact that for compression the decimal digits should be in multiple of three, which is the primary requirement of Chen-Ho encoding. DPD encoding technique results in efficient decimal arithmetic and makes efficient and optimized use of available resources such as storage or hardware implementation. And thus resulting in lossless data compression. 1.2 Secure Communication During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to the fulfillment of these demands. Secure communication is a way to transmit serial binary data with encrypted form. Cryptography is a physical process that scrambles information by rearrangement and substitution of content, making it unreadable to anyone except the person capable of unscrambling it. Unscrambled information called plaintext is to be IJMER ISSN: 2249 6645 www.ijmer.com Vol. 6 Iss. 5 May 2016 5

transmitted. e.g.:-credit card number, password, bank account etc. A key is used to encrypt and decrypt the plaintext data. Plaintext data is encrypted to form the cipher text and the parallel data converted to serial form which is then transmitted. At the receiver end by using same key we can decrypt the data from cipher text data. II. DENSELY PACKED DECIMAL ENCODING Densely packed decimal (DPD) is an efficient method for binary encoding decimal digits. The traditional system of binary encoding for decimal digits, known as BCD, uses four bits to encode each digit, resulting in significant wastage of binary data bandwidth (since four bits can store 16 states and are being used to store only 10). Densely packed decimal is a more efficient code that packs three digits into ten bits using a scheme that allows compression from, or expansion to, BCD with only two or three gate delays in hardware. 2.1 Conversion From Bcd To Dpd Like Chen Ho encoding, DPD encoding classifies each decimal digit into one of two ranges, depending on the most significant bit of the binary form: "small" digits have values 0 through 7 (binary 0000 0111), and "large" digits, 8 through 9 (binary 1000 1001). Once it is known or has been indicated that a digit is small, three more bits are still required to specify the value. If a large value has been indicated, only one bit is required to distinguish between the values 8 or 9.When encoding, the most significant bit of each of the three digits to be encoded select one of eight coding patterns for the remaining bits, according to the following table. The table shows how, on decoding, the ten bits of the coded form in columns b9 through b0 are copied into the three digits d2 through d0, and the remaining bits are filled in with constant zeros or ones. Bits b7, b4 and b0 (c, f and i) are passed through the encoding unchanged, and do not affect the meaning of the other bits. The remaining seven bits can be considered a seven-bit encoding for three base-5 digits.bits b8 and b9 are not needed and ignored when decoding DPD groups with three large digits (marked as "x" in the last row of the table above), but are filled with zeros when encoding. The eight decimal values whose digits are all 8s or 9s have four coding each. The bits marked x in the table above are ignored on input, but will always be 0 in computed results. (The 8 3 = 24 non-standard encodings fill in the gap between 10 3 =1000 and 2 10 =1024.) 2.2 IMPLEMENTATION OF DPD SYSTEM The compression and expansion block of Densely Packed decimal encoding system is designed so as to implement the DPD encoding which is proposed by M. F. Cowlishaw: COMPRESSION BLOCK For compression, three digit decimal numbers is passed as input to the compressing block where Decimal to BCD converter converts the binary number in BCD encoded number of 12 bits. This 12 bit BCD number is then fed to DPD compression module which finally compresses the number and encodes it in 10 bits densely packed decimal form. IJMER ISSN: 2249 6645 www.ijmer.com Vol. 6 Iss. 5 May 2016 6

EXPANSION BLOCK For expansion the 10 bits DPD number is now the input to the expansion block where first it is expanded to BCD form by DPD expansion module. The 12 bits BCD output is then converted to decimal number in simple binary format by BCD to decimal converter. 2.3 Result And Simulation The following are the simulation results that we got after implementation of the DPD compression and expansion blocks respectively: Simulation output of Compression Block Simulation output of Expansion Block III. SECURE COMMUNICATION AND ITS IMPLEMENTATION Plaintext - Unscrambled information to be transmitted. It could be a simple text document, a credit card number, a password, a bank account number, or sensitive information such as payroll data, personnel information, or a secret formula being transmitted between organizations. Cipher text - Represents plain text rendered unintelligible by the application of a mathematical algorithm. Cipher text is the encrypted plain text that is transmitted to the receiver. Cryptographic Algorithm Cryptography derived its name from Greek word called Kryptos which means Hidden Secrets.A mathematical formula used to scramble the plain text to yield cipher text. Converting plain text to cipher text using the cryptographic algorithm is called encryption, and converting cipher text back to plain text using the same cryptographic algorithm is called decryption. Key - A mathematical value, formula, or process that determines how a plaintext message is encrypted or decrypted. The key is the only way to decipher the scrambled information. Encryption The process of coding text. The process of disguising a message so as to hide the information it contains; this process can include both encoding and enciphering. IJMER ISSN: 2249 6645 www.ijmer.com Vol. 6 Iss. 5 May 2016 7

Decryption- The process of decoding text. The decryption process involves converting the encrypted data back to its original form for the receiver s understanding. 3.1 IMPLEMENTATION OF SECURE COMMUNICATION SYSTEM 3.1.1 Encryption Data is entered into the DMUX in a linear sequential manner. At select line 000 at the DMUX data is present at the zero th (0) position of DMUX output. The data is then xored with the key. The select line is provided by the same counter to both the MUX and DMUX. The only thing is that the pulse to the MUX is delivered after a delay of 30ns. And finally we get the cipher text at the output of the MUX. 3.1.2 Decryption The same thing mentioned above is done in decryption, except that the input here is the cipher text and the output is that plaintext as exact as was input to the encryption system IV. FINAL RESULT AND SIMULATION Following are the RTL schematic and final simulation results that we have got after encoding the BCD sample into DPD and then converting this plain text into cipher text using the above explained mechanism (encryption) then transmitting it to the intended receiver where the exact reverse process is carried out (decryption) to obtain the plain text sent. FINAL RTL SCHEMATIC FINAL SIMULATION RESULTS IJMER ISSN: 2249 6645 www.ijmer.com Vol. 6 Iss. 5 May 2016 8

V. CONCLUSION Here we have implemented DPD logic in VHDL code to compress the data and then transmitted it by using Secure Communication. It has many advantages such as: 1) Reduce disk space required. 2) The log recorders can become shorter. 3) Compressed data can be transferred faster to and from disk. 4) Faster transfer rates across the network. By applying this coding and communication scheme a larger percentage of hardware complexity can be reduced as well as efficiency can be increased with high degree of security. Various applications in financial and commercial sector can be optimized by this scheme. REFERENCES [1]. S. Rahil Hussian, V. Narasimha Nayak, Dr.Fazal Noorbasha, S. Dayasagar Chowdary, Lakshmi Narayana Thalluri VLSI Implementation of Densely Packed Decimal Converter to and from Binary Coded Decimal using Reversible Logic Gates. IJERA ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 3, May-Jun 2012, pp. 594-599. [2]. M.F Cowlishaw, "Densely packed decimal encoding". IEEE Proceedings Computers and Digital Techniques (Institution of Electrical Engineers), 149 (3),pp.102-104,May 2009. [3]. Kaivani,Alhosseini, A.Z.,Gorgin, S.Fazlali, [4]. "Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R",Information Technology, 2006. ICIT '06. 9th International Conference on,on page(s): 273-276,Volume:Issue:18-21 Dec. 2006. [5]. VHDL programming by example 4 th edition By Douglas Perry. [6]. Digital Electronics 4 th edition,morris Mano. [7]. A Kaivani, A Alhosseini, S Gorgin. and M Fazlali. Reversible Implementation of Densely-Packed-Decimal Converter to and from Binary-Coded-Decimal Format Using in IEEE-754R, pp.273-276, 9th International Conference on Information Technology (ICIT'06), 2009. [8]. E. Biham, A fast new DES implementation in software, Proceedings of Fast Software Encryption, LNCS 1267, 260-272, Springer 2000. [9]. [8]M.F Cowlishaw, "Summary of Densely Packed Decimal encoding". [10]. http://speleotrove.com/decimal/dpdecimal.html [11]. Binary to BCD converter, http://www,engr.udayton.edu/faculty/jloomis/ece314/notes/devices/binary_to_bcd/bin_to_b CD.html [12]. Packed decimal encoding IEEE-754-2008 by: J.H.M. Bonten. IJMER ISSN: 2249 6645 www.ijmer.com Vol. 6 Iss. 5 May 2016 9