Sei sulla pagina 1di 7

IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 536-542

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com ISSN 2001-5569

Data Encryption and Secure Transmission by Using Wi-Fi


Technology
Irfan A
Student, M.Tech, ECE Department, Srinivas Institute of Technology,
Mangalore, India,
mohammedirfan904@gmail.com
Mr. Udayakumar,
Associate Professor, ECE department, Srinivas Institute of technology,
Mangalore, India,
udayasanthosh@gmail.com

Abstract-This paper proposes a new design scheme and data encryption system by using Wi-Fi technology. This system
uses a LFSR based PN sequence generation technique based on FPGA. The initial key generated by PN sequence can be used
to output stream cipher, by which the plain texts are encrypted. Then the scheme realizes a safe and reliable information
transmission by Wi-Fi module.

In this scheme the communication exists between the FPGA board and laptops. The simulation results show that the system
is available.

Index Terms—Encryption; Wi-Fi technology; FPGA; LFSR; PN sequence;

I. INTRODUCTION

We are living in the information age. We need to keep information about every aspect of our lives. In other words, information
is an asset that has a value like any other asset. As an asset, information needs to be secured from attacks. To be secured,
information needs to be hidden from unauthorized access (confidentiality), protected from unauthorized change (integrity), and
available to an authorized entity when it is needed (availability). During the last two decades, computer networks created a
revolution in the use of information. Information is now distributed. Authorized people can send and retrieve information from a
distance using computer networks.

Today, the mobile communication is increasing at rapid pace, people want to share and print their media anytime and anywhere.
This requires security and reliability in the communication because the information can easily monitored or theft. Thus, the security
and reliability need much attention [1]. This paper designs a LFSR based PN sequence generation based on FPGA, which
combined with Wi-Fi technology to achieve data secure transmission as mentioned in [2] and [3].

Initially the data is encrypted at the sender and transmitted to the remote receiver. The technique which is used in encryption
and decryption has high security feature and can be easily applied, thus the no one can monitor the secured information nothing but
ciphertext data. Meanwhile, at the receiver end corresponding decryption algorithm is used to recover the plaintext data, so that safe
and reliable transmission can be achieved [4] and [5].

Irfan A, IJRIT 536


IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 536-542

The detail of this scheme is organized as follows. In Section 2, it describes the overall scheme design of Wi-Fi technology
based encryption system. Section 3 introduces the scheme design module of hardware circuit. In Section 4 it shows the hardware
implementation and analysis results. Finally the conclusion is in Section 5.

II. SCHEME DESIGN AND PRINCIPLES


A. LFSR Based PN Sequence Generation
The system uses the LFSR based PN sequence to generate the initial key. Initial key sequences such as z={zi} are generated
from PN sequence. The system uses initial key to encrypt the plaintext sequence m={mi} bit by bit to obtain the ciphertext c={ci}.
The following steps are to generate the initial key;

• Define length of the PN sequence and generate the polinomials in PN sequence.


• Perform the shift operation and take the output bits as a parallel by using SIPO.
• Generate the subkey, by masking desired key with generated polinomial.
• Finally initial key is generated.
Equation (1) and (2) shown below are conversion of ciphertext and plaintext formulas respectively.

Ci = mi zi (1)
Pi = Ci zi (2)

Here the secret key plays an important role in this scheme because, if it is unknown to the others, then the information is
undecipherable [6]. Therefore, the {Zi} is uniformly distributed in random sequence. So it is very significant to generate other
better performance stream cipher in the near future [7].

This system uses LFSR based PN sequence generation technique and digital circuit theory. The schematic diagram of
encryption algorithm is shown in Figure 1. The embedded encryption core part is to realize information data encryption. The
encryption algorithm in the core can be changed, and because it is a high performance FPGA technology, so during the upgrade
process the encryption core can be substituted without changing the circuit [8]. Encryption reset and upgrade of the system are very
convenient.

Figure1: schematic diagram of the encryption algorithm

B. System Design Principles


The Wi-Fi encryption system has transmitter and receiver part, at the transmit side; input plaintext section, the plaintext display
at sending side, encryption core of sending side and Wi-Fi sender module. At the receiver side; Wi-Fi receiving side module,
decryption key input section at receiving side, display part at receiving side and the decryption core of receiving side [9]. The
overall design concept of this article is based on FPGA chip as the core of controller. The switches are an information input device,
a LED display device and Wi-Fi module as the wireless transceiver equipment. Therefore the system can achieve safe and reliable
transmission of the information [10]. This overall system design can be realized in the laboratory. The principle diagram of this
scheme is shown in Figure 2.

Irfan A, IJRIT 537


IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 536-542

III. HARDWARE CIRCUIT MODULE

In allusion to the malpractice about pure software encryption techniques, this article puts forward an exploring thought and
design process of a hardware encryption and decryption system. In present, the data encryption software provides an increasing
security method for the different user and requirement. However, this way is not the perfect solution of the security problem. Once
the key is be obtained by other people, there is no security to this software. Hardware encryption method can solve this problem. In
Figure 3 and Figure 4 shows the software working flow chart of the design.

This system consists of two hardware modules: Wi-Fi module and FPGA circuit. The system uses the LFSR based PN sequence
generation technique to encrypt the information. The communication is completely depended on the hardware implementation and
it gives the security and reliability of the encryption. In this scheme of design uses Wi-Fi module because to achieve long distance
wireless information transmission. The includes: clock module, reset module, Switches controller module, LED module, the main
control CPU module, generating PN sequence key module, encryption module, buffer module and asynchronous serial transmission
module. The receiver also includes as same as sender.

This system is designed to provide hardware encryption and decryption, key storage, on-line update function. The main
working progress is described as follow: When the information needs to be encrypted, the custom loads the original information to
the hardware through PCI from the computer. Then, this information is encrypted by the encryption program in FPGA. The
cryptogram is stored into the portable storage device by the self-defined interface. In the decryption process, the hardware derives
information from the portable storage device firstly, then, decrypts and stores this information as files in the computer through PCI.
In addition, this system has customer identification function. It defines different customers by providing different keys. By this
way, it is effective to avoid losing the information of the different customers.

IV. HARDWARE IMPLEMENTATION AND TEST ANALYSIS

The technique which is used PN sequence generation is very complex but has good pseudo random property, unpredictability
and extremely sensitivity characteristics for initial values [11]. These characteristics make LFSR secure communication become an
important research subject in secure communication field. This system uses FPGA with high performance. The system downloads
encryption/decryption algorithm IP core into FPGA, which easily improved the performance of encryption in IP core. Figure 5
shown is the photo of hardware circuit board. FPGAs have traditionally found use in high speed custom digital applications where
designs tend to be more constrained by performance rather than cost. The explosion of integration and reduction in price has led to
the more recent widespread use of FPGAs in common embedded applications. FPGAs, emerging as the next digital revolution will
bring about change in much the same way that microprocessors did. This project is dependent on the LFSR. It’s very powerful and
it can get the initial values to perform the operations. The simulation results of LFSR based PN sequence generation module for
encryption and decryption is shown in figure 6 and figure 7 respectively.

Irfan A, IJRIT 538


IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 536-542

Figure 2: the principle diagram of the scheme

(Plain)

Figure 3: The flow chart for Encryption design

Irfan A, IJRIT 539


IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 536-542

Figure 4: The flow chart for Decryption design

Figure 5: Hardware circuit board

Figure 6: Simulation result for Encryption

Irfan A, IJRIT 540


IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 536-542

Figure 7: Simulation result for Decryption

Figure 8 and figure 9 gives the system test results and analyzes on it, which verifies the function of this test board. The
experimental results show that the system can realize the goal of our scheme.

V. CONCLUSION
This paper designs a wireless information transmission system based on FPGA and Wi-Fi technology and does its hardware
implementation. This system uses LFSR based PN sequence generation technique to generate the secrete key and uses its output
stream cipher to encrypt the plaintext, then the information can be transmitted by using Wi-Fi module. The transmitted information
is safe and reliable. The FPGA board and Wi-Fi module can realize the goal of our scheme design successfully. In this paper, it
illustrates the overall design framework, the schematic diagram of encryption algorithm, flow chart of the design, hardware circuit
board and some analysis results, which can show the real time and better encryption characteristics of this Wi-Fi encryption system.

Figure 8: The result of Encrypted text.

Figure 9: The result of Decrypted text

REFERENCES

Irfan A, IJRIT 541


IJRIT International Journal Of Research In Information Technology, Volume 2, Issue 5, May 2014, Pg: 536-542

[1] Ping An Wang. Information security knowledge and behaviour: An adapted model of technology acceptance [J].
Education Technology and Computer (ICETC), 2010(2):364-367.
[2] Ravichandiran C, Vaithiyanathan V. An Incisive SWOT Analysis of Wi-Fi, Wireless Mesh, WiMAX and Mobile
WiMAX Technology[J]. Education Technology and Computer, 2009:239-243.
[3] Qi E H, Meylemans M, Hatting M. Augmenting wireless LAN technology for Wi-Fi PAN[J]. Signals, Systems and
Computer, 2009:321-324.
[4] Jing Pan, Na Qi, Bingbing Xue, Qun Ding. “Design and Hardware implementation of FPGA & chaotic encryption based
wireless transmission system”. International Journal of Innovative Computing, Information and Control (IJICIC), pp692-
695 2011.
[5] Zhiqiang Li Xiaoxin Sun, Changbin Du Qun Ding. “Hardware Design and Implementation of Wi-Fi Technology Based
Encryption System”. International Conference on Sensor Network Security Technology and Privacy Communication
System(SNS & PCS), 2013.
[6] Qun Ding, Yong Zhu, Fangyi Zang, Xiyuan peng, “Discrete Chaotic Circuit and The Property Analysis of Output
Sequence”. International Symposium on Communications and Information Technologies (IEEE ISCIT Beijing), 2005.
[7] Dabal P, Pelka R.FPGA implementation of chaotic pseudo random bit generations[J]. Mixed Design of Integrated Circuits
and Systems(MIXDES), 2012:260-264.
[8] Qun Ding, Jing Pang, Jingqing Fang, Xiyuan Peng. “Designing of Chaotic System Output Sequence Circuit Based on
FPGA and its Possible Applications in Network encryption card”. International Journal of Innovative Computing,
Information and Control (IJICIC), Vol.3, No.2, pp449-456 2007.
[9] Zhan Lei, Zhao Jing. A hardware encryption and decryption system design[J]. Computer Engineering and Technology
(ICCET), 2012:75-77.
[10] Qun Ding, Jing Pan, Lu Wang, Guanrong Chen. “The Cipher Code Parameter Selection and Impact on Output Cycles”.
2009 International Workshop Chaos-Fractals Theories and Applications (IWCFTA2009), pp143-147 2009.
[11] Yu Fei, Zhao Jie, Wu Yating. A dynamic password chip design based on Logistic chaotic algorithm[J]. Communication
Software and Networks (ICCET), 2011:255-259.

Irfan A, IJRIT 542

Potrebbero piacerti anche