International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 1 | Jan-2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
Simulation based design and analysis of combined effect of various data security techniques used during the transmission of 128-bit digital data generated from 128-bit data generation unit written in VHDL Code using Xilinx ISE 9.2i software 1Paresh
Kumar Pasayat, Asst.Professor, IGIT Government Engineering College, Odisha, India Sony Naik, M.Tech student, IGIT Government Engineering College, Odisha, India
2
---------------------------------------------------------------------***--------------------------------------------------------------------transmitted directly without using encryption technique, then there is more probability of hacking important issue due to the hacking of data. In order to overcome this problem, a technique known as encryption has and corruption of data by the attacker. Due to which, come up as a solution, and plays an important role in the various data security techniques have been information security system. The desired 128-bit data is designed by the designer to provide security to the encrypted using modified DES and Hamming (224,128) code data. The transformation of original data into a data technique in addition to the use of modified iterated product which is not in the readable form is known as cipher to produce 256-bit encrypted data. As the proposed encryption and the process of reversing it back to a design is having the combined effect of modified DES, readable form is known as decryption. The proposed Hamming (224,128) code and modified iterated product design shows how the 128-bit data is transmitted into cipher data security techniques, the security level is very high space after doing encryption using modified DES and as compared to the design having individual data security Hamming (224,128) code techniques. technique. Due to the increment of key size from 56-bits to
Abstract - In the recent years, data security has become an
112-bits in modified DES, the design is more resistive to the Brute-Force Attack. The other advantages of the proposed work are: Confidentiality, Authentication and Integrity. This can be used in the field of Automated teller machine (ATM) transactions, Banking sector, Military sector and protecting confidential company information. The proposed work is done by using VHDL language. The code is tested and simulated using Xilinx ISE9.2i software.
1.1 Project Model
Key Words: ALU (Arithmetic Logic Unit), Encryption, Decryption, VHDL (Very High speed Integrated Circuit Hardware Description Language).
1. INTRODUCTION For the transmission of 128-bit digital data, the first thing is to generate the data using data generation unit. The data generation unit consists of three components. First component is the control unit which generates the control signals. Second component is the data path unit which consists of one Arithmetic and Logic Unit (ALU) and backup unit and the ALU performs different operations based on the value of the control signal. Third component is the memory unit which is used to store the 128-bit data. The memory unit is controlled by one chip enable signal (C). When the value of C is ‘1’, then the memory unit gives output. It gives no output when the value of C is ‘0’. When C=’0’, the result is obtained from the backup unit. If the digital data is © 2016, IRJET
|
Impact Factor value: 4.45
Fig-1: Project Model of the proposed work
|
ISO 9001:2008 Certified Journal
|
Page 245