International Research Journal of Engineering and Technology (IRJET) Volume: 09 Issue: 06 | Jun 2022
www.irjet.net
e-ISSN: 2395-0056 p-ISSN: 2395-0072
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS MR. A Y PRABHAKAR, ANKIT PATHAK, AVANISH PAL, AYUSH MAHESHWARI Professor, Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. ---------------------------------------------------------------------***--------------------------------------------------------------------ancient Greece wrote messages on wood that had been Abstract - Previously, encryption keys for digital systems had
covered with wax to send a secret letter. In the same way, we must hide important information in the digital age. To accomplish this, we also work to create it "cover" for our private data. The technical word for this process is encryption. Digital systems frequently encrypt data using hardware or software techniques that generate an encryption key. In these tactics, algorithms that generate random keys are frequently employed.
been generated using hardware and software techniques. However, these techniques can be duplicated because they are pseudo-random. Because of this, a hacker can readily duplicate and enhance the method that produces the encryption key in software. This problem can be resolved by creating a random encryption key that doesn't adhere to any algorithm or pattern. To generate this kind of key, a hybrid methodology is suggested in this research. The digital and analogue components are combined in the suggested circuit.
But any algorithm can contain a small amount of randomness. After a predetermined number of repetitions, the process will be repeated, enabling a hacker to obtain the encryption key and steal sensitive data.
The analogue domain is represented by Chua's circuit with a random noise source. Two capacitors, a resistor, and an inductor make up Chua's circuit, which may generate an oscillating waveform with a distinct output.
Pseudo-randomness is used in the vast majority of encryption key generation techniques. Since they are based on a particular algorithm, it is possible to generate the encryption key by deciphering its pattern or using reverse engineering methods.
The Chua's circuit is fueled by a randomized input thanks to the addition of noise in the circuits, which produces a much more random output.
Making an encryption key that defies algorithmic analysis and cannot be reverse-engineered is the solution to this problem. How to achieve this goal is explained in this project. Since no algorithm will be used in the method for generating encryption keys outlined in this project, the encryption key will not contain any repetitions.
The key is generated, and then the data is stored on a digital storage medium. Sd card is used to store the digital bits, and Proteus8 is used to simulate the analogue component. RXD TXD Virtual Terminal may display the circuit's 8-bit digital output signals. The system makes use of an analogue circuit diagram, a digital circuit diagram, a virtual terminal, and an SD card to represent the key kept on a memory block.
This study will present a novel approach to producing encryption keys for digital systems. The keys will be generated using a hybrid strategy that connects an analogue circuit to a digital circuit. The analogue circuit will incorporate Chua's circuit as well as a short chain of inverters. Chua's circuit, which is only a straightforward configuration of electrical parts, generates oscillations with no recurring output. The Chua's circuit has various requirements. two capacitors, one nonlinear component, and one resistor.
The project's final output is a randomly generated 8-bit encryption key for digital systems
Key Words: Chua’s circuit, Noise generator, Multisim, Proteus 8.
1. INTRODUCTION Numerous techniques have been developed by humans to protect sensitive data from unauthorized access. People in
© 2022, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 320