Você está na página 1de 4

CRYPTOGRAPHIC SECURED COMMUNICATION FOR MILITORY APPLICATION

ABSTRACT: With the continued international proliferation of military communication


technology, equipment vendors are challenged to provide communications security solutions that are appropriate for these applications. Addressing these challenges is complicated by the fact that no encryption standard exists for international government and military communications applications. Harris Corporation has leveraged its expertise in encryption algorithm design, type 1 hardware design, and embedded system design to develop a cost-effective, customizable encryption algorithm for military and government communications applications. The algorithm is the second generation of the highly successful Citadel cryptographic algorithm. It was designed against a military/government threat model and specifically addresses the rigorous requirements dictated by these applications. It does so in a manner that is both flexible and cost effective. This paper will begin with a brief review of the requirements for military-grade encryption products. It will continue with an overview of the algorithm design along with discussion on the features responsible for its military grade strength.

INTRODUCTION:
Todays cryptography is vastly more complex than its predecessor. Unlike the original use of cryptography in its classical roots where it was implemented to conceal both diplomatic and military secrets from the enemy, the cryptography of today, even though it still has far-reaching military implications, has expanded its domain, and has been designed to provide a cost-effective means of securing and thus protecting large amounts of electronic data that is stored and communicated across corporate networks worldwide. Cryptography offers the means for protecting this data all the while preserving the privacy of critical personal financial, medical, and ecommerce data that might end up in the hands of those who shouldnt have access to it. The use of transformations of data intended to make the data useless to one's opponents. The conversion of data into a secret code for

transmission over a public network. The original text, or "plaintext," is converted into a coded equivalent called "ciphertext" via an encryption algorithm. The ciphertext is decoded (decrypted) at the receiving end and turned back into plaintext.

BLOCK DIAGRAM:
INPUT ENCRYPT communication path DECRYPT

DISPLAY

Block diagram of cryptographic method Display PC

Encrypted data

8 0 5 1
Crystal

RS232 Switch

RS232

8 0 5 1

Crystal

Power supply

Power supply

Encrypt device

decrypt device

WORKING:

Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext). Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms which create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys are trivially breakable and therefore less than useful for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks. In this system we are using microcontroller which will encrypt and decrypt the text message. When we send some text message from PC or any other device then the microcontroller will read that message and it will encrypt the text message by using proper encrypt algorithm. After converting it will send encrypted data to receiver side with the help of RS232. in receiver side we are programmed to decrypt the encrypted data by using reverse of encrypt algorithm. So after decrypting the original data we will get and this data will be displayed on LCD. COMPONENT USED: Power Supply 5v DC Micro controller Crystal RS232 LCD
SOFTWARES USED:

7805 AT89C52 11.0592MHz Serial Communication

Embedded C

ADVANTAGES 1. The biggest advantage of public key cryptography is the secure nature of the private key. In fact, it never needs to be transmitted or revealed to anyone. 2. It enables the use of digital certificates and digital timestamps, which is a very secure technique of signature authorization.

hjkhk

Você também pode gostar