DocumentCode
707239
Title
Security of data transmission using logic gates and crypt analysis
Author
Rastogi, Rohit ; Mishra, Rishabh ; Sharma, Sanyukta ; Nigam, Anshika ; Arya, Pratyush
Author_Institution
CSE Dept., ABES Eng. Coll., Ghaziabad, India
fYear
2015
fDate
11-13 March 2015
Firstpage
101
Lastpage
105
Abstract
In the following paper, we are encrypting and decrypting data using 74xx logic gates. In this process a key is generated which when encapsulates with the data, makes it in encrypted form called cipher text. Then same key is used to decrypt the data. The concept used for key generation is cellular automation, and then bit by bit passing into 8:1 MUX via 2:1 MUX from where the final key is generated. The key after use is also feedback in order to maintain the randomness of our key. The advantage of this process is that the hardware resources used here are cheaper and can be easily implemented. The future scope of this process is that other secure and more complex algorithms can be implemented through this method.
Keywords
cryptography; data communication; data encapsulation; data privacy; logic gates; telecommunication security; MUX; cellular automation; cipher text; crypt analysis; data decrypting; data encapsulation; data encrypting; data transmission security; hardware resource; logic gate; Ciphers; Complexity theory; Encryption; Logic gates; Receivers; Shift registers; Cellular Automation; Cipher text; Decryption; Encryption; XOR Operation;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on
Conference_Location
New Delhi
Print_ISBN
978-9-3805-4415-1
Type
conf
Filename
7100229
Link To Document