SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 3 (March 2014), PP.23-30
23
GSM Based Navigation of Missile
Raju, Rahul, Y.V.Chavan
Maharashtra Academy of Engineering, Alandi (D),
Abstract:- Use of advanced technology in most of the applications is always being attraction with its simplicity,
affordability and utility. This should also be supported by the security. All these issues thought together in this
paper, the work has been done in two parts. In the first part the command processing for the navigation
for fixing the angle and position, while in the second part these commands are needed to be send to the remote
places using GSM [7] technology with security, and actual execution of these command. The security is
achieved by using RC4 algorithm. For the GSM a pair of Nokia- 6070 is used. For processing of the commands
(AT commands) the back end programming is done in Visual Basic at the transmitter and 89c51 is at the
receiver end for decoding the AT commands for execution.
Keywords:- GSM, RC4 algorithm, AT commands for GSM, programming AT commands.
I. INTRODUCTION
Any information, which is to be send, needs its sanctity to be maintained.
The Cryptography is the best available technique from ancient time. For such thing Cryptography has
great importance in data security. „Crypto „means secret and „graphy‟ means writing. Many cryptographic
algorithms evolved based on need and available communication equipments [3], Figure 1 shows the block
diagram of the Conventional Cryptography (Encryption). The capability of retrieving the information on the
other side was purely based on the authorized key. Decoded text is called same as plain text/message.
Figure 1: Block Diagram for conventional Cryptography
Data encryption is utilized in various applications and environment [2].
There are different types of algorithms used for data encryption some of them are Rivest, Shamir and
Adleman RSA, Digital Signature algorithm, DSA, Data Encryption Standard DES [4]& Ron‟s code RRC4
Algorithmis symmetric key algorithm in which same key is used for encryption and decryption. While RSA,
DSA are asymmetric key algorithms in which different keys are used for encryption and decryption. Hence for
simplified data communication we are using RC4 algorithm. In this paper we are using cryptography for the
commands to be given for controlling the missile position from remote place using GSM technique.
The specific utilization of encryption and the implementation of the RC4 will be based on many factors
particularly on the computer system and its associated components. The next section gives the details of the
commands used for the system.
II. GSM MODEM AT COMMANDS
AT (Attention Commands), the different AT commands used and referred to interface a 8-bit
microcontroller system (89C51) are listed below. These commands are required at the receiving end to decode
the messages for the angle and position of the missile.
AT Commands
GSM Based Navigation of Missile
24
1) Dial Number D Syntax:
Command syntax: ATD=<nb>; Function:
This command allows the application to dial a phone number.
2) Hang Up Call H Syntax:
Command syntax: ATH Function:
This command allows the application to disconnect a remote user.
3) Read message +CMGR Syntax:
Command syntax: AT+CMGR=<index> Function
This command allows the application to read stored messages. The messages are read from the memory.
4) Send message +CMGS Syntax:
Command syntax in text mode: AT+CMGS= <da> [ ,<toda> ] <CR> Text is entered <ctrl-Z / ESC > Function:
The <address> field is the address of the terminal to which the message is sent. To send the message,
simply type, <ctrl-Z> character (ASCII 26). The text can contain all existing characters except <ctrl-Z> and
<ESC> (ASCII 27).
1. RC4 ALGORITHM [1]: Ronald Rivest of RSA has developed RC4 algorithm, which is a shared
key stream cipher algorithm. In this a secure exchange of a shared key is the basic requirement. The algorithm is
used identically for encryption and decryption as the data stream is simply XOR‟ed with the generated key
sequence. The algorithm is serial as it requires successive exchanges of state entries based on the key sequence.
Hence implementations can be computationally very intensive. This algorithm has been released to the public
and is implemented by many programmers. This encryption algorithm is used by standards such as IEEE 802.11
GSM Based Navigation of Missile
25
within WEP (Wireless Encryption Protocol) using a 40 and 128-bit keys. In the algorithm the key stream is
completely independent of the plaintext used. An 8 * 8 Substitution, S-Box (S 0- S255), where each of the
entries is a permutation of the numbers 0 to 255. The permutation is a function of the variable length key.
Features
1. Uses a variable length key from 1 to 256 bytes to initialize a 256-byte state table. The state table is used
for subsequent generation of pseudo-random bytes and then to generate a pseudo-random stream which is
XOR‟ed with the plaintext to give the cipher-text. Each element in the state table is swapped at least
once.
2. The key is often limited to 40 bits, because of export restrictions but it is sometimes used as a 128 bit key.
It has the capability of using keys between 1 and 2048 bits. RC4 is used in many commercial software
packages such as Lotus Notes and Oracle Secure SQL.
The algorithm works in two phases, key setup and ciphering. Key setup is the first and most difficult
phase of this encryption algorithm. During N-bit key setup (N being your key length), the encryption key is used
to generate an encrypting variable using two arrays, state and key, and N-number of mixing operations. These
mixing operations consist of swapping bytes, modulo operations, and other formulas. A modulo operation is the
process of yielding a remainder from division. (For example, 11/4 is 2 remainder 3; therefore eleven mod four
would be equal to three).
 Symmetric key Algorithm
 Stream Cipher Algorithm
 4-bit IV appended to 40-bit key
 XOR Key stream with plaintext = Encrypted Text
 Key stream is independent of plaintext
Algorithm Strengths
 It is difficult to hackers about knowing where value is in the table.
 The difficulty of knowing which location in the table is used to select each value in the sequence.
 A particular RC4 Algorithm key can be used only once.
 Encryption is about 10 times faster than DES.
Implementation
 Two main parts:
KSA (Key Scheduling Algorithm)
PRGA (Pseudo Random Generation Algorithm)
 RC4 = Ron?s code # 4 or Rivest
 Cipher = a cryptographic algorithm used for encryption and decryption.
 Symmetric key algorithm = an algorithm that uses the same key to encrypt and decrypt
 Stream cipher = algorithm that encrypts data one byte at a time
 Anonymous re-mailer =distribution system that strips off all of the sender information and re-mails the
message under an anonymous name.
 State table: is a table initialized from 1 to 256 bytes. The bytes in the table are used for subsequent
generation of Pseudo-Random bytes. The Pseudo-Random stream generated is XOR‟ed with the plaintext
to give the cipher-text.
 The RC4 encryption algorithm is used to encrypt and decrypt text files. This algorithm uses a key, with a
maximum size of 256 elements, and a state array of 256 elements, to generate an encryption variable
array that is used to encrypt the data. The key array consists of a random sequence of numbers. The state
array consists of an array starting at 1 and going to 256.
 The encryption variable array is generated using the key array and the state array. Generating the
encryption variable array starts by permuting the state array based on the key array. This is accomplished
by adding the [0] element of the key array and the state array, Mod 256. This produces a number "f" that
is used as an index to the state array. The [f] element and the [0] element of the state array are swapped.
Then the process starts again but this time beginning with the [1] element of the key array and state array.
This continues to the [255] element of the key array and state array. Next take the [1] element of the state
array and add zero to it, Mod 256. Use this number as an index to the state array and swap that element of
the array with the [0] element of the state array. After swapping add these two elements together mod 256
to create the index [t]. Use the [t] element of the state array as the [0] element of the encryption variable
array.
GSM Based Navigation of Missile
26
 To encrypt data the first byte of the data is XOR‟ed with the first element of the encryption variable
array. Then the second byte of data is XOR‟ed with the second element of the encryption variable array.
Continue in this fashion until all the data is encrypted.
 To decrypt data a similar process is used. The same key used for encryption must be used for decryption.
The key array, state array, and encryption variable array are initialized in the same manner as used for
encryption. The encrypted data is XOR‟ed with the encryption variable array in the same manner as used
in encryption and this will decrypt the original data.
 The sender A then transmits a message to the missile in the following kind of format:
Encrypted key = ****
Plaintext encrypted with key =
 At the receiver the encrypted message is extracted with help of same key. Typically the transmission
includes plaintext, details of the encryption algorithms used, padding and encoding methods,
initialization vectors and other details required by the recipient. The only secret required to be kept, as
always, should be the keys.
 If there is intercept of transmission, it can either try and crack the conventionally - encrypted plaintext
directly, or try and decrypt the encrypted key and then use that in turn. In the next section we will see
how the GSM [8] can be useful for the system.
Flowchart for RC4 algorithm for coding of missile angle and position to detect.
2. GSM SPECIFICATION
GSM characteristics
 Fully digital system using 900, 1800 MHz frequency band.
 TDMA over radio carriers (200 KHz carrier spacing.
 8 full rate or 16 half rate TDMA channels per carrier.
 User/terminal authentication for fraud control.
 Encryption of speech and data transmission over the radio path.
GSM Based Navigation of Missile
27
 Full international roaming capability.
 Low speed data services (up to 9.6 Kb/s).
 Compatibility with ISDN.
 Support of Short Message Service (SMS).

2. Interfacing mobile with system:
At transmitter and receiver pair of mobile is used, at transmitter it is operated through GSM AT
COMMANDS and at receiver it is interfaced with microcontroller through USB connector.
Figure 2 A Complete system flow chart for Navigation using GSM
4. Microcontroller 89c51:
The requirement of the system is to receive and transmit the messages from the memory with
handshaking and supporting the GSM[5]. The memory requirement is also limited for them on or for program
routines. The Microcontroller 89c51 is suitable for this application Features:
1. Compatible with MCS-51™ Products
2.4K Bytes of In-System Reprogrammable Flash Memory
3. Fully Static Operation: 0 Hz to 24 MHz 4.Three-level Program Memory Lock 5.128 x 8-bit Internal RAM
6. 32 Programmable I/O Lines 7.Two 16-bit Timer/Counters 8.Six Interrupt Sources
9.Programmable Serial Channel
This has routines for: Reading the message, sending the message for positioning the missile
The system takes care for authentic user by unlocking the system. The communication is done through RS-232
cable for handshaking.
GSM Based Navigation of Missile
28
5. Stepper Motor:
Stepper motor is an electro mechanical device, which receives electrical pulses for the mechanical
movements. The shaft or spindle of a stepper motor rotates indiscrete step increments when electrical command
pulses are applied to it in the proper sequence. The motors rotation has several direct relationships to these
applied input pulses. The sequence of the applied pulses is directly related to the direction of motor shafts
rotation. The speed of the motor shafts rotation is directly related to the frequency of the input pulses and the
length of rotation is directly related to the number of input pulses applied.
Advantages:
1. The rotation angle of the motor is proportional to the input pulse.
2. The motor has full torque at stand still (if the windings are energized)
3. Precise positioning and repeatability of movement since good stepper motors have an accuracy of 3 –
5% of a step and this error is non cumulative from one step to the next.
4. Excellent response to starting/stopping/reversing.
5. Very reliable since there are no contact brushes in the motor. Therefore the life of the motor is simply
dependant on the life of the bearing.
6. The motors response to digital input pulses provides open-loop control, making the motor simpler and
less costly to control.
7. It is possible to achieve very low speed synchronous rotation with a load that is directly coupled to the
shaft.
8. A wide range of rotational speeds can be realized, as the speed is proportional to the frequency of the
input pulses.
Disadvantages:
1. Resonances can occur if not properly controlled.
2. Not easy to operate at extremely high speeds.
III. CONCLUSION
The growing use of networking is generating tremendous amount of various application for data that
are transmitted at high speeds over long distances. These security aspects include determining the types of
attacks that might be launched on a computer system or network, and using various protection mechanisms
against these attacks to ensure the validity of information. The system implemented here uses the GSM with the
help of Nokia 6070. The security issue is handled by using RC4. The coding of the command for the position
and angle of the missile is done by the back end VB. The decoding at the receiver is done by 80c59 and execute
with movement of the stepper motor. The system here is implemented with GSM, AT command by VB, RC4
and 80c59[6]. This can also be implemented by any other combination for the desired results and application.
The weakness of the systems are:
– 40-bit key and Shared
– Pseudorandom- IV based
– Key stream reuse
– XOR based
– Weak Keys
 One in every 256 keys can be a weak key. These keys are identified by cryptanalysis that is able to find
circumstances under which one of more generated bytes are strongly correlated with a few bytes of the
key.
WEAK KEYS: these are keys identified by cryptanalysis that is able to find circumstances under which one or
more generated bytes are strongly correlated with small subset of the key bytes. These keys can happen in one
out of 256 keys generated.
GSM Based Navigation of Missile
29
Flowchart for display of command angle and position at the receiver side using LCD display.
REFERENCES
[1]. Allam Mousa and Ahmad Hamad“Evaluation of RC4 Algorithm for Data Encryption”
[2]. Bruce Schneier “Applied cryptography (Protocols and Algorithms)”
[3]. Chavan Y.V. “Computer Networks”, second edition Umesh publication Delhi Federal Information
Processing Standards (FIBS PUB) Research paper on “Data Encryption standard”
[4]. Kenneth J. Ayala “The 8051 Micro controller Architecture”
[5]. M.A. Mazadi “The 8051 Micro controller and Embedded Systems”
[6]. Rohan Mehta, Y.V. Chavan , V.K. Sharma “Implementation of Modified RSA Algorithm For Security
Socket Layer In Virtual Private Network”at the National Conference for Broadband Communication
system organized by VIIT, Pune
[7]. S. Muhammad Siddique, Muhammad Amir, „„GSM security issues and challenges,‟‟ 7thACIS
International Conference on Software Engineering, Artificial Intelligence, Networking, and
Parallel/Distributed Computing, SNPD 2006, 19-20 June 2006, pp. 413 – 418.
[8]. Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall, 2003
GSM Based Navigation of Missile
30
Annexure
Front end page developed using VB (GUI)

Weitere ähnliche Inhalte

Was ist angesagt?

CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit vArthyR3
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit ivArthyR3
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSAaritraranjan
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing FunctionsYusuf Uzun
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security EncryptionJoel Briza
 

Was ist angesagt? (20)

CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
 
Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
Cs8792 cns - unit iv
Cs8792   cns - unit ivCs8792   cns - unit iv
Cs8792 cns - unit iv
 
Unit 3
Unit 3Unit 3
Unit 3
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
Unit 2
Unit  2Unit  2
Unit 2
 
Cryptographic Hashing Functions
Cryptographic Hashing FunctionsCryptographic Hashing Functions
Cryptographic Hashing Functions
 
An effective RC4 Stream Cipher
An effective RC4 Stream CipherAn effective RC4 Stream Cipher
An effective RC4 Stream Cipher
 
Hash
HashHash
Hash
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
Network security Encryption
Network security EncryptionNetwork security Encryption
Network security Encryption
 
Message digest 5
Message digest 5Message digest 5
Message digest 5
 
Ch12
Ch12Ch12
Ch12
 

Andere mochten auch

Interactive Video Search and Browsing Systems
Interactive Video Search and Browsing SystemsInteractive Video Search and Browsing Systems
Interactive Video Search and Browsing SystemsAndrea Ferracani
 
An information system to access contemporary archives of art: Cavalcaselle, V...
An information system to access contemporary archives of art: Cavalcaselle, V...An information system to access contemporary archives of art: Cavalcaselle, V...
An information system to access contemporary archives of art: Cavalcaselle, V...Andrea Ferracani
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Editor IJARCET
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Smart missile navigation in defence system using rc4 algorithm to detect target
Smart missile navigation in defence system using rc4 algorithm to detect targetSmart missile navigation in defence system using rc4 algorithm to detect target
Smart missile navigation in defence system using rc4 algorithm to detect targeteSAT Publishing House
 
Web search algorithms and user interfaces
Web search algorithms and user interfacesWeb search algorithms and user interfaces
Web search algorithms and user interfacesStefanos Anastasiadis
 

Andere mochten auch (12)

Interactive Video Search and Browsing Systems
Interactive Video Search and Browsing SystemsInteractive Video Search and Browsing Systems
Interactive Video Search and Browsing Systems
 
An information system to access contemporary archives of art: Cavalcaselle, V...
An information system to access contemporary archives of art: Cavalcaselle, V...An information system to access contemporary archives of art: Cavalcaselle, V...
An information system to access contemporary archives of art: Cavalcaselle, V...
 
163 166
163 166163 166
163 166
 
82 86
82 8682 86
82 86
 
Sirio
SirioSirio
Sirio
 
1784 1788
1784 17881784 1788
1784 1788
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Shawbak
ShawbakShawbak
Shawbak
 
Ijetcas14 510
Ijetcas14 510Ijetcas14 510
Ijetcas14 510
 
Smart missile navigation in defence system using rc4 algorithm to detect target
Smart missile navigation in defence system using rc4 algorithm to detect targetSmart missile navigation in defence system using rc4 algorithm to detect target
Smart missile navigation in defence system using rc4 algorithm to detect target
 
Web search algorithms and user interfaces
Web search algorithms and user interfacesWeb search algorithms and user interfaces
Web search algorithms and user interfaces
 

Ähnlich wie International Journal of Engineering Research and Development

Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad Renas Rekany
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationIRJET Journal
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithmsijsrd.com
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communicationijsrd.com
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...IJECEIAES
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsIRJET Journal
 

Ähnlich wie International Journal of Engineering Research and Development (20)

Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
Unit 2
Unit 2Unit 2
Unit 2
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
Renas Rajab Asaad
Renas Rajab Asaad Renas Rajab Asaad
Renas Rajab Asaad
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
O017128591
O017128591O017128591
O017128591
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Day5
Day5Day5
Day5
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Survey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile CommunicationSurvey of Hybrid Encryption Algorithm for Mobile Communication
Survey of Hybrid Encryption Algorithm for Mobile Communication
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
 

Mehr von IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mehr von IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Kürzlich hochgeladen

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 3 (March 2014), PP.23-30 23 GSM Based Navigation of Missile Raju, Rahul, Y.V.Chavan Maharashtra Academy of Engineering, Alandi (D), Abstract:- Use of advanced technology in most of the applications is always being attraction with its simplicity, affordability and utility. This should also be supported by the security. All these issues thought together in this paper, the work has been done in two parts. In the first part the command processing for the navigation for fixing the angle and position, while in the second part these commands are needed to be send to the remote places using GSM [7] technology with security, and actual execution of these command. The security is achieved by using RC4 algorithm. For the GSM a pair of Nokia- 6070 is used. For processing of the commands (AT commands) the back end programming is done in Visual Basic at the transmitter and 89c51 is at the receiver end for decoding the AT commands for execution. Keywords:- GSM, RC4 algorithm, AT commands for GSM, programming AT commands. I. INTRODUCTION Any information, which is to be send, needs its sanctity to be maintained. The Cryptography is the best available technique from ancient time. For such thing Cryptography has great importance in data security. „Crypto „means secret and „graphy‟ means writing. Many cryptographic algorithms evolved based on need and available communication equipments [3], Figure 1 shows the block diagram of the Conventional Cryptography (Encryption). The capability of retrieving the information on the other side was purely based on the authorized key. Decoded text is called same as plain text/message. Figure 1: Block Diagram for conventional Cryptography Data encryption is utilized in various applications and environment [2]. There are different types of algorithms used for data encryption some of them are Rivest, Shamir and Adleman RSA, Digital Signature algorithm, DSA, Data Encryption Standard DES [4]& Ron‟s code RRC4 Algorithmis symmetric key algorithm in which same key is used for encryption and decryption. While RSA, DSA are asymmetric key algorithms in which different keys are used for encryption and decryption. Hence for simplified data communication we are using RC4 algorithm. In this paper we are using cryptography for the commands to be given for controlling the missile position from remote place using GSM technique. The specific utilization of encryption and the implementation of the RC4 will be based on many factors particularly on the computer system and its associated components. The next section gives the details of the commands used for the system. II. GSM MODEM AT COMMANDS AT (Attention Commands), the different AT commands used and referred to interface a 8-bit microcontroller system (89C51) are listed below. These commands are required at the receiving end to decode the messages for the angle and position of the missile. AT Commands
  • 2. GSM Based Navigation of Missile 24 1) Dial Number D Syntax: Command syntax: ATD=<nb>; Function: This command allows the application to dial a phone number. 2) Hang Up Call H Syntax: Command syntax: ATH Function: This command allows the application to disconnect a remote user. 3) Read message +CMGR Syntax: Command syntax: AT+CMGR=<index> Function This command allows the application to read stored messages. The messages are read from the memory. 4) Send message +CMGS Syntax: Command syntax in text mode: AT+CMGS= <da> [ ,<toda> ] <CR> Text is entered <ctrl-Z / ESC > Function: The <address> field is the address of the terminal to which the message is sent. To send the message, simply type, <ctrl-Z> character (ASCII 26). The text can contain all existing characters except <ctrl-Z> and <ESC> (ASCII 27). 1. RC4 ALGORITHM [1]: Ronald Rivest of RSA has developed RC4 algorithm, which is a shared key stream cipher algorithm. In this a secure exchange of a shared key is the basic requirement. The algorithm is used identically for encryption and decryption as the data stream is simply XOR‟ed with the generated key sequence. The algorithm is serial as it requires successive exchanges of state entries based on the key sequence. Hence implementations can be computationally very intensive. This algorithm has been released to the public and is implemented by many programmers. This encryption algorithm is used by standards such as IEEE 802.11
  • 3. GSM Based Navigation of Missile 25 within WEP (Wireless Encryption Protocol) using a 40 and 128-bit keys. In the algorithm the key stream is completely independent of the plaintext used. An 8 * 8 Substitution, S-Box (S 0- S255), where each of the entries is a permutation of the numbers 0 to 255. The permutation is a function of the variable length key. Features 1. Uses a variable length key from 1 to 256 bytes to initialize a 256-byte state table. The state table is used for subsequent generation of pseudo-random bytes and then to generate a pseudo-random stream which is XOR‟ed with the plaintext to give the cipher-text. Each element in the state table is swapped at least once. 2. The key is often limited to 40 bits, because of export restrictions but it is sometimes used as a 128 bit key. It has the capability of using keys between 1 and 2048 bits. RC4 is used in many commercial software packages such as Lotus Notes and Oracle Secure SQL. The algorithm works in two phases, key setup and ciphering. Key setup is the first and most difficult phase of this encryption algorithm. During N-bit key setup (N being your key length), the encryption key is used to generate an encrypting variable using two arrays, state and key, and N-number of mixing operations. These mixing operations consist of swapping bytes, modulo operations, and other formulas. A modulo operation is the process of yielding a remainder from division. (For example, 11/4 is 2 remainder 3; therefore eleven mod four would be equal to three).  Symmetric key Algorithm  Stream Cipher Algorithm  4-bit IV appended to 40-bit key  XOR Key stream with plaintext = Encrypted Text  Key stream is independent of plaintext Algorithm Strengths  It is difficult to hackers about knowing where value is in the table.  The difficulty of knowing which location in the table is used to select each value in the sequence.  A particular RC4 Algorithm key can be used only once.  Encryption is about 10 times faster than DES. Implementation  Two main parts: KSA (Key Scheduling Algorithm) PRGA (Pseudo Random Generation Algorithm)  RC4 = Ron?s code # 4 or Rivest  Cipher = a cryptographic algorithm used for encryption and decryption.  Symmetric key algorithm = an algorithm that uses the same key to encrypt and decrypt  Stream cipher = algorithm that encrypts data one byte at a time  Anonymous re-mailer =distribution system that strips off all of the sender information and re-mails the message under an anonymous name.  State table: is a table initialized from 1 to 256 bytes. The bytes in the table are used for subsequent generation of Pseudo-Random bytes. The Pseudo-Random stream generated is XOR‟ed with the plaintext to give the cipher-text.  The RC4 encryption algorithm is used to encrypt and decrypt text files. This algorithm uses a key, with a maximum size of 256 elements, and a state array of 256 elements, to generate an encryption variable array that is used to encrypt the data. The key array consists of a random sequence of numbers. The state array consists of an array starting at 1 and going to 256.  The encryption variable array is generated using the key array and the state array. Generating the encryption variable array starts by permuting the state array based on the key array. This is accomplished by adding the [0] element of the key array and the state array, Mod 256. This produces a number "f" that is used as an index to the state array. The [f] element and the [0] element of the state array are swapped. Then the process starts again but this time beginning with the [1] element of the key array and state array. This continues to the [255] element of the key array and state array. Next take the [1] element of the state array and add zero to it, Mod 256. Use this number as an index to the state array and swap that element of the array with the [0] element of the state array. After swapping add these two elements together mod 256 to create the index [t]. Use the [t] element of the state array as the [0] element of the encryption variable array.
  • 4. GSM Based Navigation of Missile 26  To encrypt data the first byte of the data is XOR‟ed with the first element of the encryption variable array. Then the second byte of data is XOR‟ed with the second element of the encryption variable array. Continue in this fashion until all the data is encrypted.  To decrypt data a similar process is used. The same key used for encryption must be used for decryption. The key array, state array, and encryption variable array are initialized in the same manner as used for encryption. The encrypted data is XOR‟ed with the encryption variable array in the same manner as used in encryption and this will decrypt the original data.  The sender A then transmits a message to the missile in the following kind of format: Encrypted key = **** Plaintext encrypted with key =  At the receiver the encrypted message is extracted with help of same key. Typically the transmission includes plaintext, details of the encryption algorithms used, padding and encoding methods, initialization vectors and other details required by the recipient. The only secret required to be kept, as always, should be the keys.  If there is intercept of transmission, it can either try and crack the conventionally - encrypted plaintext directly, or try and decrypt the encrypted key and then use that in turn. In the next section we will see how the GSM [8] can be useful for the system. Flowchart for RC4 algorithm for coding of missile angle and position to detect. 2. GSM SPECIFICATION GSM characteristics  Fully digital system using 900, 1800 MHz frequency band.  TDMA over radio carriers (200 KHz carrier spacing.  8 full rate or 16 half rate TDMA channels per carrier.  User/terminal authentication for fraud control.  Encryption of speech and data transmission over the radio path.
  • 5. GSM Based Navigation of Missile 27  Full international roaming capability.  Low speed data services (up to 9.6 Kb/s).  Compatibility with ISDN.  Support of Short Message Service (SMS).  2. Interfacing mobile with system: At transmitter and receiver pair of mobile is used, at transmitter it is operated through GSM AT COMMANDS and at receiver it is interfaced with microcontroller through USB connector. Figure 2 A Complete system flow chart for Navigation using GSM 4. Microcontroller 89c51: The requirement of the system is to receive and transmit the messages from the memory with handshaking and supporting the GSM[5]. The memory requirement is also limited for them on or for program routines. The Microcontroller 89c51 is suitable for this application Features: 1. Compatible with MCS-51™ Products 2.4K Bytes of In-System Reprogrammable Flash Memory 3. Fully Static Operation: 0 Hz to 24 MHz 4.Three-level Program Memory Lock 5.128 x 8-bit Internal RAM 6. 32 Programmable I/O Lines 7.Two 16-bit Timer/Counters 8.Six Interrupt Sources 9.Programmable Serial Channel This has routines for: Reading the message, sending the message for positioning the missile The system takes care for authentic user by unlocking the system. The communication is done through RS-232 cable for handshaking.
  • 6. GSM Based Navigation of Missile 28 5. Stepper Motor: Stepper motor is an electro mechanical device, which receives electrical pulses for the mechanical movements. The shaft or spindle of a stepper motor rotates indiscrete step increments when electrical command pulses are applied to it in the proper sequence. The motors rotation has several direct relationships to these applied input pulses. The sequence of the applied pulses is directly related to the direction of motor shafts rotation. The speed of the motor shafts rotation is directly related to the frequency of the input pulses and the length of rotation is directly related to the number of input pulses applied. Advantages: 1. The rotation angle of the motor is proportional to the input pulse. 2. The motor has full torque at stand still (if the windings are energized) 3. Precise positioning and repeatability of movement since good stepper motors have an accuracy of 3 – 5% of a step and this error is non cumulative from one step to the next. 4. Excellent response to starting/stopping/reversing. 5. Very reliable since there are no contact brushes in the motor. Therefore the life of the motor is simply dependant on the life of the bearing. 6. The motors response to digital input pulses provides open-loop control, making the motor simpler and less costly to control. 7. It is possible to achieve very low speed synchronous rotation with a load that is directly coupled to the shaft. 8. A wide range of rotational speeds can be realized, as the speed is proportional to the frequency of the input pulses. Disadvantages: 1. Resonances can occur if not properly controlled. 2. Not easy to operate at extremely high speeds. III. CONCLUSION The growing use of networking is generating tremendous amount of various application for data that are transmitted at high speeds over long distances. These security aspects include determining the types of attacks that might be launched on a computer system or network, and using various protection mechanisms against these attacks to ensure the validity of information. The system implemented here uses the GSM with the help of Nokia 6070. The security issue is handled by using RC4. The coding of the command for the position and angle of the missile is done by the back end VB. The decoding at the receiver is done by 80c59 and execute with movement of the stepper motor. The system here is implemented with GSM, AT command by VB, RC4 and 80c59[6]. This can also be implemented by any other combination for the desired results and application. The weakness of the systems are: – 40-bit key and Shared – Pseudorandom- IV based – Key stream reuse – XOR based – Weak Keys  One in every 256 keys can be a weak key. These keys are identified by cryptanalysis that is able to find circumstances under which one of more generated bytes are strongly correlated with a few bytes of the key. WEAK KEYS: these are keys identified by cryptanalysis that is able to find circumstances under which one or more generated bytes are strongly correlated with small subset of the key bytes. These keys can happen in one out of 256 keys generated.
  • 7. GSM Based Navigation of Missile 29 Flowchart for display of command angle and position at the receiver side using LCD display. REFERENCES [1]. Allam Mousa and Ahmad Hamad“Evaluation of RC4 Algorithm for Data Encryption” [2]. Bruce Schneier “Applied cryptography (Protocols and Algorithms)” [3]. Chavan Y.V. “Computer Networks”, second edition Umesh publication Delhi Federal Information Processing Standards (FIBS PUB) Research paper on “Data Encryption standard” [4]. Kenneth J. Ayala “The 8051 Micro controller Architecture” [5]. M.A. Mazadi “The 8051 Micro controller and Embedded Systems” [6]. Rohan Mehta, Y.V. Chavan , V.K. Sharma “Implementation of Modified RSA Algorithm For Security Socket Layer In Virtual Private Network”at the National Conference for Broadband Communication system organized by VIIT, Pune [7]. S. Muhammad Siddique, Muhammad Amir, „„GSM security issues and challenges,‟‟ 7thACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2006, 19-20 June 2006, pp. 413 – 418. [8]. Andrew S. Tanenbaum, Computer Networks, Fourth Edition, Prentice Hall, 2003
  • 8. GSM Based Navigation of Missile 30 Annexure Front end page developed using VB (GUI)