You are on page 1of 14

SECURE COMMUNICATION

SYSTEM
AIM

To develop a dedicated and independent


messaging system which would
safeguard the confidentiality, integrity
and the authenticity of information
METHODOLOGY

 Selection of communication channel and


encryption technique.
 Hardware design.
 Coding.
 Testing.
INTRODUCTION
Project consists of two parts:

HARDWARE: The hardware part consists of a transmitter, which encodes a


message into an optical signal, a channel, which carries the signal to its
destination, and a receiver, which reproduces the message. The communication
media which is a laser also forms a part of the hardware portion

SOFTWARE: The transmitter and receiver are designed so that the data is first
encrypted and then after transmission through communication channel, it is
finally decrypted.
The software part comprises of two parts:
The first is an assembly language program to encrypt and transmit the data to
the transmitter side.
The second program is in C language and its function is to decrypt the encrypted
data on the receiver side and to provide information in human readable form.
LASER AS A COMMUNICATION
MEDIA
 Especially useful, where wires cannot be physically connected
to a remote location.
 Doesn’t require special shielding over longer distances.
 Longer distance communication as compared to infrared LEDs.
 LASERs are not subjected to interference from other
transmitters, unlike RF transmitters.
 It offers secure communication since any attempts to intercept
the laser beam would be detected at the receiver as a loss in
data.
 A laser medium also allows for the sender and receiver to be
isolated from each other.
 Laser beam is highly coherent and directional as compared to
other communication mediums.
TRANSMITTER SECTION
CIRCUIT DIAGRAM
TRANSMITTER
RECEIVER SECTION

T ra n s is to rs
C om m . L evel S e ria l
L in e C o n v. P o rt
B u ff. C om p.
CIRCUIT DIAGRAM RECEIVER
ENCRYPTION TECHNIQUE
Before transmitting the data, we use two rounds to encrypt it. As it now becomes double
encryption, the message is more secure as compared to single encryption.

Round 1:
1. This round makes use of the fact that the first bit of each byte in ASCII representation of any character is
zero, so we can eliminate it and in place of its MSB, we’ll put LSB of 2nd byte and store this byte at some
other location
2. Now, as in next byte, we have only 6 significant bits to be sent (8 minus 1 LSB minus 1
redundant zero), so we’ll put 2 LSBs of 3rd byte in its 2 most significant places and so on till 7th byte.
3. Process repeats for 9th byte onwards.

Thus we are saving 1 byte per 8 bytes of transmission . Also, as the constituting bits change, the
byte under consideration loses its actual meaning. Thus, this technique achieves compression along with first
round of encryption. This technique is widely used in sending text messages through mobiles and thus also
known as SMS technique.

Round 2:
To achieve further security, we are making use of a 4 character (=32bit)key. After first round
of encryption, the message is XORed bitwise with the key.
CONCLUSION
 Secure transmission system using
encryption.
 Higher level of confidentiality without
using complex algorithms.
 Use of laser as a communication media.
 Decentralized system using point to
point transmission.
APPLICATIONS
 The system finds application in private
correspondence, sensitive military or
business information.
 Temporary connectivity needs (e.g.
Sporting events, disaster scenes, or
space based communication).
 It can be used for communication in
small businesses.
SCOPE OF DEVELOPMENT
 Key length can be increased to make it more secure.

 This system, with slight modifications can also be used in


remote controlling or also in LAN.

 Some more rounds of encryption can be applied to make it


secure.

 The project can be further improved to transmit voice along


with data and using lasers which provide a better range.

 It can be modified to function as a two way communication


system.
THANK YOU

You might also like