Ece4009 - Wireless and Mobile Communication Review 2 Group Members Slot 1. 2. 3. Title
Ece4009 - Wireless and Mobile Communication Review 2 Group Members Slot 1. 2. 3. Title
Ece4009 - Wireless and Mobile Communication Review 2 Group Members Slot 1. 2. 3. Title
REVIEW 2
ABSTRACT
INTRODUCTION
ENCRYTION PROCESS:
DECRYPTION PROCESS:
In this project first, we will write an Arduino code for the AES
algorithm to encrypt & decrypt the recorded voice signal. Two
separate codes will be written for the encryption & decryption.
Here we will take the 128-bit (16 byte) data as a plaintext and
128-bit key for encryption. The recorded signal will be digitized
and sampled at a rate of 8000 Hz generally a sampling rate of
at least 2f. (According to Nyquist criteria).
This block will be copied into the State array, which will be
modified at each stage of encryption or decryption. After the
final stage, State is copied to an output matrix. Similarly, the
key will be depicted as a square matrix of bytes. This key will be
then expanded into an array of key schedule words. Each word
is four bytes, and the total key schedule will be 44 words for the
128-bit key. The cipher consists of N rounds, where the number
of rounds will depend on the key length: 10 rounds for a 16-byte
key, 12 rounds for a 24- byte key and 14 rounds for a 32-byte
key. The first N-1 rounds will consist of four distinct
transformation functions: Sub Bytes, Shift Rows, Mix Columns,
and Add Round Key, which are described subsequently. The
final round will contain only three transformations, and there
will be an initial single transformation (Add Round Key) before
the first round, which can be considered Round 0. Each
transformation will take one or more 4×4 matrices as input and
produces a 4×4 matrix as output.
At the receiving end just, reverse process will be used. For the
decryption each stage is easily reversible. For the Substitute
Byte, Shift Rows, and Mix Columns stages, an inverse function
will be used in the decryption algorithm. For the Add Round
Key stage, the inverse will be achieved by XORing the same
round key to the block, as with most block ciphers, the
decryption algorithm will make use of the expanded key in
reverse order.
Encryption of Transmission of
Input Text text using AES Encrypted text
algorithm using ESP8266
Reception of
Further
Encrypted text
proccesses.
using ESP8266
CURRENT PROGRESS: