Data is the basic of all kinds of activities in information technology. Data means a set of values of qualitative or quantitative variables; restated, pieces of data are individual pieces of information. Data is measured, collected and reported, and analyzed, whereupon it can be visualized using graphs or images.
Data as a general concept refers to the fact that some existing information or knowledge is represented or coded in some form suitable for better usage or processing.
This is the era of the advent of science, engineering and technology in all spheres of life in the sky high peak. That is why now we are able to get ride on many problems by the blessing of modern science and cryptography is one of them. We use cryptography process to transfer and receive important information securely without tempered by any unauthorized person.
Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no communication is guaranteed secure in this sense, although practical limitations such as legislation, resources, technical issues (interception & encryption), and the sheer volume of communication are limiting factors to surveillance.
The purpose of this a project is to describe the various means by which security is sought and compromised, the differing kinds of security possible, and the current means and their degree of security readily available. With many communications taking place over long distance and mediated by technology, increasing awareness of the importance of interception issues, technology and its compromise are at the heart of this debate.
In day to day life we don't find much importance of secure communication but real importance of secure communication arises during war or when countries secure information has to be transmitted somewhere. So considering such important factor where secure information can build or destroy nation we are making a project on Unassailable Information exchange in Communication system.
Considering these points, we (Mohammad Faisal Hossain and TahiyaTabassum) made the design for an Unassailable Information Exchange system using Verilog FPGA, which absolutely is an original design of our own where with the advantages of VLSI design methodology and Verilog codes; we focused on implementing an efficient and satisfactorily error free unassailable information exchange system.
The main objective of this thesis is to implement an Unassailable Information Exchange system in FPGA (Field Programmable Gate Array) using Verilog HDL. Therefore, Verilog coding for all the modules were done, simulated and synthesized. We had the objective to implement the original design of UIE in FPGA in a very efficient and cost effective way. The whole UIE was comprised of basic digital components, such as XOR gates, registers, flip-flops, adders, counters, multiplexers, comparators and combinational logic shifters. On top of everything, we have a target into our mind to develop and introduce UIEs commercially and practically in future to step forward in the points of technological advancements and creating an appreciable image worldwide of this system.
In our process, the sender will input the message and the message will be encrypted using the key. The coded (encrypted) message will go through the channel and main unit. Then the user at the receiver will get the coded message and he/she will use the same key to decrypt the coded message so that he/she can get the Original Message. This whole process will be completed by using the algorithm which we created into our system in a form of coding by the help of Verilog HDL.
Secure communication includes means by which people can share information with varying degrees of certainty that third parties cannot say what was said. How to secure communication ; may it be hiding the information in some manner so that the outer people cannot understand what is going on between the two users by using private key encryption and the key will only be known by the two users. Message (Data) sent by the user may be snooped by unauthorized person. That is why it is necessary to scramble it before sending it on to public network so that even if an outsider is able to read it but he will not be able to understand how to use it. UIE system can solve this issue by using private key encryption and we can cope up with this situation.
We have finally completed the whole process under the guidance of our thesis supervisor Iqbalur Rahman Rokon sir, who is a senior lecturer of Department of Electrical and Computer Engineering in North South University. We are very much thankful to him for his support and guidance to complete our system properly. We would also like to thanks to Tabia Hossain, who is a Lab Instructor of Dept. of Electrical and Computer Engineering in North South University for her help and support. Finally, we would like to show our appreciation to our beloved parents for their inestimable support during these years of our study.
-Mohammad Faisal Hossain is a students of Electerical and Electronics Engineering, North South University