Coded Communication Device with Hamming Code
Abstract
The field of invention is VLSI. In this invention, the authors have brought into light a coded communication device which increases the security level of the system. The tools like VHDL programming language that is VHSIC hardware description language and hamming code contributed to form the foundation of the invention. In this the authors have used transducer at input terminal whose output is given to encrypter. Similarly, at the receiver side there is decrypter followed by transducer. The final output is taken from transducer. The key part of invention is that it has an encrypter which is specially designed for encryption and at receiver it uses hamming code for coding. Thus, security level can be increased.
Keywords
Full Text:
PDFReferences
Gupta Brajesh Kumar, Dua Rajeshwar Lal. Department of Electronics and Communication Engineering, Jaipur National University, Jaipur, (RJ) (Received 22 April. 2012 Accepted 5 May 2012) writing journal on Communication By Hamming Code Methodologies. Vol. 2 , Issue No.2 278-288
Allen D. Holliday. Hamming Error-Correction Codes. February 17, 1994 (revised June 15, 2002; March 1, 2004)
Eltayeb Abuelyaman and Abdul-Aziz Al-Sehibani. Optimization of the Hamming Code for Error Prone Media. College of Computer and Information Sciences, Prince Sultan University.
Hamming RW. Error Detecting And Error Correcting Codes. The Best System Technical Journals. American Telephone and Telegraph Company. April, 1950.
E. Thambiraja, G. Ramesh, Dr. R. Umarani A survey on various most common encryption techniques. International Journal of Advanced Research in Computer Science and Software Engineering. July 2012; 2(7).
An efficient VLSI implementation of IDEA encryption algorithm using VHDL, Microprocessors and Microsystems 29 (2005) 1–7 , Received 15 November 2003; revised 29 May 2004; accepted 5 June 2004, Available online 8 July 2004
A research paper: an ascii value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. International journal on computer science & engineering. Sep 2012; 4(9): 1650p.
Dawn Xiaodong Song, David Wagner. Practical Techniques for Searches on Encrypted Data. Adrian University of California, Berkeley.
Encryption and Decryption Algorithm using ASCII values with substitution array approach. International Journal of Advanced Research in Computer and Communication Engineering. August 2013; 2(8).
An ASCII value based text data encryption System. International Journal of Scientific and Research Publications. November 2013; 3(11).
Binary Compression Rates for ASCII Formats. Binary Rates in ASCII, Isenburg, Snoeyink. Appeared in Web3D’2003.
DOI: https://doi.org/10.37591/jomea.v2i1.5282
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Journal of Microcontroller Engineering and Applications