This document describes a project to implement secure wireless communication between two systems using RSA encryption. The system encrypts data during wireless transmission using RSA encryption to securely transfer messages. It uses Arduino microcontrollers interfaced with WiFi modules, LCD displays, keyboards and other components. When a message is sent, the receiving system can only decrypt and view it by entering the correct encryption key, otherwise it will show as garbage. This provides secure wireless transmission that is difficult to hack without the key.
Original Description:
The main objective is to provide secure communication to military,navy and in other areas where there is a need to maintain sensitive information in secret.
Original Title
Wifi Based Secure Wireless Communication Using Rsa
This document describes a project to implement secure wireless communication between two systems using RSA encryption. The system encrypts data during wireless transmission using RSA encryption to securely transfer messages. It uses Arduino microcontrollers interfaced with WiFi modules, LCD displays, keyboards and other components. When a message is sent, the receiving system can only decrypt and view it by entering the correct encryption key, otherwise it will show as garbage. This provides secure wireless transmission that is difficult to hack without the key.
This document describes a project to implement secure wireless communication between two systems using RSA encryption. The system encrypts data during wireless transmission using RSA encryption to securely transfer messages. It uses Arduino microcontrollers interfaced with WiFi modules, LCD displays, keyboards and other components. When a message is sent, the receiving system can only decrypt and view it by entering the correct encryption key, otherwise it will show as garbage. This provides secure wireless transmission that is difficult to hack without the key.
K.RADHA RANI-16FE1A0471 M.KISHORE N.HIMA BINDU-16FE1A04A3 N.PRATHIBHA-16FE1AO4B5 K.PRUDHVI-16FE1A0464 The Wi-Fi based secured wireless communication using RSA encryption allows us to communicate wirelessly with security feature. The data transfer during communication between two system is encrypted using RSA encryption which is highly secure. Security of data in army stations is an important issue. In early systems, at the time of information transmission between two army stations, it can be hacked by terrorists, spies and enemies. Cryptography is a very important system employed for this purpose. Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant Network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information Atmega 328 Microcontrollers 2 Wi-Fi modules LCD Displays USB Keyboards 12V Transformers Resistors Capacitors Diodes Arduino Compiler MC Programming Language: C The data can be decrypted with correct key only, otherwise it returns some garbage value. This is two way communication system where we can transmit as well as receive at both ends. We have used Atmega microcontroller interfaced with xbee along with LCD display to send message and key, also have USB keyboards connected to each system and powered by 12V supply. After starting system, we will able to enter message on system. The maximum limit of message is 32 character. After that system asks for key, the key limit is 16character it can be number or alphabet. Entering key will send the encrypted message to other system. Then the other system ask key to view the message. If the users enter correct key the message gets decrypted otherwise it will show garbage value thus securing the wireless communication. Cryptography is the best method for security of data. The proposed RSA shows a better result when compared with the previous works. It will take less time and it is impossible to break the encryption algorithm without knowing the exact key value. This algorithm can be applied for data encryption and decryption in any type of public applications for sending confidential data