SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 320
ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS
USING ANALOG CIRCUITS
MR. A Y PRABHAKAR, ANKIT PATHAK, AVANISH PAL, AYUSH MAHESHWARI
Professor, Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering,
Pune, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Previously, encryptionkeysfordigitalsystems had
been generated using hardware and software techniques.
However, these techniques can be duplicated because they are
pseudo-random. Because of this, a hacker can readily
duplicate and enhance the method that produces the
encryption key in software.
This problem can be resolved bycreatingarandomencryption
key that doesn't adhere to any algorithm or pattern. To
generate this kind of key, a hybrid methodology issuggestedin
this research. The digital and analogue components are
combined in the suggested circuit.
The analogue domain is represented by Chua's circuit with a
random noise source. Two capacitors, a resistor, and an
inductor make up Chua's circuit, which may generate an
oscillating waveform with a distinct output.
The Chua's circuit is fueled by a randomized input thanks to
the addition of noise in the circuits, which produces a much
more random output.
The key is generated, and then the data is stored on a digital
storage medium. Sd card is used to store the digital bits, and
Proteus8 is used to simulate the analogue component. RXD
TXD Virtual Terminal may display the circuit's 8-bit digital
output signals. The system makes use of an analogue circuit
diagram, a digital circuit diagram, a virtual terminal, and an
SD card to represent the key kept on a memory block.
The project's final output is a randomly generated 8-bit
encryption key for digital systems
Key Words: Chua’s circuit, Noise generator, Multisim,
Proteus 8.
1. INTRODUCTION
Numerous techniques have been developed by humans to
protect sensitive data from unauthorized access. People in
ancient Greece wrote messages on wood that had been
covered with wax to send a secret letter.Inthesameway,we
must hide important information in the digital age. To
accomplish this, we also work to create it "cover" for our
private data. The technical word for this process is
encryption. Digital systems frequently encrypt data using
hardware or software techniques that generate an
encryption key. In these tactics, algorithms that generate
random keys are frequently employed.
But any algorithm can contain a small amount of
randomness. After a predetermined number of repetitions,
the process will be repeated, enabling a hacker to obtain the
encryption key and steal sensitive data.
Pseudo-randomness is used in the vast majority of
encryption key generation techniques. Since they are based
on a particular algorithm, it is possible to generate the
encryption key by deciphering its pattern or using reverse
engineering methods.
Making an encryption key that defies algorithmic analysis
and cannot be reverse-engineered is the solution to this
problem. How to achieve this goal is explained in this
project. Since no algorithm will be used in the method for
generating encryption keys outlined in this project, the
encryption key will not contain any repetitions.
This study will present a novel approach to producing
encryption keys for digital systems. The keys will be
generated using a hybrid strategy that connects an analogue
circuit to a digital circuit. The analogue circuit will
incorporate Chua's circuit as well as a short chain of
inverters. Chua's circuit, which is only a straightforward
configuration of electrical parts, generates oscillations with
no recurring output. The Chua's circuit has various
requirements.twocapacitors,onenonlinearcomponent, and
one resistor.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 321
The circuit will be given a noise signal to make the
encryption key more random. A voltage device that
simulates the noise signals foundindigital systemsisused to
represent the noise signal. This technique will provide
unpredictability intheencryptionkey,makingtracingitback
extremely difficult because there is no precise mechanism
for producing the encryption key. As the weather
circumstances vary, such as temperature and cross signals,
the noise signal will shift. Regenerating theencryptionkeyis
nearly hard, even by the same manufacturer.
The encryption key must be transformed into a digital
format after it has been generated. The encryption key will
be used in digital circuits even if it is generated in the
analogue domain. For this reason, the analogue signal is
transformed into a digital signal. A converter from analogue
to digital can be used for this. The speed and voltage
requirements of digital andanaloguecircuitsweretakeninto
consideration when designing this digital convenor.
This hybrid approach will help create a highly random
encryption key that is impossible to duplicate using any
algorithm or reverse engineering.
2.IMPLEMENTATION
In this project, a novel method for creating the encryption
key for digital systems will be presented.Ananaloguecircuit
will be connected to a digital circuit as part of a hybrid
method for key generation. Chua's circuit and a short chain
of inverters will also be present in the analogue circuit.
A straightforward arrangement of electrical parts, Chua's
circuit will oscillate such that the output is never repeated.
The analogue circuit is connected to the ADC converter,
which produces a binary or numeric output.
The produced 8-bit binary output will always be distinct. In
order to decrypt the message signal, the output is then
placed into the memory card along with the encrypted key.
3.WORKING
 When a circuit is a built-in combination with Chua's
oscillator and a Noise Generator, the output always
generates a random waveform.
 Suppose we input a sine waveform into the circuit
and change the resistance value of the combined
circuit, we get the randomized waveform of a sine
wave.
 These random signals are then converted into
digital signals using an Analog-Digital Converter(A-
D converter).
 Now, these digital signals are then converted into
binary, finally, a test bench is written in Verilog to
simulate the circuit and the expected output 8-bit
encryption key is generated.
4.RESULTS
Step 1:
Initially, we created Chua’s circuit which consists of
inductors, capacitors, and resistors.
Step 2:
As we move forward, we have generated a random signal by
combing Chua's circuit with a noise generator.
Step 3:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 322
Now we have connected all 8 Chua's circuits in parallel to
generate an 8-bit random binary signal.
Step 4:
Now the 8-bit random key is stored in the memory card to
forward on the decryption side to encrypt the message
signal.
Step 5:
This is the final output in Virtual Terminal, this8-bitrandom
output changes after every interval.
5. CONCLUSION
This work put up a fresh idea for digital system encryption
key generation using a mixed-signal approach. The study
also underlines the significance of noise and fluctuating
signals in digital systems.
Using a mixed-signal approach, the model circuit for the
encryption key generator was constructed.
Phase 1 involves designing and simulating Chua's circuit. It
was challenging to determine the ideal values for the
circuit's properties to achieve the Chua effect. By utilizing
Kirchhoff's rules, numerous equationsweredevelopedto get
around this obstacle. The components of the circuit were
selected to increase the circuit's overall efficiency. The
design is appropriate for low power applications because of
this feature. In addition to the power advantage, the circuit
has a parallel bit generating approach that makes it
extremely efficient.
The second phase entails creating a noise generator thatcan
simulate actual noise. Numerous noise equations, random
number generators, and software were employed to
accomplish this.
The Arduino, which includes an integrated ADCconverter, is
the focus of phase three. We have coded the analogue signal
in Arduino to produce digital output. This programcompiles
analogue values and outputs binary values, 0 and 1, as a
result. The memory card that is connectedtoArduinoisthen
given these binary values. The binary values are kept on the
memory card here. We can see the output on the terminal
display with the aid of Rxd and Txd terminals.
6. FUTURE SCOPE
 The key's length can be changed to make a
significant difference. Another aspect that the
hacker will research is the length of the encryption
key. The length of the data that has to be encrypted
can set a range for the key's potential length. The
encryption key will gain a new level of robustness
thanks to this functionality.
 Another element thatmight makeanencryptionkey
particularly unpredictable is varying sample time.
By using a variety of random sampling rates with
respect to the oscillation frequency of the Chua's
circuit, the implementation can be carried out. The
time it takes to produce the key will be highly
variable due to the fluctuating sample rate. The
encryption key may be more secure and random
thanks to this function.
7. REFERENCES
 https://www.scribd.com/document/141906870/
Chua-s-Circuit-Implementations
 https://en.wikipedia.org/wiki/The_Codebreakers
 https://www.researchgate.net/publication/2611
26433_Sampling_Circuits_That_Break_the_kTC_Ther
mal_Noise_Limit
 https://store.arduino.cc/products/arduino-
mega-2560-rev3
 https://ieeexplore.ieee.org/document/9278996
 https://en.wikipedia.org/wiki/History_of_crypto
graphy
 https://randomnerdtutorials.com/guide-to-sd-
card-module-with-arduino/

More Related Content

Similar to ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS (20)

PDF
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
PDF
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
PDF
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
PDF
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
PDF
MULTI-STAGE ENCRYPTION USING SEEDED SDES
Eswar Publications
 
PDF
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
IRJET Journal
 
PDF
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
PDF
Simulation based design and analysis of combined effect of various data secur...
IRJET Journal
 
PDF
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET Journal
 
PDF
Development and performance comparison of modified RSA algorithm with other c...
IRJET Journal
 
PDF
A Novel Key Generation Technique Used In Tablets and Smart Phones
IJERA Editor
 
PDF
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
PDF
G05124550
IOSR-JEN
 
PDF
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
PDF
ijrrest_vol-2_issue-2_015
Ashish Gupta
 
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
PDF
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
PDF
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
PDF
Implement a novel symmetric block
ijcisjournal
 
PDF
575 579
Editor IJARCET
 
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES
 
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Aashirwad Kashyap
 
IRJET- Effect of Newly Developed Data Security Algorithm on the 128-Bits Plai...
IRJET Journal
 
MULTI-STAGE ENCRYPTION USING SEEDED SDES
Eswar Publications
 
Text Encryption and Decryption Technique using Columnar Transposition and Sub...
IRJET Journal
 
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Simulation based design and analysis of combined effect of various data secur...
IRJET Journal
 
IRJET- Simulation based design and analysis of combined effect of various ...
IRJET Journal
 
Development and performance comparison of modified RSA algorithm with other c...
IRJET Journal
 
A Novel Key Generation Technique Used In Tablets and Smart Phones
IJERA Editor
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
G05124550
IOSR-JEN
 
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 
ijrrest_vol-2_issue-2_015
Ashish Gupta
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
editor1knowledgecuddle
 
Implement a novel symmetric block
ijcisjournal
 

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
PDF
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
PPTX
Mining Presentation Underground - Copy.pptx
patallenmoore
 
PPTX
Data_Analytics_Presentation_By_Malik_Azanish_Asghar.pptx
azanishmalik1
 
PDF
monopile foundation seminar topic for civil engineering students
Ahina5
 
PPTX
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
PPTX
Coding about python and MySQL connectivity
inderjitsingh1985as
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPT
04 Origin of Evinnnnnnnnnnnnnnnnnnnnnnnnnnl-notes.ppt
LuckySangalala1
 
PDF
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
PDF
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
PPTX
drones for disaster prevention response.pptx
NawrasShatnawi1
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PDF
Number Theory practice session 25.05.2025.pdf
DrStephenStrange4
 
PPTX
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
PPTX
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
PDF
Comparative Analysis of the Use of Iron Ore Concentrate with Different Binder...
msejjournal
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PDF
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
PDF
1_ISO Certifications by Indian Industrial Standards Organisation.pdf
muhammad2010960
 
PRIZ Academy - Change Flow Thinking Master Change with Confidence.pdf
PRIZ Guru
 
Set Relation Function Practice session 24.05.2025.pdf
DrStephenStrange4
 
Mining Presentation Underground - Copy.pptx
patallenmoore
 
Data_Analytics_Presentation_By_Malik_Azanish_Asghar.pptx
azanishmalik1
 
monopile foundation seminar topic for civil engineering students
Ahina5
 
Introduction to Neural Networks and Perceptron Learning Algorithm.pptx
Kayalvizhi A
 
Coding about python and MySQL connectivity
inderjitsingh1985as
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
04 Origin of Evinnnnnnnnnnnnnnnnnnnnnnnnnnl-notes.ppt
LuckySangalala1
 
UNIT-4-FEEDBACK AMPLIFIERS AND OSCILLATORS (1).pdf
Sridhar191373
 
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
drones for disaster prevention response.pptx
NawrasShatnawi1
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
Number Theory practice session 25.05.2025.pdf
DrStephenStrange4
 
Pharmaceuticals and fine chemicals.pptxx
jaypa242004
 
ISO/IEC JTC 1/WG 9 (MAR) Convenor Report
Kurata Takeshi
 
Comparative Analysis of the Use of Iron Ore Concentrate with Different Binder...
msejjournal
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
MOBILE AND WEB BASED REMOTE BUSINESS MONITORING SYSTEM
ijait
 
1_ISO Certifications by Indian Industrial Standards Organisation.pdf
muhammad2010960
 
Ad

ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 320 ENCRYPTION KEY GENERATION FOR DIGITAL CIRCUITS USING ANALOG CIRCUITS MR. A Y PRABHAKAR, ANKIT PATHAK, AVANISH PAL, AYUSH MAHESHWARI Professor, Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. Department of E&TC Engineering, Bharati Vidyapeeth (Deemed to be University) College of Engineering, Pune, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Previously, encryptionkeysfordigitalsystems had been generated using hardware and software techniques. However, these techniques can be duplicated because they are pseudo-random. Because of this, a hacker can readily duplicate and enhance the method that produces the encryption key in software. This problem can be resolved bycreatingarandomencryption key that doesn't adhere to any algorithm or pattern. To generate this kind of key, a hybrid methodology issuggestedin this research. The digital and analogue components are combined in the suggested circuit. The analogue domain is represented by Chua's circuit with a random noise source. Two capacitors, a resistor, and an inductor make up Chua's circuit, which may generate an oscillating waveform with a distinct output. The Chua's circuit is fueled by a randomized input thanks to the addition of noise in the circuits, which produces a much more random output. The key is generated, and then the data is stored on a digital storage medium. Sd card is used to store the digital bits, and Proteus8 is used to simulate the analogue component. RXD TXD Virtual Terminal may display the circuit's 8-bit digital output signals. The system makes use of an analogue circuit diagram, a digital circuit diagram, a virtual terminal, and an SD card to represent the key kept on a memory block. The project's final output is a randomly generated 8-bit encryption key for digital systems Key Words: Chua’s circuit, Noise generator, Multisim, Proteus 8. 1. INTRODUCTION Numerous techniques have been developed by humans to protect sensitive data from unauthorized access. People in ancient Greece wrote messages on wood that had been covered with wax to send a secret letter.Inthesameway,we must hide important information in the digital age. To accomplish this, we also work to create it "cover" for our private data. The technical word for this process is encryption. Digital systems frequently encrypt data using hardware or software techniques that generate an encryption key. In these tactics, algorithms that generate random keys are frequently employed. But any algorithm can contain a small amount of randomness. After a predetermined number of repetitions, the process will be repeated, enabling a hacker to obtain the encryption key and steal sensitive data. Pseudo-randomness is used in the vast majority of encryption key generation techniques. Since they are based on a particular algorithm, it is possible to generate the encryption key by deciphering its pattern or using reverse engineering methods. Making an encryption key that defies algorithmic analysis and cannot be reverse-engineered is the solution to this problem. How to achieve this goal is explained in this project. Since no algorithm will be used in the method for generating encryption keys outlined in this project, the encryption key will not contain any repetitions. This study will present a novel approach to producing encryption keys for digital systems. The keys will be generated using a hybrid strategy that connects an analogue circuit to a digital circuit. The analogue circuit will incorporate Chua's circuit as well as a short chain of inverters. Chua's circuit, which is only a straightforward configuration of electrical parts, generates oscillations with no recurring output. The Chua's circuit has various requirements.twocapacitors,onenonlinearcomponent, and one resistor.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 321 The circuit will be given a noise signal to make the encryption key more random. A voltage device that simulates the noise signals foundindigital systemsisused to represent the noise signal. This technique will provide unpredictability intheencryptionkey,makingtracingitback extremely difficult because there is no precise mechanism for producing the encryption key. As the weather circumstances vary, such as temperature and cross signals, the noise signal will shift. Regenerating theencryptionkeyis nearly hard, even by the same manufacturer. The encryption key must be transformed into a digital format after it has been generated. The encryption key will be used in digital circuits even if it is generated in the analogue domain. For this reason, the analogue signal is transformed into a digital signal. A converter from analogue to digital can be used for this. The speed and voltage requirements of digital andanaloguecircuitsweretakeninto consideration when designing this digital convenor. This hybrid approach will help create a highly random encryption key that is impossible to duplicate using any algorithm or reverse engineering. 2.IMPLEMENTATION In this project, a novel method for creating the encryption key for digital systems will be presented.Ananaloguecircuit will be connected to a digital circuit as part of a hybrid method for key generation. Chua's circuit and a short chain of inverters will also be present in the analogue circuit. A straightforward arrangement of electrical parts, Chua's circuit will oscillate such that the output is never repeated. The analogue circuit is connected to the ADC converter, which produces a binary or numeric output. The produced 8-bit binary output will always be distinct. In order to decrypt the message signal, the output is then placed into the memory card along with the encrypted key. 3.WORKING  When a circuit is a built-in combination with Chua's oscillator and a Noise Generator, the output always generates a random waveform.  Suppose we input a sine waveform into the circuit and change the resistance value of the combined circuit, we get the randomized waveform of a sine wave.  These random signals are then converted into digital signals using an Analog-Digital Converter(A- D converter).  Now, these digital signals are then converted into binary, finally, a test bench is written in Verilog to simulate the circuit and the expected output 8-bit encryption key is generated. 4.RESULTS Step 1: Initially, we created Chua’s circuit which consists of inductors, capacitors, and resistors. Step 2: As we move forward, we have generated a random signal by combing Chua's circuit with a noise generator. Step 3:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | Jun 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 322 Now we have connected all 8 Chua's circuits in parallel to generate an 8-bit random binary signal. Step 4: Now the 8-bit random key is stored in the memory card to forward on the decryption side to encrypt the message signal. Step 5: This is the final output in Virtual Terminal, this8-bitrandom output changes after every interval. 5. CONCLUSION This work put up a fresh idea for digital system encryption key generation using a mixed-signal approach. The study also underlines the significance of noise and fluctuating signals in digital systems. Using a mixed-signal approach, the model circuit for the encryption key generator was constructed. Phase 1 involves designing and simulating Chua's circuit. It was challenging to determine the ideal values for the circuit's properties to achieve the Chua effect. By utilizing Kirchhoff's rules, numerous equationsweredevelopedto get around this obstacle. The components of the circuit were selected to increase the circuit's overall efficiency. The design is appropriate for low power applications because of this feature. In addition to the power advantage, the circuit has a parallel bit generating approach that makes it extremely efficient. The second phase entails creating a noise generator thatcan simulate actual noise. Numerous noise equations, random number generators, and software were employed to accomplish this. The Arduino, which includes an integrated ADCconverter, is the focus of phase three. We have coded the analogue signal in Arduino to produce digital output. This programcompiles analogue values and outputs binary values, 0 and 1, as a result. The memory card that is connectedtoArduinoisthen given these binary values. The binary values are kept on the memory card here. We can see the output on the terminal display with the aid of Rxd and Txd terminals. 6. FUTURE SCOPE  The key's length can be changed to make a significant difference. Another aspect that the hacker will research is the length of the encryption key. The length of the data that has to be encrypted can set a range for the key's potential length. The encryption key will gain a new level of robustness thanks to this functionality.  Another element thatmight makeanencryptionkey particularly unpredictable is varying sample time. By using a variety of random sampling rates with respect to the oscillation frequency of the Chua's circuit, the implementation can be carried out. The time it takes to produce the key will be highly variable due to the fluctuating sample rate. The encryption key may be more secure and random thanks to this function. 7. REFERENCES  https://www.scribd.com/document/141906870/ Chua-s-Circuit-Implementations  https://en.wikipedia.org/wiki/The_Codebreakers  https://www.researchgate.net/publication/2611 26433_Sampling_Circuits_That_Break_the_kTC_Ther mal_Noise_Limit  https://store.arduino.cc/products/arduino- mega-2560-rev3  https://ieeexplore.ieee.org/document/9278996  https://en.wikipedia.org/wiki/History_of_crypto graphy  https://randomnerdtutorials.com/guide-to-sd- card-module-with-arduino/