SlideShare une entreprise Scribd logo
1  sur  26
Implementation of Decimation in Time-Radix-2
FFT Algorithms in Signal Processing of
Encrypted Domain(SPED)

AJAY KUMAR.M.ANNAIAH
Ph.D Research scholar
Dept of IT
NITK-Surathkal
ajaymodaliger@gmail.com
CONTENT


INTRODUCTION



REVIEW OF DFT –FFT ALGORITHM



TIME COMPLEXITY ANALYSIS OF RADIX-2



S.P.E.D



HOMOMORPHISM V/S SIGNAL ENCRYPTION



IMPLEMENTATION OF e-DFT
1.Introduction
•

Discrete Fourier Transform(DFT) invented around 1805 by Carls Friedrich Gauss.
Limitation –computation time.

•

In the mid-1965 DFT is reinvented as The Fast Fourier Transform (FFT), By
Cooley-Tukey

•

FFT reduced the complexity of a Discrete Fourier Transform from O(N²), to
O(N·logN),
 purpose of reducing time complexity
 large number of Application developed

•

FFT algorithms became known as the Radix- 2 algorithm and was shortly
followed by the Radix-3, Radix-4, and Mixed Radix algorithms

•

Evaluation of research Fast Hartley Transform (FHT)and the Split Radix (SRFFT),
QFT. DITF
2.Review of FFT Algorithms
•

The basic principle behind most Radix-based FFT algorithms is to exploit the
symmetry properties of a complex exponential that is the cornerstone of the
Discrete Fourier Transform (DFT). These algorithms
 Complex conjugate symmetry
 Periodicity

•

Divide the problem into similar sub-problems (butterfly computations) and achieve
a reduction in computational complexity.

•

All Radix algorithms are similar in structure differing only in the core computation
of the butterflies. The FHT differs from the other algorithms in that it uses a real
kernel

•

The DITF algorithm uses both the Decimation-In-Time (DIT) and Decimation-InFrequency (DIF) frameworks for separate parts of the
computation to achieve a reduction in the computational complexity.
Discrete Fourier Transform(DFT)


Allows us to compute an approximation of
the Fourier Transform on a discrete set of
frequencies from a discrete set of time
samples.
N 1

Xk

xn e

j2

k
n
N

for k

0, 1,, N 1

n 0






Where k are the index of the discrete
frequencies and n the index of the time samples
N  complex multiplies
N-1  complex addition
Symmetries properties of FFT


FFT algorithms exploits two symmetric properties
 Complex conjugate symmetry
K

W
N

N-n

WN

Kn *
N

Kn

W

 Periodicity

n
W
K
N

K N n
N

W

k N n
N

W

 Finally

WN

e

j2

k
n
N

Kn
or WN e

j2

k
n
N
Fast Fourier Transform


Cooley-Tukey algorithm:




Kn
WN e

j2

k
n
N

Based on decimation, leads to a factorization of
computations.
Let us first look at the classical radix 2
decimation in time.
FFT uses the Divide and conquer rule split the
Big DFT computation between odd and even
part
N 1

Xk

xn e

j2

k
n
N

for k

0, 1,, N 1

n 0

N 1

N 1
kn
x n WN

X k
n 0

kn
x n WN
n 0
Fast Fourier Transform




Consider and replace even and odd indices part
Even part of n2r
Odd part of n2r+1 for all r=0,1…N/2-1
N /2 1

N /2 1

k2r
x 2r WN

X k
r 0

N/2 1

Xk

k
x 2r 1 WN 2r
n 0

2 kr
N

N/2 1
2kr
x 2r 1 WN

x 2r W
r 0

2 kr
N

x 2r W
r 0

K
WN

n 0

N /2 1

X k

1

N /2 1

W

K
N

x 2r 1 W
n 0

2 Kr
N
Fast Fourier Transform
N /2 1

X k

2 kr
N

x 2r W

N /2 1

W

K
N

x 2r 1 W

r 0

n 0

Simplify the term



N/2 1
r 0

Xk


X k
e

WN

WN

2

N/2 1

kr
x 2r WN 2

Xk

2 Kr
N

K
WN

x 2r 1 WNkr2
n 0

K
WN X 0 k

Now the sum of two N/2 point DFT’s we
can use to get a N point DFT
2 point Butterfly


Example if N=8 the even number[0,2,4,8]
odd number[0.3.5.7]
X(0)
X(1)

x(0)
x(2)
TFD N/2

•N/2(N/2-1) complex ‘+’ for each
N/2 DFT.
•(N/2)2 complex ‘ ’ for each
DFT.

x(N-2)

X(N/2-1)
W0
W1

x(1)
x(3)

We need:

-

X(N/2)
X(N/2+1)

•N/2 complex ‘ ’ at the input of
the butterflies.

•N complex ‘+’ for the butterflies.
•Grand total:
N2/2 complex ‘+’

TFD N/2

N/2(N/2+1) complex ‘ ’
WN/2-1

x(N-1)

N

2
2

-

X(N-1)

.2.......... .......... ......

N
Fast Fourier Transform


2.point FFT splitting in to multiple pass i.e.
N

N

2

2
2

.2.......... .......... ......

N

..... * N 4 ......... * N 8 ...... 8 * N 16
2
4
till



simplify the given form by applying
mathematical rule …



Finally computational time complexity of
Radix-2 FFT algorithm is

N log 2 N
Algorithm Parameters 2/2


The parameters are shown below:

1st stage
Node
Spacing
Butterflies
per group
Number of
groups
Twiddle
factor

2nd stage

3rd stage

…

Last stage

1

2

3

…

N/2

1

2

3

…

N/2

N/2

N/4

N/8

…

1

…
Algorithm Parameters


The FFT can be computed according to the
following pseudo-code:




For each stage
 For each group of butterfly
 For each butterfly
compute butterfly
 end
 end
end
Number of Operations


If N=2r, we have r=log2(N) stages. For each
one we have:





N/2 complex ‘ ’ (some of them are by ‘1’).
N complex ‘+’.

Thus the grand total of operations is:




N/2 log2(N) complex ‘ ’.
N log2(N) complex ‘+’.
N
128
1024
4096

+
896
10240
49152

x
448
5120
24576

These counts can be compared with the ones for the DFT
3.Signal processing in encrypted domain
•

Signal processing is an area of systems engineering electrical engineering and applied
mathematics that deals with operations on or analysis of analog as well
as digitized signals representing time-varying or spatially varying physical quantities.

•

Signals of interest can include sound. Electromagnetic radiation images
and sensor readings telecommunication transmission signals, and many others

•

Signal transmission using electronic signal processing. Transducers convert signals from
other physical waveforms to electrical current or voltage waveforms, which then are
processed, transmitted as electromagnetic waves, received and converted by another
transducer to final form.
4. Encrypted Signal processing
• Statistical signal processing – analyzing and extracting information from signals
and noise based on their stochastic properties
• Spectral estimation – for determining the spectral content (i.e., the distribution
of power over frequency) of a time series
• Audio signal processing – for electrical signals representing sound, such as
speech or music
• Speech signal processing – for processing and interpreting spoken words
• Image processing – in digital cameras, computers and various imaging systems
• Video processing – for interpreting moving pictures

• Filtering – used in many fields to process signals
• Time-frequency analysis – for processing non-stationary signals
5.Signal processing module v/s cryptosystem
• Signal processing modules working directly on encrypted Signal data
provide better solution to application scenarios

• valuable signals must be protected from a malicious processing device.
• investigate the implementation of the discrete Fourier transform (DFT)
in the encrypted domain, by using the homomorphic properties of the
underlying cryptosystem.
• Several important issues are considered for the direct DFT, the radix2, and the radix-4 fast Fourier algorithms, including the error analysis
and the maximum size of the sequence that can be transformed.
• The results show that the radix-4 FFT is best suited for an encrypted
domain implementation. With computational complexity and error
analysis
6.Traditional approach of signal Encryption
• Most of technological solutions proposed issues of multimedia security rely
on the use of cryptography.
• Early works in this direction by applying cryptographic primitives, is to
build a secure layer on top of signal application.
• secure layer is able to protect them from leakage of critical information
Signal processing modules.
•

Examples of such an approach include the encryption of content before its
transmission or storage (like encrypted digital TV channels), or wrapping
multimedia objects into an encrypted system with an application (the
reader)
• encryption layer is used only to protect the data against third parties and
authorized to access the data.
• signal processing tools capable of operating directly on encrypted data
highlighting the benefits offered by the availability
7.Public key cryptography for signal encryption
Homomorphism for encrypted domain
•

•

Homomorphic encryption is a concept where specific computations can be
performed on the cipher text of a message. The result of these computations is the
same as if the operations were performed on the plaintext first and encrypted
afterwards. So homomorphic encryption allows parties who do not have an
decryption key and thus don't know the plaintext value, still perform computation
on this value
The two group homomorphism operations are the arithmetic addition and
multiplication.

•

A homomorphic encryption is additive is
E(x + y) = E(x) . E(y)
1) where E denotes an encryption function, 2) . denotes an operation depending on
cipher
3) x and y are plaintext messages.

•

A homomorphic encryption is multiplicative if:
E(x y) = E(x)

. E(y)
Homomorphism signal encryption Signal encryption
Homomorphism encryption
simple example of how a homomorphic encryption
scheme might work in cloud computing:
• Company X has a very important data set (VIDS) that consists of the
numbers 5 and 10. To encrypt the data set, Company X multiplies each
element in the set by 2, creating a new set whose members are 10 and 20.
• Company X sends the encrypted VIDS set to the cloud for safe storage. A
few months later, the government contacts Company X and requests the
sum of VIDS elements.
• Company X is very busy, so it asks the cloud provider to perform the
operation. The cloud provider, who only has access to the encrypted data
set, finds the sum of 10 + 20 and returns the answer 30.

• Company X decrypts the cloud provider’s reply and provides the
government with the decrypted answer, 15.
Encrypted domain DFT (e-DFT)


Consider the DFT sequence x(n) is defined as :
N 1

X k

xn e

j2

k
n
N

for k

0, 1,  , N 1

n 0

N 1

X k

xnW

nk

for k

0, 1,, N 1

n 0





w and x(n) is a finite duration sequences with
length M
Consider the scenario the where electronic
processor fed the input data signal as encrypted
data format as in digital form such as 0’s and 1’s
Encrypted domain DFT (e-DFT)


Encrypted input data signal in the form
of digital 0’s and 1’s in the form of
equation



E(X)=(E[x(0)],E[x(1)],…..E[x(N-1)]

in order to make possible linear
computation for encrypted input signal
use homographic technique of Additive
that is represented by
E(x + y) = E(x)

. E(y)
Encrypted domain DFT (e-DFT)
• Issues of DFT in SPED is
• both input sample of encrypted signal and DFT
coefficients need to represented as integer values
• Paillier homographic cryptosystem uses modular
operation
• Uses of FFT-Radix 4 reduces the time complexity in
SPED and best suited for encryption
.

THANK YOU

Contenu connexe

Tendances

Correlative level coding
Correlative level codingCorrelative level coding
Correlative level codingsrkrishna341
 
Overlap save method and overlap add method in dsp
Overlap save method and overlap add method in dspOverlap save method and overlap add method in dsp
Overlap save method and overlap add method in dspchitra raju
 
DSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital FiltersDSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital FiltersAmr E. Mohamed
 
Fir filter design using windows
Fir filter design using windowsFir filter design using windows
Fir filter design using windowsSarang Joshi
 
Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codesManish Srivastava
 
IIR filter realization using direct form I & II
IIR filter realization using direct form I & IIIIR filter realization using direct form I & II
IIR filter realization using direct form I & IISarang Joshi
 
Low power & area efficient carry select adder
Low power & area efficient carry select adderLow power & area efficient carry select adder
Low power & area efficient carry select adderSai Vara Prasad P
 
Nyquist criterion for zero ISI
Nyquist criterion for zero ISINyquist criterion for zero ISI
Nyquist criterion for zero ISIGunasekara Reddy
 
Divide by N clock
Divide by N clockDivide by N clock
Divide by N clockMantra VLSI
 
Fpga architectures and applications
Fpga architectures and applicationsFpga architectures and applications
Fpga architectures and applicationsSudhanshu Janwadkar
 
structural modeling, hazards
structural modeling, hazardsstructural modeling, hazards
structural modeling, hazardsdennis gookyi
 
Fft analysis
Fft analysisFft analysis
Fft analysisSatrious
 
SHIFT REGISTERS
SHIFT REGISTERSSHIFT REGISTERS
SHIFT REGISTERSkumari36
 
Nyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channelNyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channelPriyangaKR1
 

Tendances (20)

Correlative level coding
Correlative level codingCorrelative level coding
Correlative level coding
 
Overlap save method and overlap add method in dsp
Overlap save method and overlap add method in dspOverlap save method and overlap add method in dsp
Overlap save method and overlap add method in dsp
 
Decimation in Time
Decimation in TimeDecimation in Time
Decimation in Time
 
DSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital FiltersDSP_FOEHU - Lec 07 - Digital Filters
DSP_FOEHU - Lec 07 - Digital Filters
 
Fir filter design using windows
Fir filter design using windowsFir filter design using windows
Fir filter design using windows
 
Convolution codes and turbo codes
Convolution codes and turbo codesConvolution codes and turbo codes
Convolution codes and turbo codes
 
IIR filter realization using direct form I & II
IIR filter realization using direct form I & IIIIR filter realization using direct form I & II
IIR filter realization using direct form I & II
 
Low power & area efficient carry select adder
Low power & area efficient carry select adderLow power & area efficient carry select adder
Low power & area efficient carry select adder
 
Nyquist criterion for zero ISI
Nyquist criterion for zero ISINyquist criterion for zero ISI
Nyquist criterion for zero ISI
 
L5 Adders
L5 AddersL5 Adders
L5 Adders
 
Unit I.fundamental of Programmable DSP
Unit I.fundamental of Programmable DSPUnit I.fundamental of Programmable DSP
Unit I.fundamental of Programmable DSP
 
Information theory
Information theoryInformation theory
Information theory
 
Divide by N clock
Divide by N clockDivide by N clock
Divide by N clock
 
Modulation Techniques for Mobile Radio
Modulation Techniques for Mobile RadioModulation Techniques for Mobile Radio
Modulation Techniques for Mobile Radio
 
Fpga architectures and applications
Fpga architectures and applicationsFpga architectures and applications
Fpga architectures and applications
 
structural modeling, hazards
structural modeling, hazardsstructural modeling, hazards
structural modeling, hazards
 
Fft analysis
Fft analysisFft analysis
Fft analysis
 
Convolution Codes
Convolution CodesConvolution Codes
Convolution Codes
 
SHIFT REGISTERS
SHIFT REGISTERSSHIFT REGISTERS
SHIFT REGISTERS
 
Nyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channelNyquist criterion for distortion less baseband binary channel
Nyquist criterion for distortion less baseband binary channel
 

En vedette

Radix 4 FFT algorithm and it time complexity computation
Radix 4 FFT algorithm and it time complexity computationRadix 4 FFT algorithm and it time complexity computation
Radix 4 FFT algorithm and it time complexity computationRaj Jaiswal
 
The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)Oka Danil
 
Design of FFT Processor
Design of FFT ProcessorDesign of FFT Processor
Design of FFT ProcessorRohit Singh
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFTtaha25
 
fft using labview
fft using labviewfft using labview
fft using labviewkiranrockz
 
fourier transforms
fourier transformsfourier transforms
fourier transformsUmang Gupta
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd Iaetsd
 
Remote Monitoring of Lead-Acid Battery Based on WLAN
Remote Monitoring of Lead-Acid Battery Based on WLANRemote Monitoring of Lead-Acid Battery Based on WLAN
Remote Monitoring of Lead-Acid Battery Based on WLANOka Danil
 
Radix 2 code
Radix 2 codeRadix 2 code
Radix 2 codepradipakv
 
verilog coding of butterfly diagram
verilog coding of butterfly diagram verilog coding of butterfly diagram
verilog coding of butterfly diagram Venkat Malai Avichi
 
Hadoop at Bloomberg:Medium data for the financial industry
Hadoop at Bloomberg:Medium data for the financial industryHadoop at Bloomberg:Medium data for the financial industry
Hadoop at Bloomberg:Medium data for the financial industryMatthew Hunt
 
Instrumentation Engineering : Signals & systems, THE GATE ACADEMY
Instrumentation Engineering : Signals & systems, THE GATE ACADEMYInstrumentation Engineering : Signals & systems, THE GATE ACADEMY
Instrumentation Engineering : Signals & systems, THE GATE ACADEMYklirantga
 
xử lý số tín hiệu -Chuong 4
xử lý số tín hiệu -Chuong 4xử lý số tín hiệu -Chuong 4
xử lý số tín hiệu -Chuong 4Ngai Hoang Van
 

En vedette (20)

Radix 4 FFT algorithm and it time complexity computation
Radix 4 FFT algorithm and it time complexity computationRadix 4 FFT algorithm and it time complexity computation
Radix 4 FFT algorithm and it time complexity computation
 
Dif fft
Dif fftDif fft
Dif fft
 
Fft ppt
Fft pptFft ppt
Fft ppt
 
The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)
 
Design of FFT Processor
Design of FFT ProcessorDesign of FFT Processor
Design of FFT Processor
 
Dsp U Lec10 DFT And FFT
Dsp U   Lec10  DFT And  FFTDsp U   Lec10  DFT And  FFT
Dsp U Lec10 DFT And FFT
 
fft using labview
fft using labviewfft using labview
fft using labview
 
Dsp lecture vol 2 dft & fft
Dsp lecture vol 2 dft & fftDsp lecture vol 2 dft & fft
Dsp lecture vol 2 dft & fft
 
fourier transforms
fourier transformsfourier transforms
fourier transforms
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
 
A new radix 4 fft algorithm
A new radix 4 fft algorithmA new radix 4 fft algorithm
A new radix 4 fft algorithm
 
Use Of DFT In Power Spectral Estimation
Use Of DFT In Power Spectral EstimationUse Of DFT In Power Spectral Estimation
Use Of DFT In Power Spectral Estimation
 
Remote Monitoring of Lead-Acid Battery Based on WLAN
Remote Monitoring of Lead-Acid Battery Based on WLANRemote Monitoring of Lead-Acid Battery Based on WLAN
Remote Monitoring of Lead-Acid Battery Based on WLAN
 
Radix 2 code
Radix 2 codeRadix 2 code
Radix 2 code
 
verilog coding of butterfly diagram
verilog coding of butterfly diagram verilog coding of butterfly diagram
verilog coding of butterfly diagram
 
Hadoop at Bloomberg:Medium data for the financial industry
Hadoop at Bloomberg:Medium data for the financial industryHadoop at Bloomberg:Medium data for the financial industry
Hadoop at Bloomberg:Medium data for the financial industry
 
Instrumentation Engineering : Signals & systems, THE GATE ACADEMY
Instrumentation Engineering : Signals & systems, THE GATE ACADEMYInstrumentation Engineering : Signals & systems, THE GATE ACADEMY
Instrumentation Engineering : Signals & systems, THE GATE ACADEMY
 
xử lý số tín hiệu -Chuong 4
xử lý số tín hiệu -Chuong 4xử lý số tín hiệu -Chuong 4
xử lý số tín hiệu -Chuong 4
 
Z transform
Z transformZ transform
Z transform
 
Ofdm(tutorial)
Ofdm(tutorial)Ofdm(tutorial)
Ofdm(tutorial)
 

Similaire à DIT-Radix-2-FFT in SPED

Ff tand matlab-wanjun huang
Ff tand matlab-wanjun huangFf tand matlab-wanjun huang
Ff tand matlab-wanjun huangjhonce
 
Ff tand matlab-wanjun huang
Ff tand matlab-wanjun huangFf tand matlab-wanjun huang
Ff tand matlab-wanjun huangSagar Ahir
 
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...cscpconf
 
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...csandit
 
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...ijma
 
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...IDES Editor
 
Cyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radarsCyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radarseSAT Journals
 
Ecg signal compression for diverse transforms
Ecg signal compression for diverse transformsEcg signal compression for diverse transforms
Ecg signal compression for diverse transformsAlexander Decker
 
Iaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm usingIaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm usingIaetsd Iaetsd
 
Course-Notes__Advanced-DSP.pdf
Course-Notes__Advanced-DSP.pdfCourse-Notes__Advanced-DSP.pdf
Course-Notes__Advanced-DSP.pdfShreeDevi42
 
Advanced_DSP_J_G_Proakis.pdf
Advanced_DSP_J_G_Proakis.pdfAdvanced_DSP_J_G_Proakis.pdf
Advanced_DSP_J_G_Proakis.pdfHariPrasad314745
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6eSAT Publishing House
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6eSAT Journals
 
3 f3 3_fast_ fourier_transform
3 f3 3_fast_ fourier_transform3 f3 3_fast_ fourier_transform
3 f3 3_fast_ fourier_transformWiw Miu
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
 
Fast Fourier Transform (FFT) Algorithms in DSP
Fast Fourier Transform (FFT) Algorithms in DSPFast Fourier Transform (FFT) Algorithms in DSP
Fast Fourier Transform (FFT) Algorithms in DSProykousik2020
 
EC8562 DSP Viva Questions
EC8562 DSP Viva Questions EC8562 DSP Viva Questions
EC8562 DSP Viva Questions ssuser2797e4
 

Similaire à DIT-Radix-2-FFT in SPED (20)

Ff tand matlab-wanjun huang
Ff tand matlab-wanjun huangFf tand matlab-wanjun huang
Ff tand matlab-wanjun huang
 
Ff tand matlab-wanjun huang
Ff tand matlab-wanjun huangFf tand matlab-wanjun huang
Ff tand matlab-wanjun huang
 
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
 
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
 
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
 
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
FPGA Implementation of Large Area Efficient and Low Power Geortzel Algorithm ...
 
Cyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radarsCyclostationary analysis of polytime coded signals for lpi radars
Cyclostationary analysis of polytime coded signals for lpi radars
 
Ecg signal compression for diverse transforms
Ecg signal compression for diverse transformsEcg signal compression for diverse transforms
Ecg signal compression for diverse transforms
 
Res701 research methodology fft1
Res701 research methodology fft1Res701 research methodology fft1
Res701 research methodology fft1
 
Iaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm usingIaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm using
 
Course-Notes__Advanced-DSP.pdf
Course-Notes__Advanced-DSP.pdfCourse-Notes__Advanced-DSP.pdf
Course-Notes__Advanced-DSP.pdf
 
Advanced_DSP_J_G_Proakis.pdf
Advanced_DSP_J_G_Proakis.pdfAdvanced_DSP_J_G_Proakis.pdf
Advanced_DSP_J_G_Proakis.pdf
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
 
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
 
G010233540
G010233540G010233540
G010233540
 
3 f3 3_fast_ fourier_transform
3 f3 3_fast_ fourier_transform3 f3 3_fast_ fourier_transform
3 f3 3_fast_ fourier_transform
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
 
IARE_DSP_PPT.pptx
IARE_DSP_PPT.pptxIARE_DSP_PPT.pptx
IARE_DSP_PPT.pptx
 
Fast Fourier Transform (FFT) Algorithms in DSP
Fast Fourier Transform (FFT) Algorithms in DSPFast Fourier Transform (FFT) Algorithms in DSP
Fast Fourier Transform (FFT) Algorithms in DSP
 
EC8562 DSP Viva Questions
EC8562 DSP Viva Questions EC8562 DSP Viva Questions
EC8562 DSP Viva Questions
 

Dernier

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 

Dernier (20)

Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

DIT-Radix-2-FFT in SPED

  • 1. Implementation of Decimation in Time-Radix-2 FFT Algorithms in Signal Processing of Encrypted Domain(SPED) AJAY KUMAR.M.ANNAIAH Ph.D Research scholar Dept of IT NITK-Surathkal ajaymodaliger@gmail.com
  • 2. CONTENT  INTRODUCTION  REVIEW OF DFT –FFT ALGORITHM  TIME COMPLEXITY ANALYSIS OF RADIX-2  S.P.E.D  HOMOMORPHISM V/S SIGNAL ENCRYPTION  IMPLEMENTATION OF e-DFT
  • 3. 1.Introduction • Discrete Fourier Transform(DFT) invented around 1805 by Carls Friedrich Gauss. Limitation –computation time. • In the mid-1965 DFT is reinvented as The Fast Fourier Transform (FFT), By Cooley-Tukey • FFT reduced the complexity of a Discrete Fourier Transform from O(N²), to O(N·logN),  purpose of reducing time complexity  large number of Application developed • FFT algorithms became known as the Radix- 2 algorithm and was shortly followed by the Radix-3, Radix-4, and Mixed Radix algorithms • Evaluation of research Fast Hartley Transform (FHT)and the Split Radix (SRFFT), QFT. DITF
  • 4. 2.Review of FFT Algorithms • The basic principle behind most Radix-based FFT algorithms is to exploit the symmetry properties of a complex exponential that is the cornerstone of the Discrete Fourier Transform (DFT). These algorithms  Complex conjugate symmetry  Periodicity • Divide the problem into similar sub-problems (butterfly computations) and achieve a reduction in computational complexity. • All Radix algorithms are similar in structure differing only in the core computation of the butterflies. The FHT differs from the other algorithms in that it uses a real kernel • The DITF algorithm uses both the Decimation-In-Time (DIT) and Decimation-InFrequency (DIF) frameworks for separate parts of the computation to achieve a reduction in the computational complexity.
  • 5. Discrete Fourier Transform(DFT)  Allows us to compute an approximation of the Fourier Transform on a discrete set of frequencies from a discrete set of time samples. N 1 Xk xn e j2 k n N for k 0, 1,, N 1 n 0    Where k are the index of the discrete frequencies and n the index of the time samples N  complex multiplies N-1  complex addition
  • 6. Symmetries properties of FFT  FFT algorithms exploits two symmetric properties  Complex conjugate symmetry K W N N-n WN Kn * N Kn W  Periodicity n W K N K N n N W k N n N W  Finally WN e j2 k n N Kn or WN e j2 k n N
  • 7. Fast Fourier Transform  Cooley-Tukey algorithm:    Kn WN e j2 k n N Based on decimation, leads to a factorization of computations. Let us first look at the classical radix 2 decimation in time. FFT uses the Divide and conquer rule split the Big DFT computation between odd and even part N 1 Xk xn e j2 k n N for k 0, 1,, N 1 n 0 N 1 N 1 kn x n WN X k n 0 kn x n WN n 0
  • 8. Fast Fourier Transform    Consider and replace even and odd indices part Even part of n2r Odd part of n2r+1 for all r=0,1…N/2-1 N /2 1 N /2 1 k2r x 2r WN X k r 0 N/2 1 Xk k x 2r 1 WN 2r n 0 2 kr N N/2 1 2kr x 2r 1 WN x 2r W r 0 2 kr N x 2r W r 0 K WN n 0 N /2 1 X k 1 N /2 1 W K N x 2r 1 W n 0 2 Kr N
  • 9. Fast Fourier Transform N /2 1 X k 2 kr N x 2r W N /2 1 W K N x 2r 1 W r 0 n 0 Simplify the term  N/2 1 r 0 Xk  X k e WN WN 2 N/2 1 kr x 2r WN 2 Xk 2 Kr N K WN x 2r 1 WNkr2 n 0 K WN X 0 k Now the sum of two N/2 point DFT’s we can use to get a N point DFT
  • 10. 2 point Butterfly  Example if N=8 the even number[0,2,4,8] odd number[0.3.5.7] X(0) X(1) x(0) x(2) TFD N/2 •N/2(N/2-1) complex ‘+’ for each N/2 DFT. •(N/2)2 complex ‘ ’ for each DFT. x(N-2) X(N/2-1) W0 W1 x(1) x(3) We need: - X(N/2) X(N/2+1) •N/2 complex ‘ ’ at the input of the butterflies. •N complex ‘+’ for the butterflies. •Grand total: N2/2 complex ‘+’ TFD N/2 N/2(N/2+1) complex ‘ ’ WN/2-1 x(N-1) N 2 2 - X(N-1) .2.......... .......... ...... N
  • 11. Fast Fourier Transform  2.point FFT splitting in to multiple pass i.e. N N 2 2 2 .2.......... .......... ...... N ..... * N 4 ......... * N 8 ...... 8 * N 16 2 4 till  simplify the given form by applying mathematical rule …  Finally computational time complexity of Radix-2 FFT algorithm is N log 2 N
  • 12. Algorithm Parameters 2/2  The parameters are shown below: 1st stage Node Spacing Butterflies per group Number of groups Twiddle factor 2nd stage 3rd stage … Last stage 1 2 3 … N/2 1 2 3 … N/2 N/2 N/4 N/8 … 1 …
  • 13. Algorithm Parameters  The FFT can be computed according to the following pseudo-code:   For each stage  For each group of butterfly  For each butterfly compute butterfly  end  end end
  • 14. Number of Operations  If N=2r, we have r=log2(N) stages. For each one we have:    N/2 complex ‘ ’ (some of them are by ‘1’). N complex ‘+’. Thus the grand total of operations is:   N/2 log2(N) complex ‘ ’. N log2(N) complex ‘+’. N 128 1024 4096 + 896 10240 49152 x 448 5120 24576 These counts can be compared with the ones for the DFT
  • 15. 3.Signal processing in encrypted domain • Signal processing is an area of systems engineering electrical engineering and applied mathematics that deals with operations on or analysis of analog as well as digitized signals representing time-varying or spatially varying physical quantities. • Signals of interest can include sound. Electromagnetic radiation images and sensor readings telecommunication transmission signals, and many others • Signal transmission using electronic signal processing. Transducers convert signals from other physical waveforms to electrical current or voltage waveforms, which then are processed, transmitted as electromagnetic waves, received and converted by another transducer to final form.
  • 16. 4. Encrypted Signal processing • Statistical signal processing – analyzing and extracting information from signals and noise based on their stochastic properties • Spectral estimation – for determining the spectral content (i.e., the distribution of power over frequency) of a time series • Audio signal processing – for electrical signals representing sound, such as speech or music • Speech signal processing – for processing and interpreting spoken words • Image processing – in digital cameras, computers and various imaging systems • Video processing – for interpreting moving pictures • Filtering – used in many fields to process signals • Time-frequency analysis – for processing non-stationary signals
  • 17. 5.Signal processing module v/s cryptosystem • Signal processing modules working directly on encrypted Signal data provide better solution to application scenarios • valuable signals must be protected from a malicious processing device. • investigate the implementation of the discrete Fourier transform (DFT) in the encrypted domain, by using the homomorphic properties of the underlying cryptosystem. • Several important issues are considered for the direct DFT, the radix2, and the radix-4 fast Fourier algorithms, including the error analysis and the maximum size of the sequence that can be transformed. • The results show that the radix-4 FFT is best suited for an encrypted domain implementation. With computational complexity and error analysis
  • 18. 6.Traditional approach of signal Encryption • Most of technological solutions proposed issues of multimedia security rely on the use of cryptography. • Early works in this direction by applying cryptographic primitives, is to build a secure layer on top of signal application. • secure layer is able to protect them from leakage of critical information Signal processing modules. • Examples of such an approach include the encryption of content before its transmission or storage (like encrypted digital TV channels), or wrapping multimedia objects into an encrypted system with an application (the reader) • encryption layer is used only to protect the data against third parties and authorized to access the data. • signal processing tools capable of operating directly on encrypted data highlighting the benefits offered by the availability
  • 19. 7.Public key cryptography for signal encryption
  • 20. Homomorphism for encrypted domain • • Homomorphic encryption is a concept where specific computations can be performed on the cipher text of a message. The result of these computations is the same as if the operations were performed on the plaintext first and encrypted afterwards. So homomorphic encryption allows parties who do not have an decryption key and thus don't know the plaintext value, still perform computation on this value The two group homomorphism operations are the arithmetic addition and multiplication. • A homomorphic encryption is additive is E(x + y) = E(x) . E(y) 1) where E denotes an encryption function, 2) . denotes an operation depending on cipher 3) x and y are plaintext messages. • A homomorphic encryption is multiplicative if: E(x y) = E(x) . E(y)
  • 21. Homomorphism signal encryption Signal encryption Homomorphism encryption
  • 22. simple example of how a homomorphic encryption scheme might work in cloud computing: • Company X has a very important data set (VIDS) that consists of the numbers 5 and 10. To encrypt the data set, Company X multiplies each element in the set by 2, creating a new set whose members are 10 and 20. • Company X sends the encrypted VIDS set to the cloud for safe storage. A few months later, the government contacts Company X and requests the sum of VIDS elements. • Company X is very busy, so it asks the cloud provider to perform the operation. The cloud provider, who only has access to the encrypted data set, finds the sum of 10 + 20 and returns the answer 30. • Company X decrypts the cloud provider’s reply and provides the government with the decrypted answer, 15.
  • 23. Encrypted domain DFT (e-DFT)  Consider the DFT sequence x(n) is defined as : N 1 X k xn e j2 k n N for k 0, 1,  , N 1 n 0 N 1 X k xnW nk for k 0, 1,, N 1 n 0   w and x(n) is a finite duration sequences with length M Consider the scenario the where electronic processor fed the input data signal as encrypted data format as in digital form such as 0’s and 1’s
  • 24. Encrypted domain DFT (e-DFT)  Encrypted input data signal in the form of digital 0’s and 1’s in the form of equation  E(X)=(E[x(0)],E[x(1)],…..E[x(N-1)] in order to make possible linear computation for encrypted input signal use homographic technique of Additive that is represented by E(x + y) = E(x) . E(y)
  • 25. Encrypted domain DFT (e-DFT) • Issues of DFT in SPED is • both input sample of encrypted signal and DFT coefficients need to represented as integer values • Paillier homographic cryptosystem uses modular operation • Uses of FFT-Radix 4 reduces the time complexity in SPED and best suited for encryption