SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55
www.ijera.com 52 | P a g e
VLSI Implementation of Encryption and Decryption System
Using Hamming Code Algorithm
Fazal Noorbasha*, Harikishore Kakarla, Sri Ramya R, G Venkata Maruthi
Manoj, Siva Prakash U and Varalakshmi G
VLSI Systems Research Group, Department of ECE, KL University, Vaddeswaram, Guntur (District), AP, India
PIN 522 502
ABSTRACT
In this paper, we propose an optimized VLSI implementation of encryption and decryption system using
hamming code algorithm. In the present field of communication has got many applications, and in every field
the data is encoded at the transmitter and transfer on a communication channel and receive at the receiver after
data is decoded. During the broadcast of data it might get degraded because of some noise on the channel. So it
is crucial for the receiver to have some function which can recognize and correct the error in the received data.
Hamming code is one of such forward error correcting code which has got many applications. In this paper the
algorithm for hamming code is discussed and then implementation of it in verilog is done to get the results.
Hamming code is an upgrading over parity check method. Here a code is implemented in verilog in which 4-bit
of information data is transmitted with 3-redundancy bits. In order to do that the proposed method uses a Field
Programmable Gate Array (FPGA). It is known that FPGA provides quick implementation and fast hardware
verification. It gives facilities of reconfiguring the design construct unlimited number of times. The HDL code is
written in verilog, Gate Level Circuit and Layout is implemented in CMOS technology.
Keywords - Hamming Code, FPGA, CMOS, Encryption, Decryption
I. INTRODUCTION
When digital data is transmitted or stored in
nonvolatile memory, it is crucial to have a
mechanism that can detect and correct a certain
number of errors. Error correction code (ECC)
encodes data in such a way that a decoder can
identify and correct errors in the data. Typically, data
strings are encoded by adding a number of redundant
bits to them. When the original data is reconstructed,
a decoder examines the encoded message to check
for any errors [1].
There are two basic types of ECC:
A. Block codes
These codes are referred to as “n” and “k”
codes. A block of k data bits is encoded to become a
block of n bits called a code word. In block codes,
code words do not have any dependency on
previously encoded messages. NAND Flash memory
devices typically use block codes.
B. Convolution codes
These codes produce code words that depend on both
the data message and a given number of previously
encoded messages. The encoder changes state with
every message processed. Typically, the length of the
code word is constant.
II. HAMMING CODE DATA ENCRYPTION
AND DECRYPTION SYSTEM
Hamming codes are the most widely used
linear block codes. Typically, a Hamming code is
defined as (2n - 1, 2n - n - 1), where:
• n is equal to the number of overhead bits.
• 2n - 1 is equal to the block size.
• 2n - n - 1 is equal to the number of data bits in the
block.
All Hamming codes can detect three errors
and one correct one. Common hamming code sizes
are (7, 4), (15, 11), and (31, 26). All have the same
hamming distance. The hamming distance and the
hamming weight are useful in encoding. When the
hamming distance is known, the capability of a code
to detect and correct errors can be determined [2].
In this paper to implement the hamming
code data encryption and decryption system, we have
used a Verilog HDL code for FPGA. Also we have
designed the gate level circuit and implemented
CMOS layout in three different nanometer
technologies. We explained all the steps involved in
this system implementation with results. Fig. 1 shows
the block diagram of hamming code data encryption
and decryption system.
RESEARCH ARTICLE OPEN ACCESS
Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55
www.ijera.com 53 | P a g e
Fig.1 Block Diagram of Hamming Code Data
Encryption and Decryption System
III. IMPLEMENTATION
The Hamming code can be used for data
words of any length. In general, for k check bits and n
data bits, the total number of bits, n + k, that can be in
a coded word is at most 2k
-1. In other words, the
relationship n +k ≤ 2k
– 1must hold. This relationship
gives n ≤ 2k
– 1 –k as the number of bits for the data
word [3].
In the (7, 4) extended Hamming code, the
equations can be pre-computed as:
Data In Word Bits 4-bit (DI):
DI = D1 D2 D3 D4 (1)
Code Data Bits 3-bit (C):
C1 = D1⊕ D2⊕ D4 (2)
C2 = D1⊕ D3⊕ D4 (3)
C3 = D2⊕ D3⊕ D4 (4)
Hamming Code Data 7-bit (HC): {HC = HC7 HC6
HC5 HC4 HC3 HC2 HC1}
HC = C1 C2 D1 C3 D2 D3 D4 (5)
Check Data 3-bit (A):
A1 = C1⊕ D1⊕ D2⊕ D4 (6)
A2 = C2⊕ D1⊕ D3⊕ D4 (7)
A3 = C3⊕ D2⊕ D3⊕ D4 (8)
In the data transmission side, this system
allows only a 4-bit input data by using this input data
a 3-bit Code data bits will be generated and it will
added with 4-bit input data, lastly 7-bit hamming
coded data will come out. This is shown in the
equations from 1 to 5.
TABLE 1
ERROR DETECTION AND CORRECTION OF HAMMING
CODE DATA USING CHECK DATA BITS
Check
Data
Hamming Code Error Bit Logic
Value Toggling
A3A2A1 Data Bit Received
Data
Corrected
Data
000 No Error 0 0
1 1
001 HC1 0 1
1 0
010 HC2 0 1
1 0
011 HC3 0 1
1 0
100 HC4 0 1
1 0
101 HC5 0 1
1 0
110 HC6 0 1
1 0
111 HC7 0 1
1 0
In the receiving face, a 3-bit check data (A)
will be generated by using the receiving 7-bit
hamming code data. If A = “000” received data is
correct and system will decoded original transmitted
4-bit word data from the received 7-bit hamming
code bits. This is shown in the equations from 6 to 8.
If there is only one bit error in the received 7-bit
hamming code „A‟ will show some value with
respect to this value, appropriate one hamming code
data bit logic will toggle (0 to 1 or 1 to 0). Error
detection and correction of hamming code data using
error detection data bits shown in the TABLE 1. From
this corrected 7-bit hamming code data, system will
generate original transmitted 4-bit data.
A. Verilog HDL for FPGA
We have used verilog HDL as developing
tool for the FPGA for the proposed design. The
hamming code top-level system has two models,
transmitting (hamingtx) and receiving (hamingrx)
sections. Fig. 2 shows the FPGA RTL schematic
view of hamming code data encryption and
decryption system. The input information data size
for the hamingtx is 4-bit; the output of this hamingtx
is encoded 7–bit hamming coded data. The output of
hamingtx is input for the hamingrx section, it will
decode the main 4-bit input data from the 7-bit
hamming code data. Even if there is any one bit error
it will give the corrected data. Device utilization
report is shown in TABLE 2 and data in pad to
hamming code pad delay is shown in TABLE 3.
TABLE 2
DEVICE UTILIZATION TABLE
Hamming Code Encoding System
Sl. No. Name Number
1 Slices 3
2 LUTs 3
3 IOs 15
Hamming Code Decoding System
Sl. No. Name Number
1 Slices 15
2 LUTs 32
3 IOs 37
Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55
www.ijera.com 54 | P a g e
Fig.2 FPGA RTL Schematic View of Hamming Code
Data Encryption and Decryption System
B. CMOS Layout Design
For more than 40 years, CMOS device
technologies have been improving at a dramatic rate.
A large part of the success of the MOSFET is due to
the fact that it can be scaled to increasingly smaller
dimensions, which results in higher performance. In
the past 40 years, the MOSFET gate length has
scaled from 10 m to 45 nm. The ability to
consistently improve performance while decreasing
power consumption has made CMOS architecture the
dominant technology for integrated circuits [4].
We have implemented the layout of
hamming code data encryption and decryption
system in 90nm, 70nm and 50nm technologies. The
CMOS layout is shown in fig. 3. The comparison of
number of metals, operation voltage, layout width,
layout height and total layout surface with nanometer
technology is shown in the table 4. In this system
implementation 262 PMOS and 226 NMOS
transistors are utilized.
TABLE 3
PAD TO PAD DELAYS OF DATA IN TO HAMMING
CODE SWAP
Fig.3 CMOS Layout of Hamming Code Data
Encryption and Decryption System
TABLE IV
CMOS LAYOUT COMPARISON IN 90NM, 70NM AND
50NM TECHNOLOGY
Nanometer
Size
Number
of
Metals
Operation
Voltage
Total
Layout
Surface
90nm 6 1 V 6764.5µm2
70nm 6 0.7 V 6277.8µm2
50nm 7 0.5 V 3203.0µm2
IV. SIMULATION RESULT
After successful implementation of FPGA
and CMOS layouts of the hamming code data
encryption and decryption system, we had tested all
the possible inputs and outputs. We got the accurate
results and even one bit error is present in the
received data this system is recovered the original
data from the error data. If the error bits are more
than one this system shows only error is available in
the received data but not recover the original data.
All the possible input condition test results of data
encryption and data decryption are shown in the fig.
4 and fig. 5.
Sl.
No.
Data In Pad
(Tx)
Hamming
Code Pad
Delay (ns)
1 DI<1> HC<1> 5.643
2 DI<1> HC<4> 6.271
3 DI<1> HC<6> 6.179
4 DI<2> HC<2> 5.551
5 DI<2> HC<4> 6.649
6 DI<2> HC<7> 6.165
7 DI<3> HC<3> 5.604
8 DI<3> HC<4> 6.409
9 DI<3> HC<6> 6.320
10 DI<3> HC<7> 6.170
11 DI<4> HC<5> 5.611
12 DI<4> HC<6> 6.196
13 DI<4> HC<7> 6.315
Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55
www.ijera.com 55 | P a g e
Fig.4 Simulation timing diagram of hamming code data encryption system
Fig.5 Simulation timing diagram of hamming code data decryption system
V. CONCLUSION
We have implemented the FPGA for
hamming code data encryption and decryption
system and layout in a typical 90 nm, 70nm and
50nm CMOS process. We have simulated and tested
the system and got an excellent performance at
50GHz. We have found that, reliability
considerations aside, at a voltage of 1 V, 0.7V, and
0.5 V this device offer the best performance. On the
other hand, when consideration is given to device
layout surface, the 90 nm device is 6764.5 µm2,
70nm device is 6277.8 µm2 and 50nm device is
3203.0 µm2.
REFERENCES
[1] Z. Al-Ars and A. J. van de Goor, “Soft faults
and importance of stresses in memory
testing,” Design, Automation and Test in
Europe Conference and Exhibition, pp.
1084–1089, Feb. 2004.
[2] R. W. Hamming, “Error detecting and error
correcting code,” Bell System Technical
Journal, vol. 26, pp. 147–160, Apr.1950.
[3] P. K. Lala, P. Thenappan, and M. T. Anwar,
“Single error correcting and double error
detecting coding scheme,” IET Electronics
Letters, vol. 41, Issue 13, pp. 758–760, Feb.
2005.
[4] Rick Ma and Samuel Cheng “The
Universality of Generalized Hamming Code
for Multiple Sources”, IEEE Transactions on
Communications, VOL. 59, NO. 10, PP.
2641- 2647, OCTOBER 2011

Contenu connexe

Tendances

Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder IJECEIAES
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decodereSAT Publishing House
 
Implementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay CodeImplementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay CodeIRJET Journal
 
AN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERAN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERIJCSEA Journal
 
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...IJECEIAES
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...ijitjournal
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...Journal For Research
 
New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers IJECEIAES
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcsatriyo aris
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)welcometofacebook
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,paperpublications3
 
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodePerformance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodeIJERA Editor
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...IJCSEA Journal
 

Tendances (20)

Design and implementation of log domain decoder
Design and implementation of log domain decoder Design and implementation of log domain decoder
Design and implementation of log domain decoder
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
 
E42032732
E42032732E42032732
E42032732
 
Implementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay CodeImplementation of Designed Encoder and Decoder for Golay Code
Implementation of Designed Encoder and Decoder for Golay Code
 
AN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODERAN EFFICIENT VITERBI DECODER
AN EFFICIENT VITERBI DECODER
 
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
VHDL Design and FPGA Implementation of a High Data Rate Turbo Decoder based o...
 
Network Coding
Network CodingNetwork Coding
Network Coding
 
Li3519411946
Li3519411946Li3519411946
Li3519411946
 
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
Hardware implementation of (63, 51) bch encoder and decoder for wban using lf...
 
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
PERFORMANCE ESTIMATION OF LDPC CODE SUING SUM PRODUCT ALGORITHM AND BIT FLIPP...
 
New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers New primitives of controlled elements F 2/4 for block ciphers
New primitives of controlled elements F 2/4 for block ciphers
 
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dcFa2c4eb1e3582a1a36255a82b258cb03a7dc
Fa2c4eb1e3582a1a36255a82b258cb03a7dc
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)
 
1570285065
15702850651570285065
1570285065
 
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
Design and Implementation of Area Efficiency AES Algoritham with FPGA and ASIC,
 
Y25124127
Y25124127Y25124127
Y25124127
 
T04504121126
T04504121126T04504121126
T04504121126
 
20120140505006
2012014050500620120140505006
20120140505006
 
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic CodePerformance Comparision of Coded and Un-Coded OFDM for Different Fic Code
Performance Comparision of Coded and Un-Coded OFDM for Different Fic Code
 
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
NON-STATISTICAL EUCLIDEAN-DISTANCE SISO DECODING OF ERROR-CORRECTING CODES OV...
 

En vedette

An Experimental Investigation of Partial Replacement of Cement by Various Per...
An Experimental Investigation of Partial Replacement of Cement by Various Per...An Experimental Investigation of Partial Replacement of Cement by Various Per...
An Experimental Investigation of Partial Replacement of Cement by Various Per...IJERA Editor
 
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr AlgorithmAn Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr AlgorithmIJERA Editor
 
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space ApproachReliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space ApproachIJERA Editor
 
An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...
An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...
An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...IJERA Editor
 
Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...
Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...
Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...IJERA Editor
 
20110106 viñetas
20110106 viñetas20110106 viñetas
20110106 viñetasfjbarcenas
 
Tita, a-coelhinha-diferente
Tita, a-coelhinha-diferenteTita, a-coelhinha-diferente
Tita, a-coelhinha-diferentelabeques
 
Programação dia 15 16 de outubro
Programação dia 15 16 de outubroProgramação dia 15 16 de outubro
Programação dia 15 16 de outubrotvcabosbs
 
Nieve en UNLu
Nieve en UNLuNieve en UNLu
Nieve en UNLuadmoro
 
Tendencias en Redes Sociales
Tendencias en Redes SocialesTendencias en Redes Sociales
Tendencias en Redes SocialesPaloma Baytelman
 

En vedette (20)

An Experimental Investigation of Partial Replacement of Cement by Various Per...
An Experimental Investigation of Partial Replacement of Cement by Various Per...An Experimental Investigation of Partial Replacement of Cement by Various Per...
An Experimental Investigation of Partial Replacement of Cement by Various Per...
 
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr AlgorithmAn Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
An Energy-Efficient Lut-Log-Bcjr Architecture Using Constant Log Bcjr Algorithm
 
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space ApproachReliability Analysis of a 3-Machine Power Station Using State Space Approach
Reliability Analysis of a 3-Machine Power Station Using State Space Approach
 
An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...
An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...
An Experimental Investigation of Use of Phosphogypsum and Marble Powder for M...
 
Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...
Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...
Accuracy Assessment for Multi-Channel ECG Waveforms Using Soft Computing Meth...
 
B49010511
B49010511B49010511
B49010511
 
20110106 viñetas
20110106 viñetas20110106 viñetas
20110106 viñetas
 
Carta de un_cura
Carta de un_curaCarta de un_cura
Carta de un_cura
 
Pf correcao-2013
Pf correcao-2013Pf correcao-2013
Pf correcao-2013
 
Tendències de consum per al 2015
Tendències de consum per al 2015Tendències de consum per al 2015
Tendències de consum per al 2015
 
Beijing Gardening
Beijing GardeningBeijing Gardening
Beijing Gardening
 
Tita, a-coelhinha-diferente
Tita, a-coelhinha-diferenteTita, a-coelhinha-diferente
Tita, a-coelhinha-diferente
 
Astorga
AstorgaAstorga
Astorga
 
En el parque
En el parqueEn el parque
En el parque
 
Pecha-Kuchas y evaluación por rúbricas
Pecha-Kuchas y evaluación por rúbricasPecha-Kuchas y evaluación por rúbricas
Pecha-Kuchas y evaluación por rúbricas
 
Programação dia 15 16 de outubro
Programação dia 15 16 de outubroProgramação dia 15 16 de outubro
Programação dia 15 16 de outubro
 
Nieve en UNLu
Nieve en UNLuNieve en UNLu
Nieve en UNLu
 
Regulamento 2009
Regulamento 2009Regulamento 2009
Regulamento 2009
 
Precio gasolina
Precio gasolinaPrecio gasolina
Precio gasolina
 
Tendencias en Redes Sociales
Tendencias en Redes SocialesTendencias en Redes Sociales
Tendencias en Redes Sociales
 

Similaire à J0445255

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueIRJET Journal
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...IJERA Editor
 
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier SystemsFPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier SystemsIJMER
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPVLSICS Design
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embeddedlthanuja01
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...IOSR Journals
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniquesDhanashriNandre
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsIJMER
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...VIT-AP University
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
 
Design and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaDesign and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaIAEME Publication
 

Similaire à J0445255 (20)

FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting TechniqueLossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
Lossless Data Compression Using Rice Algorithm Based On Curve Fitting Technique
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
 
O41049497
O41049497O41049497
O41049497
 
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier SystemsFPGA Implementation of Efficient Viterbi Decoder for  Multi-Carrier Systems
FPGA Implementation of Efficient Viterbi Decoder for Multi-Carrier Systems
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIPPERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
PERFORMANCE EVALUATION OF CDMAROUTER FOR NETWORK - ON - CHIP
 
Presentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and EmbeddedPresentation for the Project on VLSI and Embedded
Presentation for the Project on VLSI and Embedded
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
 
Error control coding techniques
Error control coding techniquesError control coding techniques
Error control coding techniques
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
The Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless CommunicationsThe Reliability in Decoding of Turbo Codes for Wireless Communications
The Reliability in Decoding of Turbo Codes for Wireless Communications
 
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
Performance Evaluation & Design Methodologies for Automated 32 Bit CRC Checki...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
Hv3414491454
Hv3414491454Hv3414491454
Hv3414491454
 
Design and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpgaDesign and implementation of multi channel frame synchronization in fpga
Design and implementation of multi channel frame synchronization in fpga
 
Ijetcas14 378
Ijetcas14 378Ijetcas14 378
Ijetcas14 378
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

J0445255

  • 1. Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55 www.ijera.com 52 | P a g e VLSI Implementation of Encryption and Decryption System Using Hamming Code Algorithm Fazal Noorbasha*, Harikishore Kakarla, Sri Ramya R, G Venkata Maruthi Manoj, Siva Prakash U and Varalakshmi G VLSI Systems Research Group, Department of ECE, KL University, Vaddeswaram, Guntur (District), AP, India PIN 522 502 ABSTRACT In this paper, we propose an optimized VLSI implementation of encryption and decryption system using hamming code algorithm. In the present field of communication has got many applications, and in every field the data is encoded at the transmitter and transfer on a communication channel and receive at the receiver after data is decoded. During the broadcast of data it might get degraded because of some noise on the channel. So it is crucial for the receiver to have some function which can recognize and correct the error in the received data. Hamming code is one of such forward error correcting code which has got many applications. In this paper the algorithm for hamming code is discussed and then implementation of it in verilog is done to get the results. Hamming code is an upgrading over parity check method. Here a code is implemented in verilog in which 4-bit of information data is transmitted with 3-redundancy bits. In order to do that the proposed method uses a Field Programmable Gate Array (FPGA). It is known that FPGA provides quick implementation and fast hardware verification. It gives facilities of reconfiguring the design construct unlimited number of times. The HDL code is written in verilog, Gate Level Circuit and Layout is implemented in CMOS technology. Keywords - Hamming Code, FPGA, CMOS, Encryption, Decryption I. INTRODUCTION When digital data is transmitted or stored in nonvolatile memory, it is crucial to have a mechanism that can detect and correct a certain number of errors. Error correction code (ECC) encodes data in such a way that a decoder can identify and correct errors in the data. Typically, data strings are encoded by adding a number of redundant bits to them. When the original data is reconstructed, a decoder examines the encoded message to check for any errors [1]. There are two basic types of ECC: A. Block codes These codes are referred to as “n” and “k” codes. A block of k data bits is encoded to become a block of n bits called a code word. In block codes, code words do not have any dependency on previously encoded messages. NAND Flash memory devices typically use block codes. B. Convolution codes These codes produce code words that depend on both the data message and a given number of previously encoded messages. The encoder changes state with every message processed. Typically, the length of the code word is constant. II. HAMMING CODE DATA ENCRYPTION AND DECRYPTION SYSTEM Hamming codes are the most widely used linear block codes. Typically, a Hamming code is defined as (2n - 1, 2n - n - 1), where: • n is equal to the number of overhead bits. • 2n - 1 is equal to the block size. • 2n - n - 1 is equal to the number of data bits in the block. All Hamming codes can detect three errors and one correct one. Common hamming code sizes are (7, 4), (15, 11), and (31, 26). All have the same hamming distance. The hamming distance and the hamming weight are useful in encoding. When the hamming distance is known, the capability of a code to detect and correct errors can be determined [2]. In this paper to implement the hamming code data encryption and decryption system, we have used a Verilog HDL code for FPGA. Also we have designed the gate level circuit and implemented CMOS layout in three different nanometer technologies. We explained all the steps involved in this system implementation with results. Fig. 1 shows the block diagram of hamming code data encryption and decryption system. RESEARCH ARTICLE OPEN ACCESS
  • 2. Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55 www.ijera.com 53 | P a g e Fig.1 Block Diagram of Hamming Code Data Encryption and Decryption System III. IMPLEMENTATION The Hamming code can be used for data words of any length. In general, for k check bits and n data bits, the total number of bits, n + k, that can be in a coded word is at most 2k -1. In other words, the relationship n +k ≤ 2k – 1must hold. This relationship gives n ≤ 2k – 1 –k as the number of bits for the data word [3]. In the (7, 4) extended Hamming code, the equations can be pre-computed as: Data In Word Bits 4-bit (DI): DI = D1 D2 D3 D4 (1) Code Data Bits 3-bit (C): C1 = D1⊕ D2⊕ D4 (2) C2 = D1⊕ D3⊕ D4 (3) C3 = D2⊕ D3⊕ D4 (4) Hamming Code Data 7-bit (HC): {HC = HC7 HC6 HC5 HC4 HC3 HC2 HC1} HC = C1 C2 D1 C3 D2 D3 D4 (5) Check Data 3-bit (A): A1 = C1⊕ D1⊕ D2⊕ D4 (6) A2 = C2⊕ D1⊕ D3⊕ D4 (7) A3 = C3⊕ D2⊕ D3⊕ D4 (8) In the data transmission side, this system allows only a 4-bit input data by using this input data a 3-bit Code data bits will be generated and it will added with 4-bit input data, lastly 7-bit hamming coded data will come out. This is shown in the equations from 1 to 5. TABLE 1 ERROR DETECTION AND CORRECTION OF HAMMING CODE DATA USING CHECK DATA BITS Check Data Hamming Code Error Bit Logic Value Toggling A3A2A1 Data Bit Received Data Corrected Data 000 No Error 0 0 1 1 001 HC1 0 1 1 0 010 HC2 0 1 1 0 011 HC3 0 1 1 0 100 HC4 0 1 1 0 101 HC5 0 1 1 0 110 HC6 0 1 1 0 111 HC7 0 1 1 0 In the receiving face, a 3-bit check data (A) will be generated by using the receiving 7-bit hamming code data. If A = “000” received data is correct and system will decoded original transmitted 4-bit word data from the received 7-bit hamming code bits. This is shown in the equations from 6 to 8. If there is only one bit error in the received 7-bit hamming code „A‟ will show some value with respect to this value, appropriate one hamming code data bit logic will toggle (0 to 1 or 1 to 0). Error detection and correction of hamming code data using error detection data bits shown in the TABLE 1. From this corrected 7-bit hamming code data, system will generate original transmitted 4-bit data. A. Verilog HDL for FPGA We have used verilog HDL as developing tool for the FPGA for the proposed design. The hamming code top-level system has two models, transmitting (hamingtx) and receiving (hamingrx) sections. Fig. 2 shows the FPGA RTL schematic view of hamming code data encryption and decryption system. The input information data size for the hamingtx is 4-bit; the output of this hamingtx is encoded 7–bit hamming coded data. The output of hamingtx is input for the hamingrx section, it will decode the main 4-bit input data from the 7-bit hamming code data. Even if there is any one bit error it will give the corrected data. Device utilization report is shown in TABLE 2 and data in pad to hamming code pad delay is shown in TABLE 3. TABLE 2 DEVICE UTILIZATION TABLE Hamming Code Encoding System Sl. No. Name Number 1 Slices 3 2 LUTs 3 3 IOs 15 Hamming Code Decoding System Sl. No. Name Number 1 Slices 15 2 LUTs 32 3 IOs 37
  • 3. Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55 www.ijera.com 54 | P a g e Fig.2 FPGA RTL Schematic View of Hamming Code Data Encryption and Decryption System B. CMOS Layout Design For more than 40 years, CMOS device technologies have been improving at a dramatic rate. A large part of the success of the MOSFET is due to the fact that it can be scaled to increasingly smaller dimensions, which results in higher performance. In the past 40 years, the MOSFET gate length has scaled from 10 m to 45 nm. The ability to consistently improve performance while decreasing power consumption has made CMOS architecture the dominant technology for integrated circuits [4]. We have implemented the layout of hamming code data encryption and decryption system in 90nm, 70nm and 50nm technologies. The CMOS layout is shown in fig. 3. The comparison of number of metals, operation voltage, layout width, layout height and total layout surface with nanometer technology is shown in the table 4. In this system implementation 262 PMOS and 226 NMOS transistors are utilized. TABLE 3 PAD TO PAD DELAYS OF DATA IN TO HAMMING CODE SWAP Fig.3 CMOS Layout of Hamming Code Data Encryption and Decryption System TABLE IV CMOS LAYOUT COMPARISON IN 90NM, 70NM AND 50NM TECHNOLOGY Nanometer Size Number of Metals Operation Voltage Total Layout Surface 90nm 6 1 V 6764.5µm2 70nm 6 0.7 V 6277.8µm2 50nm 7 0.5 V 3203.0µm2 IV. SIMULATION RESULT After successful implementation of FPGA and CMOS layouts of the hamming code data encryption and decryption system, we had tested all the possible inputs and outputs. We got the accurate results and even one bit error is present in the received data this system is recovered the original data from the error data. If the error bits are more than one this system shows only error is available in the received data but not recover the original data. All the possible input condition test results of data encryption and data decryption are shown in the fig. 4 and fig. 5. Sl. No. Data In Pad (Tx) Hamming Code Pad Delay (ns) 1 DI<1> HC<1> 5.643 2 DI<1> HC<4> 6.271 3 DI<1> HC<6> 6.179 4 DI<2> HC<2> 5.551 5 DI<2> HC<4> 6.649 6 DI<2> HC<7> 6.165 7 DI<3> HC<3> 5.604 8 DI<3> HC<4> 6.409 9 DI<3> HC<6> 6.320 10 DI<3> HC<7> 6.170 11 DI<4> HC<5> 5.611 12 DI<4> HC<6> 6.196 13 DI<4> HC<7> 6.315
  • 4. Fazal Noorbasha et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 1), April 2014, pp.52-55 www.ijera.com 55 | P a g e Fig.4 Simulation timing diagram of hamming code data encryption system Fig.5 Simulation timing diagram of hamming code data decryption system V. CONCLUSION We have implemented the FPGA for hamming code data encryption and decryption system and layout in a typical 90 nm, 70nm and 50nm CMOS process. We have simulated and tested the system and got an excellent performance at 50GHz. We have found that, reliability considerations aside, at a voltage of 1 V, 0.7V, and 0.5 V this device offer the best performance. On the other hand, when consideration is given to device layout surface, the 90 nm device is 6764.5 µm2, 70nm device is 6277.8 µm2 and 50nm device is 3203.0 µm2. REFERENCES [1] Z. Al-Ars and A. J. van de Goor, “Soft faults and importance of stresses in memory testing,” Design, Automation and Test in Europe Conference and Exhibition, pp. 1084–1089, Feb. 2004. [2] R. W. Hamming, “Error detecting and error correcting code,” Bell System Technical Journal, vol. 26, pp. 147–160, Apr.1950. [3] P. K. Lala, P. Thenappan, and M. T. Anwar, “Single error correcting and double error detecting coding scheme,” IET Electronics Letters, vol. 41, Issue 13, pp. 758–760, Feb. 2005. [4] Rick Ma and Samuel Cheng “The Universality of Generalized Hamming Code for Multiple Sources”, IEEE Transactions on Communications, VOL. 59, NO. 10, PP. 2641- 2647, OCTOBER 2011