Hardware-Based Encryption Using AES-256 for Enhanced Information Security

Join USTA Cyber as we demonstrate a project on hardware-dependent encryption, showcasing how AES-256 can be implemented for robust information security.

Hardware-Based Encryption Using AES-256 for Enhanced Information Security
USTA Cyber
549 views โ€ข Aug 30, 2022
Hardware-Based Encryption Using AES-256 for Enhanced Information Security

About this video

Hey ,welcome to usta cyber YouTube channel, today we are going to demonstrate a project named as "Hardware dependent Encryption" ,this is an amazing idea in information security, we will discuss each and every thing in our todays discussion.
these are the contents of over todays discussion about the project, including introduction about the project idea, description ,working ,features and complete demonstration of the project..
introduction:โ€œHardware Dependent Encryption โ€ is an Encryption software that depends on a hardware dongal.The software performs operation when and only authenticated hardware device is connected with the system. Software and authorized user is one of our major concerns that allows only authorized user ,to use this secure encryption software, after passing through two factor multilayer authentication. The hardware device also have some intrusion mechanism that restrict unauthorized usage of application and hardware device. Advance Encryption technique is applied in this project.
Todayโ€™s many file encryption software are in market like VeraCrypt, android crypt etc., but none of the software is protect itself. I`m proposing an idea to design an encryption software that depends on hardware in order to protect software from un authorized user and storing encryption key separate from the software. In this proposal both Hardware dongle and encryption software depends on each other, hardware device is also protected using 2FA and intrusion free. Software and authorized user is one of our major concerns that allows only authorized user to use this secure encryption software, after passing through two factor multilayer authentication. The hardware device also have some intrusion mechanism that restrict unauthorized usage of application and hardware device. Advance Encryption technique is applied in this project. Design & Development of an encryption software developed in high level programming language (Java/C#/Python) that depend on a hardware.
you can see in the block diagram that ,there are two different portions a software portion where the encryption will perform, and a hardware side includes, authentication block, storage block and intrusion detection block.
on authentication side two factor authentication is applied , radio frequency identification RFID and password mechanism. the password and encryption key is stored in the hardware dongle separate from the software , secure key will be loaded after successful authentication of a hardware device.
lets discuss some hardware and software features of the project.
Hardware Features:
Programmable hardware dongle that is used to store encryption key
Software/Hardware Dependency
Software encrypt or decrypt data when hardware dongle is connected with PC and Software
Serial interfacing
2FA -Two factor Authentication
RFID/Biometric, Password
Hardware Intrusion detection mechanism using sensors
LDR, Limit Switches, Pressure switches etc
Software Features:
Graphical user Interface
Operate when Authenticated Device is connected
Load Encryption key from Hardware dongle
Encrypt Data files
Data Logs
Hardware Controlling
Encryption Technique
Advance Encryption Standard AES256 is applied in the project

lets see how this device will work,
firstly connect the hardware donggle via usb serial port and open the software interface
select the correct COM port and press connect button.
now the device is connected successfully, now enter the device password after device authentication , you have to scan your RFID. after successful authentication the , encryption controlling button will enable on the panel now you can able to use this software and encrypt and decrypt your personal files.
thanks for watching , don't forget to like and subscribe my YouTube channel

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

549

Likes

16

Duration

5:19

Published

Aug 30, 2022

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.