Encryption and Decryption USing Butterfly Technique

Nowadays securing communications is a very vital thing. People are concerned about their privacies. We are working over a project that will make sure the communications are secure using the Butterfly technique which has never been implemented before. This will take place on a hardware embedded

2025-06-28 16:32:24 - Adil Khan

Project Title

Encryption and Decryption USing Butterfly Technique

Project Area of Specialization Information & Communication TechnologyProject Summary

Nowadays securing communications is a very vital thing. People are concerned about their privacies. We are working over a project that will make sure the communications are secure using the Butterfly technique which has never been implemented before. This will take place on a hardware embedded device that would work as transducers.Encryption and decryption will take place at both ends. The project will take voice or text as input and then the input after going through several processes, will be encrypted and then decrypted and moved to the reciever's end. There the reciever can see the text or voice output.

Project Objectives

The project objective is to make communications secure. The butterfly effect has never been implemented before and thus it would be the most strong encryption and decryption system.

Project Implementation Method

Encryption and Decryption USing Butterfly Technique _1639951452.png

This is the System Diagram for our project. The project implementation is based upon hardware modules such as raspberrypi. There will be modules for audio input and output. The input might be made as voice or input. Then the voice will be converted into text using a hardware module. After this the implementation of Encryption will take place. The encryption will be implemented as a Modified Advanced Encryption Standard and Butterfly effect will be added to it. Then the cipher text will be generated and communication between devices will take place. Then the decryption phase will start and similarly with the Modified Advanced Encryption System and butterfly technique implemented on it. Then the original text will be available at the reciever's end. And if the reciever wants to know hear it as voice input, it would be converted into voice using the hardwarer module.

Benefits of the Project

The project is basically a research work, and it is based on providing security to communications using the butterfly technique. The major benefit of the project is that it will provide secure communications to the users and ensure their privacy protection that would be end to end encrypted.

Technical Details of Final Deliverable

Our final deliverable will be 2 pi and 2 re speaker mic/head where 2 microphones and audio jacks are present.

Both side communication will take place.

Hardware devices that will be communicating with each other requiring wifi connection, power availability.

Final Deliverable of the Project HW/SW integrated systemCore Industry ITOther Industries Security Core Technology OthersOther Technologies Internet of Things (IoT)Sustainable Development Goals Industry, Innovation and InfrastructureRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 26400
Raspberry pi 4 Equipment21020020400
RE Speaker pi hat Equipment230006000

More Posts