Encryption and Decryption USing Butterfly Technique
Nowadays securing communications is a very vital thing. People are concerned about their privacies. We are working over a project that will make sure the communications are secure using the Butterfly technique which has never been implemented before. This will take place on a hardware embedded
2025-06-28 16:32:24 - Adil Khan
Encryption and Decryption USing Butterfly Technique
Project Area of Specialization Information & Communication TechnologyProject SummaryNowadays securing communications is a very vital thing. People are concerned about their privacies. We are working over a project that will make sure the communications are secure using the Butterfly technique which has never been implemented before. This will take place on a hardware embedded device that would work as transducers.Encryption and decryption will take place at both ends. The project will take voice or text as input and then the input after going through several processes, will be encrypted and then decrypted and moved to the reciever's end. There the reciever can see the text or voice output.
Project ObjectivesThe project objective is to make communications secure. The butterfly effect has never been implemented before and thus it would be the most strong encryption and decryption system.
Project Implementation Method
This is the System Diagram for our project. The project implementation is based upon hardware modules such as raspberrypi. There will be modules for audio input and output. The input might be made as voice or input. Then the voice will be converted into text using a hardware module. After this the implementation of Encryption will take place. The encryption will be implemented as a Modified Advanced Encryption Standard and Butterfly effect will be added to it. Then the cipher text will be generated and communication between devices will take place. Then the decryption phase will start and similarly with the Modified Advanced Encryption System and butterfly technique implemented on it. Then the original text will be available at the reciever's end. And if the reciever wants to know hear it as voice input, it would be converted into voice using the hardwarer module.
Benefits of the ProjectThe project is basically a research work, and it is based on providing security to communications using the butterfly technique. The major benefit of the project is that it will provide secure communications to the users and ensure their privacy protection that would be end to end encrypted.
Technical Details of Final DeliverableOur final deliverable will be 2 pi and 2 re speaker mic/head where 2 microphones and audio jacks are present.
Both side communication will take place.
Hardware devices that will be communicating with each other requiring wifi connection, power availability.
Final Deliverable of the Project HW/SW integrated systemCore Industry ITOther Industries Security Core Technology OthersOther Technologies Internet of Things (IoT)Sustainable Development Goals Industry, Innovation and InfrastructureRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 26400 | |||
| Raspberry pi 4 | Equipment | 2 | 10200 | 20400 |
| RE Speaker pi hat | Equipment | 2 | 3000 | 6000 |