This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.
In this chapter, an introduction to Encryption and Decryption, a type of cryptography is firstly presented. This chapter also briefly discusses the analysis of Encryption and Decryption and the computer based measurement system.The problem definition and the thesis objectives are also highlighted.Finally, the chapter end with the chapter organization.
Encryption and Decryption, a type of cryptography, refers to the process of scrambling information so that the observer cannot be detect the data.
In mathematics, computer science, and related subjects, an 'algorithm' is an effective method for solving a problem expressed as a finite sequence of instructions. Algorithms are used for calculation, data processing, and many other fields. Each algorithm is a list of well-defined instructions for completing a task. Starting from an initial state, the instructions describe a computation that proceeds through a well-defined series of successive states, eventually terminating in a final ending state. The transition from one state to the next is not necessarily
deterministic. Some algorithms, known as randomized algorithms, incorporate randomness.
The proposed projects is to create the algorithms where it is use to convert of information, rearranging the original massage produce output referred as ciphertext.
Similarly a cryptographic key is a piece of data used to encrypt or decrypt to plaintext. The Crypto,from the word cryptographic mean is it has its origins in the Greek word KRUOTOS, which means hidden. Thus the objective of cryptography is to hide information so that only the intended recipient can read it.
Figure 1.1 is example of the Simple block diagram for Encryption and Decryption and also show about the Lucifer algorithm invented, encryption and decryption uses a single 64-bit key consisting 56 bit of data and 8 bits of parity-and operates on data in 64-bit  .
64 bit output
56 bit data + 8 bit parity
Encryption and Decryption
56 bit key
Figure 1.1: Simple block diagram for Encryption and Decryption
1.2 Problem Statement
At present there are many encryption and decryption, especially in the communication system provided in a variety of application.
Encryption and decryption is particularly impacted in the field of military communications and reliable security data to protection for transmitting.
This ciphertext is used in the military is to send information such as direction, strategy, secret codes and other information that can not be know by the national foe during the war.
Creating this system is the process by which information can not be detect by the national foe. The information can not be recognizing by the national foe because this system is using encryption data and decryption data. 
This project are to create a system that can protect electronic data (secret information) which Consist of encryption and decryption process and to fully design an encryption and decryption algorithm using VHDL. The objectives of this project are
To understand how the Encryption and Decryption process.
To fully design an Encryption algorithm and Decryption algorithm using VHDL.
To make use Quartus II software as a design and synthesis tool.
1.4 Chapter Organization
Chapter 1: This chapter starts with an Introduction which highlights the problems under investigation by describing the status of problem conceptually and theoretically. It contains the introduction of the thesis, problem statement and scope of study, objective of the project, project expectations and the chapter organization.
Chapter 2: This chapter is a Literature Review that compiles the studies done by others based on the title of the project. Under the literature review, this chapter discussed on the features need to be include in designing the system.
Chapter 3:. The methodology chapter describes the steps that has been taken while doing the project from the beginning until the end. The main content of the chapter are the flow charts and the description of each step of the process.
Chapter 4: This chapter presents the result of the algorithm and discussion observed. The results obtained are presented as a series of figures, tables, with textual description and discussion. The analysis outcome of the research is also discussed in relation to the evidences obtained from project work and theories reported in Literature Review .
Chapter 5: The chapter is the Conclusion of the thesis and which signalized the whole project a done
Target key in this chapter is to introduce the host range of background information and research done be me, most methods have been widely used than the-experts and researchers to determine how the process of encryption and decryption using verilog, C++ and cadence. Theoretical method is presented using the VHDL.
Literature review is part of the thesis is presented in this chapter. The parts covered are show as below:
Advantages Public-Key Cryptography
Disadvantages of Public-Key Cryptography
Operations of Encryption and Decryption
Data Encryption Standard Algorithm
VHDL (VHSIC Hardware Description Language)
2.1. Symmetric cryptography
The symmetric key scheme is the conventional method of cryptography. The scheme uses the similar key to encode and decode in order information. The encoding method of a sequence of actions on the data using the key, the decoding method uses the same key to make the opposite each other actions on the encoded message. To decode the encoded message exclusive of the key is hypothetical to be practically infeasible. If the message encoded in this method is transmitted via commonplace non-secure channel, together a part of receiver and sender must have the similar key, so that it becomes essential to employ an extra secure channel to send out the key. The system becomes easily broken and managerial complications happen.
The one-time pad technique also belongs to the group of symmetric key algorithms. It consists in bit wise adding of the source message to a random stream of bits - the key. The distance end to end of the key must be equivalent to
the distance end to end of the source information and each fraction of the key be supposed to be used only once, otherwise the text strength be without difficulty subjected to an unauthorized decoding. If the on top of requirements are fulfilled, this algorithm is the only way which is hypothetically impenetrable to cryptanalysis, even if the opponent has unlimited computational authority. Furthermore, the one-time pad way is now practically out of use for the reason that of the managerial complications associated to generation, distribution and storage of super long keys
Conventional cryptography is based on the part of the receiver and sender of information knowing and using the similar secret key: the sender use the secret key to encrypt the data, and the receiver uses the similar secret key to decrypt the data. This way is known as secret-key. The major problem is in receipt of the receiver and sender to agree on the secret key devoid of anyone else finding out. If they are in distinct physical locations, they must believe a courier and some other transmission medium to prevent the expose of the secret key being communicated. Anybody who overhears the key in transit can later read, modify, and falsify all messages encrypted. 
Advantages of Public-Key Cryptography
The main profit of public key cryptography is increased security and convenience private keys need not be transmitted or revealed to anyone.In secret-key system, otherwise, the secret button to be sent (either manually or through the channels of communication), and maybe there is a possibility that an adversary can find the secret key for their delivery
Other major profit from the public key is that they can provide a method for digital signatures. Authentication via secret-key system requires a shared secret and sometimes requires trust of a third party can. As a result, the sender can reject previous message confirmed by claiming that the secret together, somehow compromised by one of the shared secret
For example, Kerberos authentication system[6.5] involves a button-secret data center that stores copies of all user secret key, an attack on the database will enable the falsification of the area. Public key authentication, on the other hand, the prevention of rejection, each user has a responsibility to protect its private key. 
2.3 Disadvantages of Public-Key Cryptography
A disadvantage of use of public key cryptography for encryption is speed: there is a secret key encryption methods are popular in significantly faster than existing methods of encryption that is currently public key
However, public key cryptography can be used with secret-key cryptography to get the best of both worlds. For encryption, the best solution is to combine public and secret key systems, to gain better security of public-key system and gain speed system secret key.
Public key system can be used to encrypt a secret key used to encrypt files public key cryptography may be vulnerable to the impersonation; however, even if the user's private key 'is not available. A successful attack on the certification will allow the enemy to an enemy who chooses to imitate, using the public key certificate of the compromised key to bind the enemy to choose another username
In some situations, public key cryptography is not necessary and secret-key cryptography enough. These include the environment in which the secret agreement, the button can occur, for example, the user conference in private. This also includes the environment in which a single authority knows and manages all the keys, for example, private banking system.
Since the power to know all the keys are no more profits for some to become "public" and other "private." In addition, public key cryptography is usually not required in single-user environment. For example, if you want to save your personal files encrypted, you can do with the secret-key encryption algorithm used, for example, your personal password as the secret key. In general, public key cryptography is suitable for multi-user environment is open.
Public key cryptography is not intended to replace the secret key cryptography, but to complement it, to make it more secure. The first use of public key techniques is to change the key in a specified secret-key system is still one of its primary functions. Secret-key cryptography and is still very important subject of extensive ongoing research and study. A number of secret-key algorithm debated in parts of the block cipher and stream cipher
Encryption is a form of cryptography that "scrambles" plaintext into unintelligible ciphertext. Encryption is the base of such security measures as digital signatures, digital certificates, and the Public Key Infrastructure that uses these technologies to make computer operation more protected. Computer-based encryption way use keys to encrypt and decrypt message. A key is a variable (sometimes represented as a password)that is a large binary number the larger, the better. Key length is measured in bits and the more bits in a key, the more difficult the key will be to "crack".
The key is only one component in the encryption process. It must be used in conjunction with an encryption algorithm to produce the ciphertext .Encryption methods are usually categorized as either symmetric, depending on the number of key that are used.
Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.The most widely used type of encryption is symmetric encryption, which is aptly named because it uses one key for both the encryption and decryption processes. Encryption is also commonly referred to as secret key encryption and shared secret. .
2.6 Operations of Encryption and Decryption
An encryption scheme consists of three algorithms:
A key generation algorithm. For a symmetric key, this is often an algorithm that simply picks a random key of a certain length and people often forget to mention it when talking about symmetric encryption schemes. Asymmetric key generation algorithms are typically more mathematical and produce more complicated keys.
An encryption algorithm. This takes as input a message (or plaintext) and some kind of key, and outputs a ciphertext.
A decryption algorithm. This takes as input a ciphertext and some kind of key, and outputs a message
The operations of encryption start with a message that has to be sent securely. This could be text, numeric Data or Secret Codes
2.3 Data Encryption and Decryption Standard Algorithm
This system works by encrypting groups of 64 message bits, which is the same as 16 hexadecimal numbers. To do the encryption, this system uses "keys" where are also apparently 16 hexadecimal numbers long, or apparently 64 bits long. However, every 8th key bit is ignored in the this algorithm, so that the effective key size is 56 bits. But, in any case, 64 bits (16 hexadecimal digits) is the round number upon which Encryption and Decryption is organized.
For example, if we take the plaintext message is "2872762F771B15E8", and encrypt it with the key "1234567890987654", the ciphertext produced "0000000000000000". If the ciphertext is decrypted with the same secret key "1234567890987654", the result is the original plaintext "2872762F771B15E8".
2.4 VHDL (VHSIC Hardware Description Language)
In order to complete the design, the VHDL is one of the most important tools used. Device description language VHDL is a great acronym stands for the very high speed integrated circuit Hardware Description language. It was originally developed on the
orders of the Department of Defense. They need a more efficient way to document the behavior of the ASIC design service companies were present.[ represented 11,12]
It was developed as an alternative, the manual is a complex of norms. The idea to simulate such evidence would be an interesting prospect and logic simulator developed can download the VHDL description as entered. From here the synthesis of the hardware level to focus the study. Currently, the country-art synthesis tools can create the device's hard for a large subset of VHDL language and synthesized at least be supporting a subset of the IEEE1076.6-1999. Syntax of VHDL is derived from there, the building is added to address emerging paralelisme in hardware design. The language is strongly typed and case insensitive[13,14]
Worst version that is served in the IEEE 1076-1987 standard is limited and the new version appeared in 1993 in the IEEE, the standard language from 1079 to 1993 the increase consistency. There are various standards of review and update the language since, but the 1993 version is the most prominent and widely used. Both language versions of neglecting the needs of multi-value logic that comes standard IEEE 1164.
This standard defines the type of logic called respectable ninth-std logic. It has become a standard for the type used for multi-logic vote in the VHDL description. This language has been extended in a series of libraries. One of these libraries are libraries that
implement the numerical std signed and unsigned type. Type of geometry allows for the size of arbitrary logic vector. 
 Laura E.Hunter,Brian Barber,Melissa Craft,Norris L.Johnson Jr,Jeffery A
Martin,Tony Piltzecker. MCSE. Implementing PKI in a Window Server 2003 Network.Chapter 4.Page 185
 Mohan Krishnamurthy, Eric S.Seagren, Raven Alder, Aaron W.Bayles, Josh
Burke, Skip Carter Eli Faskha How to Cheat at Securing Linux.page:250
 Dr.Everett F.Carter jr,Jeremy Faircloth,Curtis Franklin jr,Larry Loeb,
Hack Proofing XML Page:193
 The Point Of Encryption By Dr.Colin Walter,Available at
 Aram Khalili, Department of Computer Science, University of Maryland.
Available at http://www.cs.umd.edu/~waa/414-F01/symmetric.pdf
 D. Richard Kuhn ,Vincent C. Hu ,W. Timothy Polk, Shu-Jen Chang ,National
Institute of Standards and Technology Introduction to Public Key
Technology and the Federal PKI Infrastructure
[6.5] Contributed by LE Webmaster Kerberos Authentication System
Available at http://www.linuxexposed.com/index2.php?
. Advantaged of Public-Key Cryptography ,Available at
 Disadvantages of Public-Key Cryptography ,Available at
 Manuel Mogollon University Of Dallas USA.Cryptography and Security services.
 Mohan Krishnamurthy, Eric S.Seagren,Raven Alder, Aaron W.Bayles,Josh
Burke,Skip Carter Eli Faskha How To Cheat at Securing Linux .page:251
. Copyright Â© 1999 by John F. Wakerly`` Combinational Logic Design
Principles,The VHDL Hardware Design Language. Page :1-35.
 Deepak Jain . `` Object Oriented Programming Constructs' in VHSIC
Hardware Description Language``, Delhi Institute of Advanced Studies
 Institute of Electrical and Electronics Engineers, IEEE 1076-1987: IEEE Standard
VHDL Language Reference Manual, 1987
 Institute of Electrical and Electronics Engineers, IEEE Std 1076.6-1999: IEEE
Standard for VHDL Register Transfer Level (RTL) synthesis, 1999.
 Institute of Electrical and Electronics Engineers, IEEE 1076-1993: IEEE
Standard VHDL Language Reference Manual, 1993.
 E.P.M. van Diggele.`` Translation of SystemC to Synthesizable VHDL``, MSc
Thesis, Delft University of Technology.