You are on page 1of 2

CHIPCraft …The CAREER Engineering

AES-128 Security Protocol for Automobile Remote Keyless System

ABSTRACT

The AES algorithm is a symmetric block cipher. Block cipher requires different
key to each different block. The data block size is fixed to be 128bits, while key length
can be 128, 192 or 256 bits. The AES is a round-based algorithm .The number of rounds
are 10, 12, or 14, when the key length is128, 192 or 256 bits respectively. Each round of
AES algorithm performs the three transformations addroundkey, sub bytes and shift
rows, except the final round, each round also performs mix columns.

The remote keyless system is widely used in automobile industry to lock or


unlock the automobile's door, trunk, and start the ignition. It comprises a handheld key
fob to be held by the driver and a set of radio transceiver devices located in the
automobile. Operation commands are represented by strings of wireless signal
transmitted between the key fob and the radio transceiver to realize various car
operations. Because the radio signal is transmitted in proximity of open area, the remote
keyless system has the possibility of exposing the key secret commands to a car thief.
The operation commands, which are denoted by plaintexts or even cipher texts, cannot
overcome this security problem. This paper proposes a new approach in which encryption
of the operation commands is realized by a model of AES algorithm computed with a
fixed key and a variable key. In the newly designed AES security protocol, the key fob
and radio device will be engaged in the protocol interrogation after the key fob initiates a
connection. The fixed key can be defined by car manufacturer or car dealer, and it is used
for the encryption of handshake message and a pseudo random number (PRN). This PRN
is proposed by the key fob, and will serve as the variable key.

Advantages of AES include, it’s a block cipher so plenty of data can be


transmitted with different keys. Due to its complexity it is difficult to break the key.
Computation speed of different operations will be more. The hardware implementations
reduce the encryption/decryption of data. The software implementation reduces the cost.

--------------------------------------------------------
Somarouthu Technologies, #304, Mehtab Arcade, Tarnaka X roads, Secunderabad-17
9849 753275, 98490 55866, 98493 55866, 040-27015320. chipcraftemb@gmail.com
CHIPCraft …The CAREER Engineering
Block Diagram

Embedded EDA Tools:


Micro-Vision IDE, Real view C Cross Compiler, Real Time Library for ARM,
software Hardware simulators, HEX converter.

Languages:
Embedded C for 89S52 Microcontroller.

Hardware Modules:
89S52 Micro controller, LCD, sensors and I2CADC.

Applications:
1. Provides security for images sent through wireless technology.
2. Security for Wireless sensor data.
3. Widely used in modern consumer electronic products for security.

--------------------------------------------------------
Somarouthu Technologies, #304, Mehtab Arcade, Tarnaka X roads, Secunderabad-17
9849 753275, 98490 55866, 98493 55866, 040-27015320. chipcraftemb@gmail.com

You might also like