Security code enabled secure communication using RF technology

Thread Starter

ORGENES

Joined Feb 3, 2016
10
Hi Everyone?.
I have a project about secure communication between transmitter and receiver using RF modules enabled by security code. In my effort i try to identify components which are: Two micro controllers, RF modules(Transmitter and Receiver), RF encoder and Decoder, Antenna. So the problem to me is to know the selection of appropriate that components and to design a circuit diagram also coding micro controller to hide message.

Please help me, and additional knowledge about that project
 

Papabravo

Joined Feb 24, 2006
21,159
You might want to start with a definition of secure. For example:
  1. Secure from your neighbor down the street
  2. Secure from the local Police
  3. Secure from the government of Tanzania
  4. Secure from the NSA
Once you establish the requirement, it will drive your search for components. It always helps to have access to equipment and methods that are not widely available, but that is probably beyond the scope of your project.
 

Thread Starter

ORGENES

Joined Feb 3, 2016
10
Thanks, the scope of my project is secure from local police. Help for that, about suitable equipment and designed circuit diagram
 

Papabravo

Joined Feb 24, 2006
21,159
I recommend you start by understanding PGP encryption. It is an open source starting point, that has features that should be good enough for your purposes. Only you can make that determination however.

http://www.openpgp.org/resources/downloads.shtml

Once you establish the processor and the development environment to be used, you can move on to frequency bands and modulation techniques. You need to do a much better job of defining your requirements.
 
Last edited:

Thread Starter

ORGENES

Joined Feb 3, 2016
10
Thanks Sir,

Papabravo thanks, you give me a link for code, but i interested much on the circuit for that system of RF communication with micro
controller first. So if you have a link for circuit or any one with that circuit help me.
 

Picbuster

Joined Dec 2, 2013
1,047
To hide message is no problem. But remember: a transmission pattern is also a message (without the direct meaning of its content.)
first of all you should detect the 'other' site and know the exact time to transmit one block and receive one (turnaround time) avoiding so the middle man.The middle man receive and evaluate date and transmit it at higher power. During receive they blank out the formal receiver with a directional antennae. Then turnaround is not correct.
Just receiving by 3 party is not to avoid. Sending a high speed burst encrypted and compressed with a not common modulation technique will reduce the time to detect.
This information is common and available at Internet look at Diffie-Hellman and modulation technique.
Now way to hide it for the government hence they have a huge tin of decryption specialist to open when needed.
 
Top