Open Access Open Access  Restricted Access Subscription or Fee Access

Particular Case of Blowfish Algorithm

K. Sai Prasanthi, Chandra Sekhar Maganty, K. Sai Sruthi

Abstract


 

Encryption algorithm plays a crucial role in information security which guarantees the recent growing internet and network applications. They are used to secure the data in wireless networks against malicious attacks but securing data also consumes resources such as C.P.U time, Memory, battery power, encryption time etc. Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors. This paper discusses the requirements for a standard encryption algorithm. Experimental results show that Blowfish encryption algorithm may be more suitable for wireless networks with secure data transmission. With reduced bits in plain text and key our aim is to make it useful for systems having minimum configuration.


Keywords


Block Cipher, Fiestel Network, Standard Encryption.

Full Text:

PDF

References


B. Schneier, Applied Cryptography. John Wiley and Sons, 1996. ISBN 0-471-11709-9.

Bruce Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons, Inc., 1996.

Alan G. Konheim, "COMPUTER SECURITY AND CRYPTOGRAPHY ",2007 , by John Wiley & Sons, Inc.

Alfred J.M., Paul V. C. and Scott A. V., "Handbook of Applied Cryptography", Fifth Addition, 2001.

B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204.

Coppersmith, Don. (1994). "The data encryption standard (DES) and its strength against attacks". IBM Journal of Research and Development, 38(3), 243–250.

National Institute of Standards and Technology, (1979). ―FIPS-46: Data Encryption Standard (DES).‖ Revised as FIPS 46-1:1988, FIPS 46-2:1993, FIPS 46-3:1999, available at http://csrc.nist7aznml;'.gov/publications/fips/ fips46-3/fips46-3.pdf

Hala Bahjat Abdul Wahab1 , Abdul Monem S. Rahma, 'Proposed New Quantum Cryptography System Using Quantum Description techniques for Generated Curves", The 2009 International conference on security and management, SAM2009, July 13-16 2009, Las Vegas, USA, SAM 2009.

Henk C.A. van Tilborg, Eindhoven, "ENCYCLOPEDIA OF CRYPTOGRAPHY AND SECURITY", 2005, Springer Science+Business Media, Inc.

Afaf M. Ali Al-Neaimi, Rehab F. Hassan, ―New Approach for Modifying Blowfish Algorithm by Using Multiple Keys‖, IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.3, March 2011

Hardjono, ―Security in Wireless LANs and MANs‖, Architect House Publishers, 2005.

Diaa Salama, Hatem Abdual Kader and Mohiy Hadhoud (2011), ―Studying the Effects of Most Common Encryption Algorithms‖, International Arab Journal of e- Technology, Vol. 2, No. 1, January 2011, pp 1-10.

SimarPreet Singh, and Raman Maini (2011), ―Comparison of Data Encryption Algorithms‖, International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 125 – 127.

A.Rathika, Parvathy Nair and Parvathy Nair (2011), ―A High Throughput Algorithm for Data Encryption‖ International Journal of Computer Applications (0975 – 8887) Volume 13, No.5, January 2011 pp 13-16.

Lavanya P and M Rajashekhara Babu (2011), ―Performance Analysis of Montgomery Multiplication Algorithm for Multi-core Systems Using Concurrent Java‖, Journal of Advances in Applied Science Research, 2011, 2 (3), pp 567-573.

M.Umaparvathi, Dr.Dharmishtan and K Varughese (2010), ―Evaluation of Symmetric Encryption Algorithms for MANETs‖, Proceedings of 2010 IEEE International conference on Computational Intelligence and Computing Research (ICCIC-2010), 28-29 Dec. 2010, pp 1-3.

William Stalling, ―Cryptography and Network Security Principles and Practice 5th Edition‖, Pearson.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.