Blowfish Algorithm-Securing the Future
DOI:
https://doi.org/10.53555/nneee.v2i4.202Keywords:
Encryption, Decryption, Plain text, Cipher text, Blowfish, P-array, Sub keys, S-boxAbstract
Information security has become a major issue in communication systems. Any threat to the information being transferred may cause severe loss to the organization. To overcome this security threat cryptography techniques are used to encrypt and decrypt the data. Many algorithms are used for this purpose, one among them is the blowfish algorithm. This paper presents a detail regarding the
encryption and decryption using blowfish algorithm using VHDL coding and its post simulation results. The beauty of this algorithm lies in its prepossessing way of generating the sub-keys.
References
B. Schneier, Description of a New Variable- Length Key, 64-Bit Block Cipher (Blow- fish),Fast Software Encryption, Cambridge
Security Workshop Proceedings (December 1993), Springer-Verlag, 1994.
Afaf M. Ali Al-Neaimi, New Approach for Modifying Blowfish Algorithm by Using Multiple Keys, IJCSNS, March 2011.
B. Schneier, “Applied Cryptography,” 2nd ed. New York: , JohnWiley & Sons, Inc., 1996.
B. Schneier, "Description of a New Variable Length Key, 64-bit Block Cipher (Blowfish)," Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 1994, Proceedings, Springer-Verlag, 1994,pp. 191-204.
Mr. Tushar Joshi “Design of enhanced speed blowfish algorithm for cryptography with merged encryption & decryption in VHDL"
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.