Blowfish Algorithm-Securing the Future

Authors

  • U.V. Ratna Kumari Assistant Professor, JNTUK,  Kakinada - 533 003, Andhra Pradesh, India 
  • Santosh Pokhrel Student, JNTUK,  Kakinada - 533 003, Andhra Pradesh, India 
  • Hyndavi Anusha Anche Student, JNTUK,  Kakinada - 533 003, Andhra Pradesh, India 

DOI:

https://doi.org/10.53555/nneee.v2i4.202

Keywords:

Encryption, Decryption, Plain text, Cipher text, Blowfish, P-array, Sub keys, S-box

Abstract

Information security has become a major issue in communication systems. Any threat to the information being transferred may cause severe loss to the organization. To overcome this security threat cryptography techniques are used to encrypt and decrypt the data. Many algorithms are used for this purpose, one among them is the blowfish algorithm. This paper presents a detail regarding the
encryption and decryption using blowfish algorithm using VHDL coding and its post simulation results. The beauty of this algorithm lies in its prepossessing way of generating the sub-keys.

References

B. Schneier, Description of a New Variable- Length Key, 64-Bit Block Cipher (Blow- fish),Fast Software Encryption, Cambridge

Security Workshop Proceedings (December 1993), Springer-Verlag, 1994.

Afaf M. Ali Al-Neaimi, New Approach for Modifying Blowfish Algorithm by Using Multiple Keys, IJCSNS, March 2011.

B. Schneier, “Applied Cryptography,” 2nd ed. New York: , JohnWiley & Sons, Inc., 1996.

B. Schneier, "Description of a New Variable Length Key, 64-bit Block Cipher (Blowfish)," Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 1994, Proceedings, Springer-Verlag, 1994,pp. 191-204.

Mr. Tushar Joshi “Design of enhanced speed blowfish algorithm for cryptography with merged encryption & decryption in VHDL"

Downloads

Published

2015-04-30

How to Cite

Kumari, U. R., Pokhrel, S., & Anche, H. A. (2015). Blowfish Algorithm-Securing the Future. Journal of Advance Research in Electrical & Electronics Engineering (ISSN 2208-2395), 2(4), 05-09. https://doi.org/10.53555/nneee.v2i4.202