Open Access Open Access  Restricted Access Subscription or Fee Access

A Novel Approach for Blowfish Algorithm

Sarika Tuniki, Praveen Kumar Ullengala

Abstract


Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Hence the search for the best solution to offer the necessary protection against the data intruders‟ attacks along with providing these services in time is one of the most interesting subjects in the security related communities. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. This paper provides the principal goal of designing any encryption algorithm is to hide the original message and send the non readable text message to the receiver so that secret message communication can take place over the web. The strength of an encryption algorithm depends on the difficulty of cracking the original message. A number of symmetric key encryption algorithms like DES, TRIPLE DES, AES, and BLOWFISH have been developed to provide greater security affects one over the other. Although the existing algorithms have their own merits and demerits but this paper presents a new approach for data encryption based on Blowfish algorithm. The blowfish algorithm is safe against unauthorized attack and runs faster than the popular existing algorithms. With this new approach we are implementing a technique to enhance the security level of blowfish algorithm and to further reduce the time for encryption and decryption.


Keywords


Symmetric Encryption, Asymmetric Encryption, Cryptography, Cipher Text, Plain Text, Decryption.

Full Text:

PDF

References


O.P Verma, Ritu Agarwal, Dhiraj Dafouti and Shobha Tyagi, “Peformance Analysis Of Data Encryption Algorithms”, IEEE Delhi Technological University India, 2011.

Diaa Salama, Abdul. Elminaam, Hatem Mohamed, Abdul Kader and Mohie Mohamed Hadhoud, “Performance Evaluation of Symmetric Encryption Algorithms”, International Journal of Computer Science and Network Security, vol.8 No.12, December 2008.

Ketu File white papers, “Symmetric vs Asymmetric Encryption”, a division of Midwest Research Corporation.

“Data Encryption Standard,” Federal Information Processing Standards Publication No. 46, National Bureau of Standards, January 15, 1977.

Tingyuan Nie and Teng Zhang,“ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.

Aamer Nadeem and Dr M. Younus Javed , “A Performance Comparison of Data Encryption Algorithms”, IEEE, 2005.

Himani Agrawal and Monisha Sharma, “Implementation and analysis of various symmetric cryptosystems”, Indian Journal of Science and Technology Vol. 3 No. 12, December 2010.

Allam Mousa, “Data Encryption Performance Based on Blowfish”, 47th International Symposium ELMAR-2005.08-1 0, June 2005.

Noohul Basheer Zain Ali, and James M Noras “OPTIMAL DATAPATH DESIGN FOR A CRYPTOGRAPHIC PROCESSOR: THE BLOWFISH ALGORITHM” Malaysian Journal of Computer Science, Vol. 14 No. 1, June 2001.

Russell K. Meyers and Ahmed H. Desoky “An Implementation of the Blowfish Cryptosystem”, IEEE, 2008.

“Real 802.11 Security: Wi-Fi Protected Access and 802.11i ,". Addison Wesley 2003.

Internet Security Glossary", http://www.faqs.org/rfcs/rfc2828.html. [RFC2828],"

Monika Agrawal, Pradeep Mishra “A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm”, IJEAT, 2012.

Jawahar Thakur, Nagesh Kumar “ DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, IJETAE, 2011.

Penchalaiah, N. and Seshadri, R. “Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)”, International Journal of Computer Science and Engineering, Vol. 02, No. 05, 2010, 1641-1645.

Stallings, W; ”Cryptography and Network Security: Principals and Practices”, Prentice Hall, 8th Edition, 2009.

Tamimi, A Al; “Performance Analysis of Data Encryption Algorithms”, Oct 2008.

Nadeem, Aamer; "A Performance Comparison of Data Encryption Algorithms", IEEE 2005.

Stallings, W;”Cryptography and Network Security”, Prentice Hall, 4th Edition, 2005.

TropSoft] "DES Overview", http://www.tropsoft.com/strongenc/des.htm.

Stallings, William; “Cryptography and Network Security Principles and Practices”; Fourth Edition; Pearson Education; Prentice Hall; 2009.

Stinson, D.; “Cryptography, Theory and Practice”; CRC Press; Second edition; 2000.

Schneier, B.; Kelsey, J.; Whiting,D.; Wagner, D.; Hall C. and Ferguson N.; “Performance Comparison of the AES Submissions”; version 2.0; 1999.

Jorstad, Norman D.; “Cryptographic Algorithm Metrics “; Institute for Defense Analyses Science and Technology Division; 1997.

“A Brief History of Cryptography”; 2001. University of Dayton School of Law. 19 Oct. 2004. .

“History of Cryptography” Wikipedia. .


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.