Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications
ISSN: 2320-7248 Impact Factor:1.8 Volume:2 Issue:3 Year: 26 July,2014 Pages:116-122
Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. This paper gives a brief analysis of Blow fish algorithm which is a symmetric block cipher that can be used for both encryption and decryption in cryptography.
Secret Key, Cryptography, DES, Blowfish, MBC, Fiestal networks
[1] B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994. [2] B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) [3] Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204. [4] Yonatan Aumann, Yan Zong Ding, and Michael O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668– 1680, 2002. [5] Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In Omer Reingold, editor, Theory of Cryptography— TCC 2009, volume 5444 of Lecture Notes in Computer Science. Springer-Verlag, 2009. [6] Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange: A password- based protocol secure against dictionary attacks and password file compromise. In ACM Conference on Computer and Communications Security, pages 244–250, 1993. [7] Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In Jr. [Jr.97], pages 513–525.