practical implementation of blowfish algorithm for boosting security aspect in networks

B Suresh Kumar,Rohit Kumar Upadhya

Published in International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

ISSN: 2320-7248          Impact Factor:1.8         Volume:2         Issue:3         Year: 26 July,2014         Pages:116-122

International Journal of Advanced Research in Computer Networking,Wireless and Mobile Communications

Abstract

Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just about any network, particularly over the Internet. This paper gives a brief analysis of Blow fish algorithm which is a symmetric block cipher that can be used for both encryption and decryption in cryptography.

Kewords

Secret Key, Cryptography, DES, Blowfish, MBC, Fiestal networks

Reference

[1] B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994. [2] B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) [3] Fast Software Encryption, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, 1994, pp. 191-204. [4] Yonatan Aumann, Yan Zong Ding, and Michael O. Rabin. Everlasting security in the bounded storage model. IEEE Transactions on Information Theory, 48(6):1668– 1680, 2002. [5] Akavia, S. Goldwasser, and V. Vaikuntanathan. Simultaneous hardcore bits and cryptography against memory attacks. In Omer Reingold, editor, Theory of Cryptography— TCC 2009, volume 5444 of Lecture Notes in Computer Science. Springer-Verlag, 2009. [6] Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange: A password- based protocol secure against dictionary attacks and password file compromise. In ACM Conference on Computer and Communications Security, pages 244–250, 1993. [7] Eli Biham and Adi Shamir. Differential fault analysis of secret key cryptosystems. In Jr. [Jr.97], pages 513–525.