Blowfish Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Blowfish is a popular security algorithm that was developed by Bruce Schneier in the advent of the year 1994. The algorithm works on the same line as DES and it consumes block coding with blocks of a size of 64 bit. Blowfish became quite popular after its advent, just because Bruce Schneier[1] himself is one of the most famous cryptology expert and above this the algorithm is non patented, open source freely and freely available for use and modifications. Blowfish is a 64-bit block cipher with a variable-length key. It defines 2 distinct boxes: S boxes, a P box and four S boxes [3]. Taking into consideration the P box P is a one-dimensional field with 18 32-bit values. The boxes contain variable values; those can be implemented in the code or generated during each initialization. The S boxes S1, S2, S3, and S4 each contain 256 32-bit values
Authors and Affiliations
Ms NehaKhatri – Valmik , Prof. V. K Kshirsagar
Fungal Identification method by RDNA sequence analysis:Molecular approach to revel the role of microbial community invermicomposting
Abstract: Internal transcribed spacer is a special sequence that present in between sequence of ribosomalDNA. It is present in multiple copies and act as a conservative sequence. This sequence is unique for particu...
Real Time Monitoring Of Urban Water Systems for Developing Countries
Abstract: The safe and satisfactory provision of water related services in urban areas of developing countries remain a major challenge mainly attributed to limited resources and inability to promptly detect operat...
Efficient Weather Prediction By Back-Propagation Algorithm
Abstract: Artificial Neural Networks (ANNs) have been applied extensively to both regress and classify weather phenomena. While one of the core strengths of neural networks is rendering accurate predictions with...
Improving Data Storage Security in Cloud Computing Using RC6 Algorithm
In spite of the huge advantages got from the selection of cloud computing idea, its famous adoption has been determined usually by security concerns. The broadened assault surface in a cloud environment makes it more def...
Lossless Image Compression Using Data Folding Followed ByArithmetic Coding
Abstract : The paper presents a lossless image compression technique using the hybridization of two differententropy coding techniques. Initially data folding technique has been applied to the image. A row folding...