Blowfish Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Blowfish is a popular security algorithm that was developed by Bruce Schneier in the advent of the year 1994. The algorithm works on the same line as DES and it consumes block coding with blocks of a size of 64 bit. Blowfish became quite popular after its advent, just because Bruce Schneier[1] himself is one of the most famous cryptology expert and above this the algorithm is non patented, open source freely and freely available for use and modifications. Blowfish is a 64-bit block cipher with a variable-length key. It defines 2 distinct boxes: S boxes, a P box and four S boxes [3]. Taking into consideration the P box P is a one-dimensional field with 18 32-bit values. The boxes contain variable values; those can be implemented in the code or generated during each initialization. The S boxes S1, S2, S3, and S4 each contain 256 32-bit values
Authors and Affiliations
Ms NehaKhatri – Valmik , Prof. V. K Kshirsagar
Extracting Repitative Patterns from Fuzzy Temporal Data
Abstract: Association rules mining from temporal dataset is to find associations between items that hold within certain time frame but not throughout the dataset. This problem involves first discovering frequent itemsets...
Bandwidth Assurance Using Energetic Fusion Channel In Ad-Hoc Networks
Wireless mesh networks (WMNs) have been proposed to provide cheap, easily deployable and vigorous Internet access. Improving user throughput is a primary objective in a WMN. The system focus on wireless networks with ina...
Stationary Wavelet Transform Image Fusion and Optimization Using Particle Swarm Optimization
The complementary nature of imaging sensors of different modalities all brought a great need of image fusion to extract relevant information images. Medical image fusion using Stationary wavelet transform (SWT) an...
Comprehensive Review: Intrusion Detection System and Techniques
Abstract: Security becomes an important challenge to secure the network from cyber attacks. Up till now, threats on the network and security are significant research issues. With increasing the amount of network, there i...
A Survey On Data Mining Techniques To Find Out Type Of Heart Attack
Heart disease is a major cause of morbidity and mortality in present society. Medicinal identification is extremely important but complicated task that should be performed precisely and proficiently. Although su...