Simulated Analysis and Enhancement of Blowfish Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for encryption as well as decryption algorithms and also give the sufficient description of key generation, key expansion, function and working principle of Blowfish cipher with proper explanations. Taking the current era, Most of the famous systems which offer security for a network or web or to a data are vulnerability to attacks and they are broken at some point of time by effective cryptanalysis methods, irrespective of its complex algorithmic design. In the general, today’s cryptography world is bounded to an interpretive of following any one or multiencryption scheme and that too for a single iteration on a single file only. This is evident in the maximum of the encryption-decryption cases. It also describes the comparisons between older blowfish and enhances blowfish. Italso shows enhance Blowfish algorithm for encryption and decryption of data. It is also give the proper simulated analysis of encryption and decryption time for different file formats using a windows application. It describe feature of application and its process and efficiency as well as calculation of time and throughput.
Authors and Affiliations
Rohan Kumar, , Rahul Thakkar, , Manoj Kumar
A Dynamic Image Generation Scheme for Steganographic Data Encryption
Abstract: This paper proposes a new approach to provide an extra layer of security to steganographictechniques. Today, most of the data is sent over the internet, whether personal or professional. Protection of dig...
Improved AODV based on Load and Delay for Route Discovery in MANET
A mobile Ad-hoc network (MANET) is a self configuring network of mobile devices connected by wireless links. A dynamic traffic allocation algorithm based on packet delay and hops in Mobile Ad hoc networks is pr...
Dynamic Stream Ciphering Algorithm
Abstract The main idea of any stream cipher algorithm is to generate stream cipher key base on the use set of LFSR with fix arrangement, all this LFSR are filling depending on the value of the basic key. In this pa...
Hierarchical Dirichlet Process for Dual Sentiment Analysis with Two Sides of One Review
Abstract: Sentiment categorization is a fundamental process in sentiment examination, by means of it’s intended to categorize the sentiment into either positive or negative for given text. The wide-ranging perform in sen...
A Novel approach for Graphical User Interface development and real time Object and Face Tracking using Image Processing and Computer Vision Techniques implemented in MATLAB
Image Processing is an advancement in the Signal processing domain where the input is an image or video and output can be image, video or in any other forms. With daily advances in Human-Computer interaction, I...