Downloads: 101 | Views: 339
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014 | Popularity: 6.8 / 10
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Abstract: Information Security has been most important issue in data communication. Any loss or threat to information can prove to be big loss to the organization. Encryption technique plays an important role in information security systems. Information security area there are many cryptography algorithm is available and comparison has been made on the basis on these parameters: rounds block size; key size; and encryption / decryption time; CPU process time in the form of throughput and power consumption. These results show that blowfish is better than other algorithm. Blowfish is more secure and fast computing algorithm. But there is some problem in the existing Blowfish algorithm. blowfish weak keys generates bad S-boxes; Since Blowfishs S-boxes are key dependent. There is a chosen plaintext attack against a reduced-round variant of blowfish algorithm that is made easier by the use of weak key. in this report proposed a new approach to increase the robust of blowfish algorithm and solve the weakness of sub key by generate strongest a cryptographic randomness keys and used in blowfishs S- boxes stages. The proposed algorithm the secret key changes frequently by using randomness fuzzy value which are derived by different fuzzy set of condition after modify algorithm apply encryption and decryption on image and also Modified the F function operation to use of Multithreading to improve the Execution time and improve the Security by the new key generation approach.
Keywords: Cryptography, Blowfish Algorithm, Fuzzy Logic, Fuzzification, Defuzzification
Edition: Volume 3 Issue 6, June 2014
Pages: 1525 - 1529
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1362 - 1373Design and Implementation of a Novel Hybrid Quantum-Classical Processor for Enhanced Computation Speed
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1349 - 1363IoT - Enabled Secure and Scalable Cloud Architecture for Multi - User Systems: A Hybrid Post - Quantum Cryptographic and Block Chain based Approach Towards a Trustworthy Cloud Computing
Ponnarasan Krishnan