Proposal New Approach for Blowfish Algorithm by Using Random Key Generator

  • Israa Tahseen University of Technology, Computer Sciences Department.
  • Shatha Habeeb University of Technology, Computer Sciences Department.
Keywords: Blowfish, symmetric, key, encryption, ciphertext.

Abstract

There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods has their own uses, advantages, and disadvantages. All the three of these encryption methods use cryptography or the science of scrambling data. Although there are several pieces to an encryption process, the two main pieces are the algorithms and the keys. Blowfish, a symmetric block cipher and a Feistel network which follows simple Enciphering and Deciphering functions of 16 times each. The strength of the Blowfish algorithm relies on its sub-key generation and its basic confusion and diffusion based design. The proposed method are generate key drawn from parts of the image and by the size of key used with Blowfish.

Published
2012-06-30
How to Cite
[1]
Israa Tahseen and Shatha Habeeb, “Proposal New Approach for Blowfish Algorithm by Using Random Key Generator”, JMAUC, vol. 4, no. 1, pp. 5-13, Jun. 2012.
Section
Articles