DocumentCode :
2631914
Title :
An Implementation of the Blowfish Cryptosystem
Author :
Meyers, Russell K. ; Desoky, Ahmed H.
Author_Institution :
Speed Sch. of Eng., Comput. Eng. & Comput. Sci. Dept., Univ. of Louisville, Louisville, KY
fYear :
2008
fDate :
16-19 Dec. 2008
Firstpage :
346
Lastpage :
351
Abstract :
The Blowfish cryptosystem is a very fast and useful scheme, even though it was introduced over a decade ago. This cryptosystem consists of two parts, a subkey and S-box generation phase, and an encrypiton phase. A short introduction to both algorithms are given, along with a few notes about the Ciphertext Block Chaining (CBC) mode. Some general information about attacks are explained, along with information about some of the people who have worked to analyze and attempt to break Blowfish. An implementation of a Windows tool for encrypting files which uses Blowfish is also examined in this paper. The results of the encryption tool clearly demonstrate how fast the encryption is compared to the subkey and S-box generation. The secrecy of the cryptosystem is explained by using several test files of different types, as well as a study of the security with respect to the number of rounds. Finally, some possible extensions to the software tool to improve its usefulness based on the strength of Blowfish are given.
Keywords :
cryptography; Blowfish cryptosystem; ciphertext block chaining mode; encrypiton phase; s-box generation phase; subkey generation phase; Algorithm design and analysis; Application software; Computer science; Cryptography; Information analysis; Microprocessors; Security; Software tools; Table lookup; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing and Information Technology, 2008. ISSPIT 2008. IEEE International Symposium on
Conference_Location :
Sarajevo
Print_ISBN :
978-1-4244-3554-8
Electronic_ISBN :
978-1-4244-3555-5
Type :
conf
DOI :
10.1109/ISSPIT.2008.4775664
Filename :
4775664
Link To Document :
بازگشت