Title :
An Implementation of the Blowfish Cryptosystem
Author :
Meyers, Russell K. ; Desoky, Ahmed H.
Author_Institution :
Speed Sch. of Eng., Comput. Eng. & Comput. Sci. Dept., Univ. of Louisville, Louisville, KY
Abstract :
The Blowfish cryptosystem is a very fast and useful scheme, even though it was introduced over a decade ago. This cryptosystem consists of two parts, a subkey and S-box generation phase, and an encrypiton phase. A short introduction to both algorithms are given, along with a few notes about the Ciphertext Block Chaining (CBC) mode. Some general information about attacks are explained, along with information about some of the people who have worked to analyze and attempt to break Blowfish. An implementation of a Windows tool for encrypting files which uses Blowfish is also examined in this paper. The results of the encryption tool clearly demonstrate how fast the encryption is compared to the subkey and S-box generation. The secrecy of the cryptosystem is explained by using several test files of different types, as well as a study of the security with respect to the number of rounds. Finally, some possible extensions to the software tool to improve its usefulness based on the strength of Blowfish are given.
Keywords :
cryptography; Blowfish cryptosystem; ciphertext block chaining mode; encrypiton phase; s-box generation phase; subkey generation phase; Algorithm design and analysis; Application software; Computer science; Cryptography; Information analysis; Microprocessors; Security; Software tools; Table lookup; Testing;
Conference_Titel :
Signal Processing and Information Technology, 2008. ISSPIT 2008. IEEE International Symposium on
Conference_Location :
Sarajevo
Print_ISBN :
978-1-4244-3554-8
Electronic_ISBN :
978-1-4244-3555-5
DOI :
10.1109/ISSPIT.2008.4775664