SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 63
A COMBINED APPROACH USING TRIPLE DES AND BLOWFISH
RESEARCH AREA: COMPUTER SCIENCE (CRYPTOGRAPHY)
Shreya Singh
singh_shreya@yahoo.com
Abstract
In this paper we study about the triple DES algorithm along with the blowfish algorithm. This is a combined approach and is aimed at
improving their individual performances. Then this is briefly compared to the advanced encryption standard;
Keywords:-DES, Blowfish, TDES, AES.
--------------------------------------------------------------------***--------------------------------------------------------------------------
1. INTRODUCTION
There are two ways of communication possible
cryptographically. One is by the use of the public key system.
Here two different keys are used for encryption and
decryption. The three main forms of public key systems are
public key distribution systems, digital signature systems, and
public key cryptosystems, which can perform both public key
distribution and digital signature services. In a Public-key
cryptographic system, two keys are required. One is a secret
key and the other one is a public key. The second method is
the use of symmetric key cryptography. Here the same key is
used for both the encryption and the decryption. These are a
class of algorithms which are used for cryptography. In the
case of public key cryptosystem two different keys were being
used for the process of encryption and decryption. In
symmetric key cryptosystem we use the same cryptographic
keys for both encryption of the plaintext and decryption of the
cipher text. Symmetric encryption is a faster procedure. DES
is one algorithm which have been widely used for the
encryption of data. It was developed in 1975 by IBM. It is
now considered insecure. Another variant of the DES was
developed later known as the triple DES which is considered
to be more secure in nature. Though nowadays the AES is in
use instead of DES. AES is a symmetric block cipher with a
block size of 128 bits. Key lengths can be 128 bits, 192 bits, or
256 bits; 8 called AES-128, AES-192, and AES-256,
respectively. AES-128 uses 10 rounds, AES-192 uses 12
rounds, and AES-256 uses 14 rounds. Blowfish has a 64-bit
block size and a key length of anywhere from 32 bits to 448
bits. It is a 16-round Feistel cipher and uses large key-
dependent S-boxes. It is similar in structure to CAST-128,
which uses fixed S-boxes. Blowfish is not subject to any
patents and is therefore freely available for anyone to use. This
has contributed to its popularity in cryptographic software.
Blowfish is one of the fastest block ciphers in widespread use,
except when changing keys. Each new key requires pre-
processing equivalent to encrypting about 4 kilobytes of text,
which is very slow compared to other block ciphers.
2. DES
In DES the block cipher was used 64 bits at a time. The initial
permutation rearranges 64 bits. The encoding was done in 16
rounds.
The 64 bits were divided into left, right halves. The right half
goes through function f, mixed with the key. The right half
was added to the left half. Then these halves were swapped.
The right side was then expanded from 32 to 48 bits and the
48 bits of key were added. In the S-boxes, the set of 6 was
reduced to 4. The P-box then permutes 32 bits.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 64
Eight bits are used only for checking parity. These are later
discarded. Thus the effective key length is 56 bits.
Three modes of operations are present. They are:
• ECB
• CBC
• OFB
In the electronic CodeBook mode each 64-bit block is
encrypted independently. This is prone to attacks as the
attacker can easily build the CodeBook. In the Cipher Block
Chaining mode the encryption and decryption as carried as
follows:
• Encryption: Ci = EK(Pi Ci-1)
• Decryption: Pi = Ci-1 DK(Ci)
The OFB mode allows byte-wise encryption.
3. TRIPLE DES
Triple DES is also known as the Triple Data Encryption
Algorithm block cipher. Here the DES cipher algorithm is
applied thrice. This is done to each data block. Triples DES
increases the key size of DES and thus provides improved
protection against attacks. The algorithm is described as
follows:
Triple DES uses a "key bundle" which comprises three DES
keys. These are K1, K2 and K3. Each comprise of 56 bits. The
encryption algorithm is:
• ciphertext = EK3(DK2(EK1(plaintext))), DES
encrypt with K1, DES decrypt with K2, then DES
encrypt with K3.
Decryption is the reverse:
• plaintext = DK1(EK2(DK3(ciphertext)))that is ,
decrypt with K3, encrypt with K2, then decrypt with
K1.
Each triple encryption encrypts one block of 64 bits of data. In
each case the middle operation is the reverse of the first and
last. This improves the strength of the algorithm when using
keying option 2, and provides backward compatibility with
DES with keying option 3. The three keying options are :
• Keying option 1: All three keys are independent.
• Keying option 2: K1 and K2 are independent, and K3
= K1.
• Keying option 3: All three keys are identical, i.e. K1
= K2 = K3.
Keying option 1 has a key length of 168 bits consisting of
three 56-bit DES keys. One of the known attack is the meet in
the middle attack due to which option 1 can only provide 112
bits security. Keying option 2 reduces the key size to 112 bits.
Again this option is prone to certain chosen-plaintext or
known-plaintext attacks. It thus provides us with only 80 bits
of security.
4. BLOWFISH
Blowfish is a symmetric block cipher that can be used for
encryption and protection of data. It takes a variable-length
key, from 32 bits to 448 bits. Blowfish was designed in 1993
by Bruce Schneier. It is suitable for applications where the key
does not change often. . The block size is 64 bits, and the key
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 65
can be any length up to 448 bits. Data encryption occurs via a
16-round Feistel network. Each round consists of a key
dependent permutation, and a key- and data-dependent
substitution. All operations are XORs and additions on 32-bit
words. The only additional operations are four indexed array
data lookups per round. Blowfish has 16 rounds. There are
four 32-bit S-boxes with 256 entries each:
S1,0, S1,1,..., S1,255;
S2,0, S2,1,..,, S2,255;
S3,0, S3,1,..., S3,255;
S4,0, S4,1,..,, S4,255.
The subkeys are generated in the following manner:
1. Initialize first the P-array and then the four S-boxes,
in order, with a fixed string. This string consists of
the hexadecimal digits of pi.
2. XOR P1 with the first 32 bits of the key, XOR P2
with the second 32-bits of the key, and so on for all
bits of the key (possibly up to P14). Repeatedly cycle
through the key bits until the entire P-array has been
XORed with key bits.
3. Encrypt the all-zero string with the Blowfish
algorithm, using the subkeys described in steps (1)
and (2).
4. Replace P1 and P2 with the output of step (3).
5. Encrypt the output of step (3) using the Blowfish
algorithm with the modified subkeys.
6. Replace P3 and P4 with the output of step (5).
7. Continue the process, replacing all entries of the P
array, and then all four S-boxes in order, with the
output of the continuously changing Blowfish
algorithm.
Encryption is done in this way:
• The input is a 64-bit data element, x.
• Divide x into two 32-bit halves: xL, xR.
• Then, for i = 1 to 16:
• xL = xL XOR Pi
• xR = F(xL) XOR xR
• Swap xL and xR
• After the sixteenth round, swap xL and xR again to
undo the last swap.
• Then, xR = xR XOR P17 and xL = xL XOR P18.
• Finally, recombine xL and xR to get the ciphertext.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 66
5. COMPARISON WITH AES
The Advanced Encryption Standard (AES) is a symmetric-key
block cipher published by the National Institute of Standards
and Technology (NIST) in December 2001. AES has defined
three versions, with 10, 12, and 14 rounds. It was similar to
DES: block cipher (with different modes), but 128-bit blocks
128-bit, 192-bit, or 256-bit key, Mix of permutations, “S-
boxes”. These S-boxes were based on modular arithmetic with
polynomials. Each version uses a different cipher key size
(128, 192, or 256), but the round keys are always 128 bits.
AES, like DES, uses substitution. AES uses two invertible
transformations. The first transformation, SubBytes, is used at
the encryption site. To substitute a byte, we interpret the byte
as two hexadecimal digits.
• Step 1: ByteSub Transformation
• Step 2: ShiftRow Transformation
• Step 3: MixColumn Transformation
• Step 4: Round Key Addition
Final round is a little different because it removes the
MixColumns step.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 67
Each byte of the block is replaced by its substitute in an S-
box. Each byte is treated independently and single S-box is
used for the entire state. Each row of the state is shifted
cyclically a certain number of steps. State columns are treated
as polynomials over GF(28). Each column is multiplied by
modulo x4 + 1 by a fixed polynomial c(x) = `03` x3 + `01` x2
+ `01`x + `02`. It has been shown Rijndael can be written as
an over defined system of multivariate quadratic equations.
Assuming that one could build a machine that could recover a
DES key in a second (i.e., try 255 keys per second), then it
would take that machine approximately 149 trillion years to
crack a 128-bit AES key.
CONCLUSIONS
DES was prone to attacks and the triple DES standard was
considered slow. The blowfish algorithm when combined with
the triple DES algorithm would provide a better algorithm. It
would be less prone to attacks. Triple DES would provide it
with security and the blowfish algorithm will add to the speed
of the algorithm.
REFERENCES
[1] William Stallings “Cryptography and Network
Security”,3rd Edition, Prentice-Hall Inc., 2005.
[2] A study of DES and Blowfish encryption algorithm,
Tingyuan Nie ; Commun. & Electron. Eng. Inst.,
Qingdao Technol. Univ., Qingdao, China ; Teng
Zhang.
[3] Performance Evaluation of DES and Blowfish
Algorithms, Tingyuan Nie ; Commun. & Electron.
Eng. Inst., Qingdao Technol. Univ., Qingdao, China ;
Chuanwang Song ; Xulong Zhi.
[4] A proposed mode for triple-DES encryption,
Coppersmith, D. ; IBM Research Division, Thomas J.
Watson Research Center, P.O. Box 218, Yorktown
Heights, New York 10598, USA ; Johnson, D.B. ;
Matyas, S.M.
[5] Integrated design of AES (Advanced Encryption
Standard) encrypter and decrypter, Chih-Chung Lu ;
Internet Platform Application Dept., Ind. Technol.
Res. Inst., Hsinchu, Taiwan ; Shau-Yin Tseng.

More Related Content

What's hot

PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
 
Network Security - Block cipher
Network Security - Block cipherNetwork Security - Block cipher
Network Security - Block cipherAshish Duggal
 
B03302007012
B03302007012B03302007012
B03302007012theijes
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...eSAT Publishing House
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE Mohammed Abdul Lateef
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithmsijsrd.com
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORacijjournal
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
 
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...ijait
 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...ijcseit
 

What's hot (20)

PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
Network Security - Block cipher
Network Security - Block cipherNetwork Security - Block cipher
Network Security - Block cipher
 
B03302007012
B03302007012B03302007012
B03302007012
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
M tech2
M tech2M tech2
M tech2
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
 

Viewers also liked

DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acideSAT Publishing House
 
Approaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyApproaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyeSAT Publishing House
 
Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...eSAT Publishing House
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandeSAT Publishing House
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perceptioneSAT Publishing House
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain ofeSAT Publishing House
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack oneSAT Publishing House
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingeSAT Publishing House
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...eSAT Publishing House
 
A survey on optimal route queries for road networks
A survey on optimal route queries for road networksA survey on optimal route queries for road networks
A survey on optimal route queries for road networkseSAT Publishing House
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...eSAT Publishing House
 
Vibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodVibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodeSAT Publishing House
 
Power system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorsPower system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorseSAT Publishing House
 
Performance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationsPerformance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationseSAT Publishing House
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingeSAT Publishing House
 

Viewers also liked (20)

DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acid
 
Approaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyApproaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzy
 
Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sand
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perception
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain of
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack on
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the buckling
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...
 
A survey on optimal route queries for road networks
A survey on optimal route queries for road networksA survey on optimal route queries for road networks
A survey on optimal route queries for road networks
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...
 
Vibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodVibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rod
 
Power system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorsPower system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generators
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi max
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Performance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationsPerformance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applications
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration using
 

Similar to A combined approach using triple des and blowfish

ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...IJNSA Journal
 
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)IJNSA Journal
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternseSAT Journals
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESijtsrd
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batchJaimin Jani
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network SecurityDr. Rupa Ch
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueijcsit
 
Inventive cubic symmetric encryption
Inventive cubic symmetric encryptionInventive cubic symmetric encryption
Inventive cubic symmetric encryptioncsandit
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimediacsandit
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information EncryptionAmna Magzoub
 

Similar to A combined approach using triple des and blowfish (20)

ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
Encryption
EncryptionEncryption
Encryption
 
82 86
82 8682 86
82 86
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
H42054550
H42054550H42054550
H42054550
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
 
Final report
Final reportFinal report
Final report
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DESProposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
 
Unit 2
Unit  2Unit  2
Unit 2
 
Inventive cubic symmetric encryption
Inventive cubic symmetric encryptionInventive cubic symmetric encryption
Inventive cubic symmetric encryption
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

A combined approach using triple des and blowfish

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 63 A COMBINED APPROACH USING TRIPLE DES AND BLOWFISH RESEARCH AREA: COMPUTER SCIENCE (CRYPTOGRAPHY) Shreya Singh singh_shreya@yahoo.com Abstract In this paper we study about the triple DES algorithm along with the blowfish algorithm. This is a combined approach and is aimed at improving their individual performances. Then this is briefly compared to the advanced encryption standard; Keywords:-DES, Blowfish, TDES, AES. --------------------------------------------------------------------***-------------------------------------------------------------------------- 1. INTRODUCTION There are two ways of communication possible cryptographically. One is by the use of the public key system. Here two different keys are used for encryption and decryption. The three main forms of public key systems are public key distribution systems, digital signature systems, and public key cryptosystems, which can perform both public key distribution and digital signature services. In a Public-key cryptographic system, two keys are required. One is a secret key and the other one is a public key. The second method is the use of symmetric key cryptography. Here the same key is used for both the encryption and the decryption. These are a class of algorithms which are used for cryptography. In the case of public key cryptosystem two different keys were being used for the process of encryption and decryption. In symmetric key cryptosystem we use the same cryptographic keys for both encryption of the plaintext and decryption of the cipher text. Symmetric encryption is a faster procedure. DES is one algorithm which have been widely used for the encryption of data. It was developed in 1975 by IBM. It is now considered insecure. Another variant of the DES was developed later known as the triple DES which is considered to be more secure in nature. Though nowadays the AES is in use instead of DES. AES is a symmetric block cipher with a block size of 128 bits. Key lengths can be 128 bits, 192 bits, or 256 bits; 8 called AES-128, AES-192, and AES-256, respectively. AES-128 uses 10 rounds, AES-192 uses 12 rounds, and AES-256 uses 14 rounds. Blowfish has a 64-bit block size and a key length of anywhere from 32 bits to 448 bits. It is a 16-round Feistel cipher and uses large key- dependent S-boxes. It is similar in structure to CAST-128, which uses fixed S-boxes. Blowfish is not subject to any patents and is therefore freely available for anyone to use. This has contributed to its popularity in cryptographic software. Blowfish is one of the fastest block ciphers in widespread use, except when changing keys. Each new key requires pre- processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers. 2. DES In DES the block cipher was used 64 bits at a time. The initial permutation rearranges 64 bits. The encoding was done in 16 rounds. The 64 bits were divided into left, right halves. The right half goes through function f, mixed with the key. The right half was added to the left half. Then these halves were swapped. The right side was then expanded from 32 to 48 bits and the 48 bits of key were added. In the S-boxes, the set of 6 was reduced to 4. The P-box then permutes 32 bits.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 64 Eight bits are used only for checking parity. These are later discarded. Thus the effective key length is 56 bits. Three modes of operations are present. They are: • ECB • CBC • OFB In the electronic CodeBook mode each 64-bit block is encrypted independently. This is prone to attacks as the attacker can easily build the CodeBook. In the Cipher Block Chaining mode the encryption and decryption as carried as follows: • Encryption: Ci = EK(Pi Ci-1) • Decryption: Pi = Ci-1 DK(Ci) The OFB mode allows byte-wise encryption. 3. TRIPLE DES Triple DES is also known as the Triple Data Encryption Algorithm block cipher. Here the DES cipher algorithm is applied thrice. This is done to each data block. Triples DES increases the key size of DES and thus provides improved protection against attacks. The algorithm is described as follows: Triple DES uses a "key bundle" which comprises three DES keys. These are K1, K2 and K3. Each comprise of 56 bits. The encryption algorithm is: • ciphertext = EK3(DK2(EK1(plaintext))), DES encrypt with K1, DES decrypt with K2, then DES encrypt with K3. Decryption is the reverse: • plaintext = DK1(EK2(DK3(ciphertext)))that is , decrypt with K3, encrypt with K2, then decrypt with K1. Each triple encryption encrypts one block of 64 bits of data. In each case the middle operation is the reverse of the first and last. This improves the strength of the algorithm when using keying option 2, and provides backward compatibility with DES with keying option 3. The three keying options are : • Keying option 1: All three keys are independent. • Keying option 2: K1 and K2 are independent, and K3 = K1. • Keying option 3: All three keys are identical, i.e. K1 = K2 = K3. Keying option 1 has a key length of 168 bits consisting of three 56-bit DES keys. One of the known attack is the meet in the middle attack due to which option 1 can only provide 112 bits security. Keying option 2 reduces the key size to 112 bits. Again this option is prone to certain chosen-plaintext or known-plaintext attacks. It thus provides us with only 80 bits of security. 4. BLOWFISH Blowfish is a symmetric block cipher that can be used for encryption and protection of data. It takes a variable-length key, from 32 bits to 448 bits. Blowfish was designed in 1993 by Bruce Schneier. It is suitable for applications where the key does not change often. . The block size is 64 bits, and the key
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 65 can be any length up to 448 bits. Data encryption occurs via a 16-round Feistel network. Each round consists of a key dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round. Blowfish has 16 rounds. There are four 32-bit S-boxes with 256 entries each: S1,0, S1,1,..., S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,..., S3,255; S4,0, S4,1,..,, S4,255. The subkeys are generated in the following manner: 1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal digits of pi. 2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-array has been XORed with key bits. 3. Encrypt the all-zero string with the Blowfish algorithm, using the subkeys described in steps (1) and (2). 4. Replace P1 and P2 with the output of step (3). 5. Encrypt the output of step (3) using the Blowfish algorithm with the modified subkeys. 6. Replace P3 and P4 with the output of step (5). 7. Continue the process, replacing all entries of the P array, and then all four S-boxes in order, with the output of the continuously changing Blowfish algorithm. Encryption is done in this way: • The input is a 64-bit data element, x. • Divide x into two 32-bit halves: xL, xR. • Then, for i = 1 to 16: • xL = xL XOR Pi • xR = F(xL) XOR xR • Swap xL and xR • After the sixteenth round, swap xL and xR again to undo the last swap. • Then, xR = xR XOR P17 and xL = xL XOR P18. • Finally, recombine xL and xR to get the ciphertext.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 66 5. COMPARISON WITH AES The Advanced Encryption Standard (AES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST) in December 2001. AES has defined three versions, with 10, 12, and 14 rounds. It was similar to DES: block cipher (with different modes), but 128-bit blocks 128-bit, 192-bit, or 256-bit key, Mix of permutations, “S- boxes”. These S-boxes were based on modular arithmetic with polynomials. Each version uses a different cipher key size (128, 192, or 256), but the round keys are always 128 bits. AES, like DES, uses substitution. AES uses two invertible transformations. The first transformation, SubBytes, is used at the encryption site. To substitute a byte, we interpret the byte as two hexadecimal digits. • Step 1: ByteSub Transformation • Step 2: ShiftRow Transformation • Step 3: MixColumn Transformation • Step 4: Round Key Addition Final round is a little different because it removes the MixColumns step.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 67 Each byte of the block is replaced by its substitute in an S- box. Each byte is treated independently and single S-box is used for the entire state. Each row of the state is shifted cyclically a certain number of steps. State columns are treated as polynomials over GF(28). Each column is multiplied by modulo x4 + 1 by a fixed polynomial c(x) = `03` x3 + `01` x2 + `01`x + `02`. It has been shown Rijndael can be written as an over defined system of multivariate quadratic equations. Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 trillion years to crack a 128-bit AES key. CONCLUSIONS DES was prone to attacks and the triple DES standard was considered slow. The blowfish algorithm when combined with the triple DES algorithm would provide a better algorithm. It would be less prone to attacks. Triple DES would provide it with security and the blowfish algorithm will add to the speed of the algorithm. REFERENCES [1] William Stallings “Cryptography and Network Security”,3rd Edition, Prentice-Hall Inc., 2005. [2] A study of DES and Blowfish encryption algorithm, Tingyuan Nie ; Commun. & Electron. Eng. Inst., Qingdao Technol. Univ., Qingdao, China ; Teng Zhang. [3] Performance Evaluation of DES and Blowfish Algorithms, Tingyuan Nie ; Commun. & Electron. Eng. Inst., Qingdao Technol. Univ., Qingdao, China ; Chuanwang Song ; Xulong Zhi. [4] A proposed mode for triple-DES encryption, Coppersmith, D. ; IBM Research Division, Thomas J. Watson Research Center, P.O. Box 218, Yorktown Heights, New York 10598, USA ; Johnson, D.B. ; Matyas, S.M. [5] Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter, Chih-Chung Lu ; Internet Platform Application Dept., Ind. Technol. Res. Inst., Hsinchu, Taiwan ; Shau-Yin Tseng.