SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 63
A COMBINED APPROACH USING TRIPLE DES AND BLOWFISH
RESEARCH AREA: COMPUTER SCIENCE (CRYPTOGRAPHY)
Shreya Singh
singh_shreya@yahoo.com
Abstract
In this paper we study about the triple DES algorithm along with the blowfish algorithm. This is a combined approach and is aimed at
improving their individual performances. Then this is briefly compared to the advanced encryption standard;
Keywords:-DES, Blowfish, TDES, AES.
--------------------------------------------------------------------***--------------------------------------------------------------------------
1. INTRODUCTION
There are two ways of communication possible
cryptographically. One is by the use of the public key system.
Here two different keys are used for encryption and
decryption. The three main forms of public key systems are
public key distribution systems, digital signature systems, and
public key cryptosystems, which can perform both public key
distribution and digital signature services. In a Public-key
cryptographic system, two keys are required. One is a secret
key and the other one is a public key. The second method is
the use of symmetric key cryptography. Here the same key is
used for both the encryption and the decryption. These are a
class of algorithms which are used for cryptography. In the
case of public key cryptosystem two different keys were being
used for the process of encryption and decryption. In
symmetric key cryptosystem we use the same cryptographic
keys for both encryption of the plaintext and decryption of the
cipher text. Symmetric encryption is a faster procedure. DES
is one algorithm which have been widely used for the
encryption of data. It was developed in 1975 by IBM. It is
now considered insecure. Another variant of the DES was
developed later known as the triple DES which is considered
to be more secure in nature. Though nowadays the AES is in
use instead of DES. AES is a symmetric block cipher with a
block size of 128 bits. Key lengths can be 128 bits, 192 bits, or
256 bits; 8 called AES-128, AES-192, and AES-256,
respectively. AES-128 uses 10 rounds, AES-192 uses 12
rounds, and AES-256 uses 14 rounds. Blowfish has a 64-bit
block size and a key length of anywhere from 32 bits to 448
bits. It is a 16-round Feistel cipher and uses large key-
dependent S-boxes. It is similar in structure to CAST-128,
which uses fixed S-boxes. Blowfish is not subject to any
patents and is therefore freely available for anyone to use. This
has contributed to its popularity in cryptographic software.
Blowfish is one of the fastest block ciphers in widespread use,
except when changing keys. Each new key requires pre-
processing equivalent to encrypting about 4 kilobytes of text,
which is very slow compared to other block ciphers.
2. DES
In DES the block cipher was used 64 bits at a time. The initial
permutation rearranges 64 bits. The encoding was done in 16
rounds.
The 64 bits were divided into left, right halves. The right half
goes through function f, mixed with the key. The right half
was added to the left half. Then these halves were swapped.
The right side was then expanded from 32 to 48 bits and the
48 bits of key were added. In the S-boxes, the set of 6 was
reduced to 4. The P-box then permutes 32 bits.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 64
Eight bits are used only for checking parity. These are later
discarded. Thus the effective key length is 56 bits.
Three modes of operations are present. They are:
• ECB
• CBC
• OFB
In the electronic CodeBook mode each 64-bit block is
encrypted independently. This is prone to attacks as the
attacker can easily build the CodeBook. In the Cipher Block
Chaining mode the encryption and decryption as carried as
follows:
• Encryption: Ci = EK(Pi Ci-1)
• Decryption: Pi = Ci-1 DK(Ci)
The OFB mode allows byte-wise encryption.
3. TRIPLE DES
Triple DES is also known as the Triple Data Encryption
Algorithm block cipher. Here the DES cipher algorithm is
applied thrice. This is done to each data block. Triples DES
increases the key size of DES and thus provides improved
protection against attacks. The algorithm is described as
follows:
Triple DES uses a "key bundle" which comprises three DES
keys. These are K1, K2 and K3. Each comprise of 56 bits. The
encryption algorithm is:
• ciphertext = EK3(DK2(EK1(plaintext))), DES
encrypt with K1, DES decrypt with K2, then DES
encrypt with K3.
Decryption is the reverse:
• plaintext = DK1(EK2(DK3(ciphertext)))that is ,
decrypt with K3, encrypt with K2, then decrypt with
K1.
Each triple encryption encrypts one block of 64 bits of data. In
each case the middle operation is the reverse of the first and
last. This improves the strength of the algorithm when using
keying option 2, and provides backward compatibility with
DES with keying option 3. The three keying options are :
• Keying option 1: All three keys are independent.
• Keying option 2: K1 and K2 are independent, and K3
= K1.
• Keying option 3: All three keys are identical, i.e. K1
= K2 = K3.
Keying option 1 has a key length of 168 bits consisting of
three 56-bit DES keys. One of the known attack is the meet in
the middle attack due to which option 1 can only provide 112
bits security. Keying option 2 reduces the key size to 112 bits.
Again this option is prone to certain chosen-plaintext or
known-plaintext attacks. It thus provides us with only 80 bits
of security.
4. BLOWFISH
Blowfish is a symmetric block cipher that can be used for
encryption and protection of data. It takes a variable-length
key, from 32 bits to 448 bits. Blowfish was designed in 1993
by Bruce Schneier. It is suitable for applications where the key
does not change often. . The block size is 64 bits, and the key
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 65
can be any length up to 448 bits. Data encryption occurs via a
16-round Feistel network. Each round consists of a key
dependent permutation, and a key- and data-dependent
substitution. All operations are XORs and additions on 32-bit
words. The only additional operations are four indexed array
data lookups per round. Blowfish has 16 rounds. There are
four 32-bit S-boxes with 256 entries each:
S1,0, S1,1,..., S1,255;
S2,0, S2,1,..,, S2,255;
S3,0, S3,1,..., S3,255;
S4,0, S4,1,..,, S4,255.
The subkeys are generated in the following manner:
1. Initialize first the P-array and then the four S-boxes,
in order, with a fixed string. This string consists of
the hexadecimal digits of pi.
2. XOR P1 with the first 32 bits of the key, XOR P2
with the second 32-bits of the key, and so on for all
bits of the key (possibly up to P14). Repeatedly cycle
through the key bits until the entire P-array has been
XORed with key bits.
3. Encrypt the all-zero string with the Blowfish
algorithm, using the subkeys described in steps (1)
and (2).
4. Replace P1 and P2 with the output of step (3).
5. Encrypt the output of step (3) using the Blowfish
algorithm with the modified subkeys.
6. Replace P3 and P4 with the output of step (5).
7. Continue the process, replacing all entries of the P
array, and then all four S-boxes in order, with the
output of the continuously changing Blowfish
algorithm.
Encryption is done in this way:
• The input is a 64-bit data element, x.
• Divide x into two 32-bit halves: xL, xR.
• Then, for i = 1 to 16:
• xL = xL XOR Pi
• xR = F(xL) XOR xR
• Swap xL and xR
• After the sixteenth round, swap xL and xR again to
undo the last swap.
• Then, xR = xR XOR P17 and xL = xL XOR P18.
• Finally, recombine xL and xR to get the ciphertext.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 66
5. COMPARISON WITH AES
The Advanced Encryption Standard (AES) is a symmetric-key
block cipher published by the National Institute of Standards
and Technology (NIST) in December 2001. AES has defined
three versions, with 10, 12, and 14 rounds. It was similar to
DES: block cipher (with different modes), but 128-bit blocks
128-bit, 192-bit, or 256-bit key, Mix of permutations, “S-
boxes”. These S-boxes were based on modular arithmetic with
polynomials. Each version uses a different cipher key size
(128, 192, or 256), but the round keys are always 128 bits.
AES, like DES, uses substitution. AES uses two invertible
transformations. The first transformation, SubBytes, is used at
the encryption site. To substitute a byte, we interpret the byte
as two hexadecimal digits.
• Step 1: ByteSub Transformation
• Step 2: ShiftRow Transformation
• Step 3: MixColumn Transformation
• Step 4: Round Key Addition
Final round is a little different because it removes the
MixColumns step.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 67
Each byte of the block is replaced by its substitute in an S-
box. Each byte is treated independently and single S-box is
used for the entire state. Each row of the state is shifted
cyclically a certain number of steps. State columns are treated
as polynomials over GF(28). Each column is multiplied by
modulo x4 + 1 by a fixed polynomial c(x) = `03` x3 + `01` x2
+ `01`x + `02`. It has been shown Rijndael can be written as
an over defined system of multivariate quadratic equations.
Assuming that one could build a machine that could recover a
DES key in a second (i.e., try 255 keys per second), then it
would take that machine approximately 149 trillion years to
crack a 128-bit AES key.
CONCLUSIONS
DES was prone to attacks and the triple DES standard was
considered slow. The blowfish algorithm when combined with
the triple DES algorithm would provide a better algorithm. It
would be less prone to attacks. Triple DES would provide it
with security and the blowfish algorithm will add to the speed
of the algorithm.
REFERENCES
[1] William Stallings “Cryptography and Network
Security”,3rd Edition, Prentice-Hall Inc., 2005.
[2] A study of DES and Blowfish encryption algorithm,
Tingyuan Nie ; Commun. & Electron. Eng. Inst.,
Qingdao Technol. Univ., Qingdao, China ; Teng
Zhang.
[3] Performance Evaluation of DES and Blowfish
Algorithms, Tingyuan Nie ; Commun. & Electron.
Eng. Inst., Qingdao Technol. Univ., Qingdao, China ;
Chuanwang Song ; Xulong Zhi.
[4] A proposed mode for triple-DES encryption,
Coppersmith, D. ; IBM Research Division, Thomas J.
Watson Research Center, P.O. Box 218, Yorktown
Heights, New York 10598, USA ; Johnson, D.B. ;
Matyas, S.M.
[5] Integrated design of AES (Advanced Encryption
Standard) encrypter and decrypter, Chih-Chung Lu ;
Internet Platform Application Dept., Ind. Technol.
Res. Inst., Hsinchu, Taiwan ; Shau-Yin Tseng.

More Related Content

What's hot

PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
IJNSA Journal
 
Network Security - Block cipher
Network Security - Block cipherNetwork Security - Block cipher
Network Security - Block cipher
Ashish Duggal
 
B03302007012
B03302007012B03302007012
B03302007012
theijes
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
eSAT Publishing House
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
Mohammed Abdul Lateef
 
M tech2
M tech2M tech2
M tech2
vinodkumar K
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
Kumar Goud
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
iosrjce
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
MahmudJion
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
ijsrd.com
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
Hardik Manocha
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
acijjournal
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
IJCNCJournal
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
Hardik Manocha
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
block ciphers
block ciphersblock ciphers
block ciphers
Asad Ali
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
International Journal of Science and Research (IJSR)
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
IJNSA Journal
 
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
ijait
 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
ijcseit
 

What's hot (20)

PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
Network Security - Block cipher
Network Security - Block cipherNetwork Security - Block cipher
Network Security - Block cipher
 
B03302007012
B03302007012B03302007012
B03302007012
 
Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...Hardware implementation of aes encryption and decryption for low area & power...
Hardware implementation of aes encryption and decryption for low area & power...
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
M tech2
M tech2M tech2
M tech2
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSORIMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
IMPLEMENTATION OF AES AS A CUSTOM HARDWARE USING NIOS II PROCESSOR
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGAImplementation of Fast Pipelined AES Algorithm on Xilinx FPGA
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
A Universal Bit Level Block Encoding Technique Using Session Based Symmetric ...
 
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
A General Session Based Bit Level Block Encoding Technique Using Symmetric Ke...
 

Viewers also liked

DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
ijsrd.com
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acid
eSAT Publishing House
 
Approaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyApproaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzy
eSAT Publishing House
 
Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...
eSAT Publishing House
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sand
eSAT Publishing House
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perception
eSAT Publishing House
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain of
eSAT Publishing House
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack on
eSAT Publishing House
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the buckling
eSAT Publishing House
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...
eSAT Publishing House
 
A survey on optimal route queries for road networks
A survey on optimal route queries for road networksA survey on optimal route queries for road networks
A survey on optimal route queries for road networks
eSAT Publishing House
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
eSAT Publishing House
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...
eSAT Publishing House
 
Vibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodVibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rod
eSAT Publishing House
 
Power system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorsPower system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generators
eSAT Publishing House
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi max
eSAT Publishing House
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
eSAT Publishing House
 
Performance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationsPerformance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applications
eSAT Publishing House
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration using
eSAT Publishing House
 

Viewers also liked (20)

DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
Optimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acidOptimization of cultural conditions for lactic acid
Optimization of cultural conditions for lactic acid
 
Approaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzyApproaches to the numerical solving of fuzzy
Approaches to the numerical solving of fuzzy
 
Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...Critical comparison of ground motion attenuation formulae for recent earthqua...
Critical comparison of ground motion attenuation formulae for recent earthqua...
 
Study on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sandStudy on shear strength characteristics of coir mat reinforced sand
Study on shear strength characteristics of coir mat reinforced sand
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perception
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain of
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack on
 
The use of polynomial shape function in the buckling
The use of polynomial shape function in the bucklingThe use of polynomial shape function in the buckling
The use of polynomial shape function in the buckling
 
A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...A novel association rule mining and clustering based hybrid method for music ...
A novel association rule mining and clustering based hybrid method for music ...
 
A survey on optimal route queries for road networks
A survey on optimal route queries for road networksA survey on optimal route queries for road networks
A survey on optimal route queries for road networks
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...Conception of a water level detector (tide gauge) based on a electromagnetic ...
Conception of a water level detector (tide gauge) based on a electromagnetic ...
 
Vibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rodVibration analysis and diagnostics for oil production units by pumping rod
Vibration analysis and diagnostics for oil production units by pumping rod
 
Power system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generatorsPower system stabilisation based on ga anfis in generators
Power system stabilisation based on ga anfis in generators
 
Quality of service (qos) in wi max
Quality of service (qos) in wi maxQuality of service (qos) in wi max
Quality of service (qos) in wi max
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Performance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applicationsPerformance evaluation of path loss parameters for broadcasting applications
Performance evaluation of path loss parameters for broadcasting applications
 
Run time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration usingRun time dynamic partial reconfiguration using
Run time dynamic partial reconfiguration using
 

Similar to A combined approach using triple des and blowfish

ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
IJNSA Journal
 
Encryption
EncryptionEncryption
Encryption
IGZ Software house
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
ijistjournal
 
82 86
82 8682 86
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
IJORCS
 
H42054550
H42054550H42054550
H42054550
IJERA Editor
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
International Journal of Science and Research (IJSR)
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
IJNSA Journal
 
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
IJNSA Journal
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
eSAT Journals
 
Final report
Final reportFinal report
Final report
Jagbir Kalirai
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
ijtsrd
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin Jani
 
Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DESProposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
International Journal of Science and Research (IJSR)
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
IAEME Publication
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
Dr. Rupa Ch
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
ijcsit
 
Unit 2
Unit  2Unit  2
Unit 2
tamil arasan
 
Inventive cubic symmetric encryption
Inventive cubic symmetric encryptionInventive cubic symmetric encryption
Inventive cubic symmetric encryption
csandit
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
csandit
 

Similar to A combined approach using triple des and blowfish (20)

ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
Encryption
EncryptionEncryption
Encryption
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
82 86
82 8682 86
82 86
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
H42054550
H42054550H42054550
H42054550
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMAR...
 
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
A 64 BITS ROTOR ENHANCED BLOCK CIPHER (REBC3)
 
A new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patternsA new fangled symmetric block cipher using zig-zag scan patterns
A new fangled symmetric block cipher using zig-zag scan patterns
 
Final report
Final reportFinal report
Final report
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
 
Jaimin chp-8 - network security-new -use this - 2011 batch
Jaimin   chp-8 - network security-new -use this -  2011 batchJaimin   chp-8 - network security-new -use this -  2011 batch
Jaimin chp-8 - network security-new -use this - 2011 batch
 
Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DESProposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
 
Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
 
Unit 2
Unit  2Unit  2
Unit 2
 
Inventive cubic symmetric encryption
Inventive cubic symmetric encryptionInventive cubic symmetric encryption
Inventive cubic symmetric encryption
 
Inventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for MultimediaInventive Cubic Symmetric Encryption System for Multimedia
Inventive Cubic Symmetric Encryption System for Multimedia
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
PriyankaKilaniya
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
Pallavi Sharma
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
PreethaV16
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
EMERSON EDUARDO RODRIGUES
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
DebendraDevKhanal1
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Dr.Costas Sachpazis
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
GiselleginaGloria
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
vmspraneeth
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
b0754201
 
Northrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdfNorthrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdf
takipo7507
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 

Recently uploaded (20)

OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...
 
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdfSELENIUM CONF -PALLAVI SHARMA - 2024.pdf
SELENIUM CONF -PALLAVI SHARMA - 2024.pdf
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 
Object Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOADObject Oriented Analysis and Design - OOAD
Object Oriented Analysis and Design - OOAD
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdfFUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
FUNDAMENTALS OF MECHANICAL ENGINEERING.pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
Lateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptxLateral load-resisting systems in buildings.pptx
Lateral load-resisting systems in buildings.pptx
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
Sachpazis_Consolidation Settlement Calculation Program-The Python Code and th...
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICSUNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
UNIT 4 LINEAR INTEGRATED CIRCUITS-DIGITAL ICS
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptxSENTIMENT ANALYSIS ON PPT AND Project template_.pptx
SENTIMENT ANALYSIS ON PPT AND Project template_.pptx
 
Northrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdfNorthrop Grumman - Aerospace Structures Overvi.pdf
Northrop Grumman - Aerospace Structures Overvi.pdf
 
Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 

A combined approach using triple des and blowfish

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 63 A COMBINED APPROACH USING TRIPLE DES AND BLOWFISH RESEARCH AREA: COMPUTER SCIENCE (CRYPTOGRAPHY) Shreya Singh singh_shreya@yahoo.com Abstract In this paper we study about the triple DES algorithm along with the blowfish algorithm. This is a combined approach and is aimed at improving their individual performances. Then this is briefly compared to the advanced encryption standard; Keywords:-DES, Blowfish, TDES, AES. --------------------------------------------------------------------***-------------------------------------------------------------------------- 1. INTRODUCTION There are two ways of communication possible cryptographically. One is by the use of the public key system. Here two different keys are used for encryption and decryption. The three main forms of public key systems are public key distribution systems, digital signature systems, and public key cryptosystems, which can perform both public key distribution and digital signature services. In a Public-key cryptographic system, two keys are required. One is a secret key and the other one is a public key. The second method is the use of symmetric key cryptography. Here the same key is used for both the encryption and the decryption. These are a class of algorithms which are used for cryptography. In the case of public key cryptosystem two different keys were being used for the process of encryption and decryption. In symmetric key cryptosystem we use the same cryptographic keys for both encryption of the plaintext and decryption of the cipher text. Symmetric encryption is a faster procedure. DES is one algorithm which have been widely used for the encryption of data. It was developed in 1975 by IBM. It is now considered insecure. Another variant of the DES was developed later known as the triple DES which is considered to be more secure in nature. Though nowadays the AES is in use instead of DES. AES is a symmetric block cipher with a block size of 128 bits. Key lengths can be 128 bits, 192 bits, or 256 bits; 8 called AES-128, AES-192, and AES-256, respectively. AES-128 uses 10 rounds, AES-192 uses 12 rounds, and AES-256 uses 14 rounds. Blowfish has a 64-bit block size and a key length of anywhere from 32 bits to 448 bits. It is a 16-round Feistel cipher and uses large key- dependent S-boxes. It is similar in structure to CAST-128, which uses fixed S-boxes. Blowfish is not subject to any patents and is therefore freely available for anyone to use. This has contributed to its popularity in cryptographic software. Blowfish is one of the fastest block ciphers in widespread use, except when changing keys. Each new key requires pre- processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers. 2. DES In DES the block cipher was used 64 bits at a time. The initial permutation rearranges 64 bits. The encoding was done in 16 rounds. The 64 bits were divided into left, right halves. The right half goes through function f, mixed with the key. The right half was added to the left half. Then these halves were swapped. The right side was then expanded from 32 to 48 bits and the 48 bits of key were added. In the S-boxes, the set of 6 was reduced to 4. The P-box then permutes 32 bits.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 64 Eight bits are used only for checking parity. These are later discarded. Thus the effective key length is 56 bits. Three modes of operations are present. They are: • ECB • CBC • OFB In the electronic CodeBook mode each 64-bit block is encrypted independently. This is prone to attacks as the attacker can easily build the CodeBook. In the Cipher Block Chaining mode the encryption and decryption as carried as follows: • Encryption: Ci = EK(Pi Ci-1) • Decryption: Pi = Ci-1 DK(Ci) The OFB mode allows byte-wise encryption. 3. TRIPLE DES Triple DES is also known as the Triple Data Encryption Algorithm block cipher. Here the DES cipher algorithm is applied thrice. This is done to each data block. Triples DES increases the key size of DES and thus provides improved protection against attacks. The algorithm is described as follows: Triple DES uses a "key bundle" which comprises three DES keys. These are K1, K2 and K3. Each comprise of 56 bits. The encryption algorithm is: • ciphertext = EK3(DK2(EK1(plaintext))), DES encrypt with K1, DES decrypt with K2, then DES encrypt with K3. Decryption is the reverse: • plaintext = DK1(EK2(DK3(ciphertext)))that is , decrypt with K3, encrypt with K2, then decrypt with K1. Each triple encryption encrypts one block of 64 bits of data. In each case the middle operation is the reverse of the first and last. This improves the strength of the algorithm when using keying option 2, and provides backward compatibility with DES with keying option 3. The three keying options are : • Keying option 1: All three keys are independent. • Keying option 2: K1 and K2 are independent, and K3 = K1. • Keying option 3: All three keys are identical, i.e. K1 = K2 = K3. Keying option 1 has a key length of 168 bits consisting of three 56-bit DES keys. One of the known attack is the meet in the middle attack due to which option 1 can only provide 112 bits security. Keying option 2 reduces the key size to 112 bits. Again this option is prone to certain chosen-plaintext or known-plaintext attacks. It thus provides us with only 80 bits of security. 4. BLOWFISH Blowfish is a symmetric block cipher that can be used for encryption and protection of data. It takes a variable-length key, from 32 bits to 448 bits. Blowfish was designed in 1993 by Bruce Schneier. It is suitable for applications where the key does not change often. . The block size is 64 bits, and the key
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 65 can be any length up to 448 bits. Data encryption occurs via a 16-round Feistel network. Each round consists of a key dependent permutation, and a key- and data-dependent substitution. All operations are XORs and additions on 32-bit words. The only additional operations are four indexed array data lookups per round. Blowfish has 16 rounds. There are four 32-bit S-boxes with 256 entries each: S1,0, S1,1,..., S1,255; S2,0, S2,1,..,, S2,255; S3,0, S3,1,..., S3,255; S4,0, S4,1,..,, S4,255. The subkeys are generated in the following manner: 1. Initialize first the P-array and then the four S-boxes, in order, with a fixed string. This string consists of the hexadecimal digits of pi. 2. XOR P1 with the first 32 bits of the key, XOR P2 with the second 32-bits of the key, and so on for all bits of the key (possibly up to P14). Repeatedly cycle through the key bits until the entire P-array has been XORed with key bits. 3. Encrypt the all-zero string with the Blowfish algorithm, using the subkeys described in steps (1) and (2). 4. Replace P1 and P2 with the output of step (3). 5. Encrypt the output of step (3) using the Blowfish algorithm with the modified subkeys. 6. Replace P3 and P4 with the output of step (5). 7. Continue the process, replacing all entries of the P array, and then all four S-boxes in order, with the output of the continuously changing Blowfish algorithm. Encryption is done in this way: • The input is a 64-bit data element, x. • Divide x into two 32-bit halves: xL, xR. • Then, for i = 1 to 16: • xL = xL XOR Pi • xR = F(xL) XOR xR • Swap xL and xR • After the sixteenth round, swap xL and xR again to undo the last swap. • Then, xR = xR XOR P17 and xL = xL XOR P18. • Finally, recombine xL and xR to get the ciphertext.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 66 5. COMPARISON WITH AES The Advanced Encryption Standard (AES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST) in December 2001. AES has defined three versions, with 10, 12, and 14 rounds. It was similar to DES: block cipher (with different modes), but 128-bit blocks 128-bit, 192-bit, or 256-bit key, Mix of permutations, “S- boxes”. These S-boxes were based on modular arithmetic with polynomials. Each version uses a different cipher key size (128, 192, or 256), but the round keys are always 128 bits. AES, like DES, uses substitution. AES uses two invertible transformations. The first transformation, SubBytes, is used at the encryption site. To substitute a byte, we interpret the byte as two hexadecimal digits. • Step 1: ByteSub Transformation • Step 2: ShiftRow Transformation • Step 3: MixColumn Transformation • Step 4: Round Key Addition Final round is a little different because it removes the MixColumns step.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 02 Issue: 07 | Jul-2013, Available @ http://www.ijret.org 67 Each byte of the block is replaced by its substitute in an S- box. Each byte is treated independently and single S-box is used for the entire state. Each row of the state is shifted cyclically a certain number of steps. State columns are treated as polynomials over GF(28). Each column is multiplied by modulo x4 + 1 by a fixed polynomial c(x) = `03` x3 + `01` x2 + `01`x + `02`. It has been shown Rijndael can be written as an over defined system of multivariate quadratic equations. Assuming that one could build a machine that could recover a DES key in a second (i.e., try 255 keys per second), then it would take that machine approximately 149 trillion years to crack a 128-bit AES key. CONCLUSIONS DES was prone to attacks and the triple DES standard was considered slow. The blowfish algorithm when combined with the triple DES algorithm would provide a better algorithm. It would be less prone to attacks. Triple DES would provide it with security and the blowfish algorithm will add to the speed of the algorithm. REFERENCES [1] William Stallings “Cryptography and Network Security”,3rd Edition, Prentice-Hall Inc., 2005. [2] A study of DES and Blowfish encryption algorithm, Tingyuan Nie ; Commun. & Electron. Eng. Inst., Qingdao Technol. Univ., Qingdao, China ; Teng Zhang. [3] Performance Evaluation of DES and Blowfish Algorithms, Tingyuan Nie ; Commun. & Electron. Eng. Inst., Qingdao Technol. Univ., Qingdao, China ; Chuanwang Song ; Xulong Zhi. [4] A proposed mode for triple-DES encryption, Coppersmith, D. ; IBM Research Division, Thomas J. Watson Research Center, P.O. Box 218, Yorktown Heights, New York 10598, USA ; Johnson, D.B. ; Matyas, S.M. [5] Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter, Chih-Chung Lu ; Internet Platform Application Dept., Ind. Technol. Res. Inst., Hsinchu, Taiwan ; Shau-Yin Tseng.