Design and Implementation of
Blowfish Algorithm based on Verilog HDL
UNDER THE GUIDANCE OF
T.SHIRISHA
(Assistant professor)
PRESENTED BY
N.AJAY (15845A0402)
T.SATHISH (15845A0403)
P.GOVARDHAN (14841A0485)
INTRODUCTION
 Information security has become an important issue in data
communication. encryption algorithms have come up as a
solution and play an important role in information security
system.
 Blowfish is a symmetric block cipher that can be effectively
used for encryption and safeguarding of data. it takes a
variable-length key, from 32 bits to 448 bits, making it ideal
for securing data.
 Blowfish is based on “CRYPTOGRAPHY” mechanism
 Where cryptography is a greek word it means
crypto = hidden
graphy= way of writing
Encryption is the process of converting plane text to
“cipher text”
Cipher text is an encrypted information which is
unreadable by a human or computer without the
proper cipher to decrypt it
ENCRYPTION
Cipher text ?
ENCRYPTION
STANDARDS
1. DATA ENCRYPTION STANDARD (DES)
2. ADVANCED ENCRYPTION STANDARD (AES)
3. “BLOWFISH” ALGORITHM
1. DES
 DES is having plaintext range of 64bit and key length
of 56 bit.
2. AES
 AES is having plain text range of 128 bit and variable key
length of between 128,192,256
3. BLOWFISH ALGORITHM
The blowfish algorithm is having plaintext range of 128 bit and
variable key length from 32 bits to 448 bits and it performs 16
rounds of operations.
Structure
of
Blowfish
algorithm
There are two
parts in this
algorithm
1. KEY
EXPANSION
2. ROUND
STRUCTURE
WORKING OF
KEY EXPANSION
32
64
32 32
WORKING OF ROUND
STRUCTURE
64
32 32
32
ROUND 1
ROUND 2
ROUND 16
IT USES SYMMETRIC KEY
ENCRYPTION AND DECRYPTION
ADVANTAGES
LICENSE FREE
MORE SECURE
IMPROVED PERFORMANCE
LESS POWER CONSUMPTION
SMALLER DESIGN SIZE
AT A TIME ENCRYPTION AND DECRYPTION
CAN BE PERFORMED
APPLICATIONS
Widely used for computer and
communication network.
Android devices
IOT(Inter net of things)
Image processing units
Software Used:
 XILINX 14.7
Language Used:
• VERILOG HDL
TIMING DIAGRAM
CONCLUSION
 The Blowfish algorithm can achieve high-speed data transfer up to
4 bits per clock, which is 9 times faster than a Pentium.
 The test results show that the maximum frequency of this
Blowfish cipher chip is 50MHz.
 The proposed architecture has satisfied the need of high-speed
data transfer and can be applied to security device
Blow fish final ppt

Blow fish final ppt

  • 1.
    Design and Implementationof Blowfish Algorithm based on Verilog HDL UNDER THE GUIDANCE OF T.SHIRISHA (Assistant professor) PRESENTED BY N.AJAY (15845A0402) T.SATHISH (15845A0403) P.GOVARDHAN (14841A0485)
  • 2.
    INTRODUCTION  Information securityhas become an important issue in data communication. encryption algorithms have come up as a solution and play an important role in information security system.  Blowfish is a symmetric block cipher that can be effectively used for encryption and safeguarding of data. it takes a variable-length key, from 32 bits to 448 bits, making it ideal for securing data.
  • 3.
     Blowfish isbased on “CRYPTOGRAPHY” mechanism  Where cryptography is a greek word it means crypto = hidden graphy= way of writing
  • 4.
    Encryption is theprocess of converting plane text to “cipher text” Cipher text is an encrypted information which is unreadable by a human or computer without the proper cipher to decrypt it ENCRYPTION Cipher text ?
  • 5.
    ENCRYPTION STANDARDS 1. DATA ENCRYPTIONSTANDARD (DES) 2. ADVANCED ENCRYPTION STANDARD (AES) 3. “BLOWFISH” ALGORITHM
  • 6.
    1. DES  DESis having plaintext range of 64bit and key length of 56 bit. 2. AES  AES is having plain text range of 128 bit and variable key length of between 128,192,256
  • 7.
    3. BLOWFISH ALGORITHM Theblowfish algorithm is having plaintext range of 128 bit and variable key length from 32 bits to 448 bits and it performs 16 rounds of operations.
  • 8.
    Structure of Blowfish algorithm There are two partsin this algorithm 1. KEY EXPANSION 2. ROUND STRUCTURE
  • 9.
  • 10.
    WORKING OF ROUND STRUCTURE 64 3232 32 ROUND 1 ROUND 2 ROUND 16
  • 11.
  • 12.
  • 13.
    ADVANTAGES LICENSE FREE MORE SECURE IMPROVEDPERFORMANCE LESS POWER CONSUMPTION SMALLER DESIGN SIZE AT A TIME ENCRYPTION AND DECRYPTION CAN BE PERFORMED
  • 14.
    APPLICATIONS Widely used forcomputer and communication network. Android devices IOT(Inter net of things) Image processing units
  • 15.
    Software Used:  XILINX14.7 Language Used: • VERILOG HDL
  • 16.
  • 17.
    CONCLUSION  The Blowfishalgorithm can achieve high-speed data transfer up to 4 bits per clock, which is 9 times faster than a Pentium.  The test results show that the maximum frequency of this Blowfish cipher chip is 50MHz.  The proposed architecture has satisfied the need of high-speed data transfer and can be applied to security device