CFP last date
22 April 2024
Reseach Article

A New Algorithm for Key and Improved Feistel Rounds in Blowfish Algorithm

Published on July 2015 by Mahesh Patil, Rahul Kolhe
National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
Foundation of Computer Science USA
NCKITE2015 - Number 1
July 2015
Authors: Mahesh Patil, Rahul Kolhe
8e8f5aad-770f-4c09-a719-53dad3bb3e86

Mahesh Patil, Rahul Kolhe . A New Algorithm for Key and Improved Feistel Rounds in Blowfish Algorithm. National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015). NCKITE2015, 1 (July 2015), 5-8.

@article{
author = { Mahesh Patil, Rahul Kolhe },
title = { A New Algorithm for Key and Improved Feistel Rounds in Blowfish Algorithm },
journal = { National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) },
issue_date = { July 2015 },
volume = { NCKITE2015 },
number = { 1 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 5-8 },
numpages = 4,
url = { /proceedings/nckite2015/number1/21475-2642/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%A Mahesh Patil
%A Rahul Kolhe
%T A New Algorithm for Key and Improved Feistel Rounds in Blowfish Algorithm
%J National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%@ 0975-8887
%V NCKITE2015
%N 1
%P 5-8
%D 2015
%I International Journal of Computer Applications
Abstract

The main feature of Blowfish algorithm is its variable key size (ranges from 32 to 448 bit). The blowfish algorithm is 16 round feistel network and it uses large s-boxes which are key dependant. Blowfish algorithm use value of ? (=3. 14159…. ) to calculate the sub key values, but in cryptanalysis it is claimed that if attacker knows the value of hexadecimal digits of ? those we used for generation of sub keys, then it is easy for attacker to break key. In this paper random number generator (RNG) is introduced to create a set of values instead of ? value. Seed value is kept private so that no one can guess the value of sub keys and the random number generator (RNG) function is declared public. Also the 16 rounds of blowfish are replaced by 17 complex rounds of IDEA (International data encryption standard) to enhance the security. This paper focuses on enhancing security of Blowfish algorithm for digital content delivery.

References
  1. S. Bruce, "Description of a new variable-length key, 64-bit block cipher (Blowfish),"In Fast Software Encryption Second International Workshop, Leuven, Belgium, December 1993, Proceedings, Springer-Verlag, ISBN: 3-540-58108-1, pp. 191-204, 1994.
  2. M. Allam,"Data encryption performance based on Blowfish," 47th International Symposium ELMAR, Zadar, Croatia, 2005,pp. 131-134.
  3. K. Russell Meyers, and H. Ahmed Desoky, "An implementation of the Blowfish cryptosystem," Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, Sarajevo, Bosnia and Herzegovina, pp. 346-351, December 16-19, 2008.
  4. William Stallings, "Cryptography and Network Security", Third Edition, Pearson Education, 2003.
  5. G. N. Krishnamurthy, Ramaswamy, V, M. E. Ashalatha, "Performance Enhancement of Blowfish and CAST-128 Algorithms and Security of Improved Blowfish Algorithms Using Avelanche Effect",International Journal of Computer Science and Network Security,Vol. 8 No. 3, 2008.
  6. Bruce Schneier. The Blowfish Encryption Algorithm Retrieved October 25, 2008, http://www. schneier. com/blowfish. html
  7. S. Vaudenay, "On the Weak Keys in Blowfish," Fast Software Encryption, Third International Workshop Proceedings, Springer-Verlag, 1996, pp. 27-32.
Index Terms

Computer Science
Information Sciences

Keywords

Feistel Network Cryptanalysis Random Number Generator.