DocumentCode
2631914
Title
An Implementation of the Blowfish Cryptosystem
Author
Meyers, Russell K. ; Desoky, Ahmed H.
Author_Institution
Speed Sch. of Eng., Comput. Eng. & Comput. Sci. Dept., Univ. of Louisville, Louisville, KY
fYear
2008
fDate
16-19 Dec. 2008
Firstpage
346
Lastpage
351
Abstract
The Blowfish cryptosystem is a very fast and useful scheme, even though it was introduced over a decade ago. This cryptosystem consists of two parts, a subkey and S-box generation phase, and an encrypiton phase. A short introduction to both algorithms are given, along with a few notes about the Ciphertext Block Chaining (CBC) mode. Some general information about attacks are explained, along with information about some of the people who have worked to analyze and attempt to break Blowfish. An implementation of a Windows tool for encrypting files which uses Blowfish is also examined in this paper. The results of the encryption tool clearly demonstrate how fast the encryption is compared to the subkey and S-box generation. The secrecy of the cryptosystem is explained by using several test files of different types, as well as a study of the security with respect to the number of rounds. Finally, some possible extensions to the software tool to improve its usefulness based on the strength of Blowfish are given.
Keywords
cryptography; Blowfish cryptosystem; ciphertext block chaining mode; encrypiton phase; s-box generation phase; subkey generation phase; Algorithm design and analysis; Application software; Computer science; Cryptography; Information analysis; Microprocessors; Security; Software tools; Table lookup; Testing;
fLanguage
English
Publisher
ieee
Conference_Titel
Signal Processing and Information Technology, 2008. ISSPIT 2008. IEEE International Symposium on
Conference_Location
Sarajevo
Print_ISBN
978-1-4244-3554-8
Electronic_ISBN
978-1-4244-3555-5
Type
conf
DOI
10.1109/ISSPIT.2008.4775664
Filename
4775664
Link To Document