Preview

Blowfish Algorithm Term Paper

Powerful Essays
Open Document
Open Document
4970 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Blowfish Algorithm Term Paper
A
TERM
PAPER
ON

“Blowfish Encryption Algorithm“BLOWFISH ENCRYPTION ALGORITHM”

WRITTEN BY

NDIFON, PATRICK MANYOR
10/50050
COMPUTER SCIENCE
UNIVERSITY OF CALABAR

SUBMITTED TO

DR. F.U. OGBAN
COURSE LECTURER

IN PARTIAL FUFILMENT OF THE COURSE REQUIREMENT
CSC4211

SEPTEMBER 2014
TABLE OF

CContentsONTENTS
1. Introduction
2. Origin/Founder
3. Algorithm/Data Structures
4. Category/Performance:
5. Pseudocode
6. Implementation: C++, Java
7. Compare: Associated algorithm
8. Summarize
9. Conclusion
10. References

BLOWFISH ENCRYPTION ALGORITHM
General
Designers
Bruce Schneier
First published
1993
Successors
Twofish
Cipher detail
Key sizes
32–448 bits
Block sizes
64 bits
Structure
Feistel network
Rounds
16
Best public cryptanalysis
Four rounds of Blowfish are susceptible to a second-order differential attack (Rijmen, 1997);[1] for a class of weak keys, 14 rounds of Blowfish can be distinguished from a pseudorandom permutation (Vaudenay, 1996).

1. INTRODUCTION
The need for information security has resulted in many Encryption algorithms being developed. This term paper is aimed at analyzing one of those algorithms; the ‘Blowfish Encryption Algorithm’. What is an algorithm? One might ask. What is encryption? Before we can fully understand the ‘Blowfish Encryption Algorithm’, we must first understand briefly what ‘algorithm’ and ‘encryption’ mean.

a.) DEFINITION OF SOME BASIC TERMS “To make a computer do anything, you have to write a computer program. To write a computer program, you have to tell the computer, step by step, exactly what you want it to do. The computer then “executes” the program, following each step mechanically, to accomplish the end goal. When you are telling the computer what to do, you also get to choose how it’s going to do it. That’s where computer algorithms come in. The algorithm is the basic technique used to get the job done.”1
“In mathematics and computer science, an algorithm is a step-by-step procedure for calculations.



References: Four rounds of Blowfish are susceptible to a second-order differential attack (Rijmen, 1997);[1] for a class of weak keys, 14 rounds of Blowfish can be distinguished from a pseudorandom permutation (Vaudenay, 1996).

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Blowfish can be found in software categories ranging from e-commerce platforms for securing payments to password management tools, where it used to protect passwords. It’s definitely one of the more flexible encryption methods available.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    There was a time in history when the oceans were overly polluted with trash of various sorts. The water was so polluted and the food source for the ocean life was diminishing. This was the habitat of the blowfish. Their food became so scarce they began to eat the very things that were polluting the waters. The blowfish began to mutate with what they were eating. The Bottle Blowfish came to be from a mutation between a plastic bottle and its consumer, the blowfish.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Mantis Shrimp Facts

    • 76 Words
    • 1 Page

    Did you know that the mantis shrimp is the boxer of the sea. With the use of a hyperbolic porabola on the underside of its elbow, the peacock mantis shrimp can puch as fast as a 22 caliber bullet. It's punch can also create a cavitation bubble on impact, something you usually see with explosions under water.…

    • 76 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Up early, the surface of the water was like glass, I unloaded the fly rod and headed back to the water with the dogs. Knowing that the prolific Utah Chub was a major food source in the reservoir, I tied a bunch of white and gold streamers in the weeks leading up to departure. I tied one on and made a couple casts, still targeting stumps and their roots. Just as the fly neared shore, a cutthroat shot out from under the stump and grabbed my fly. Unfortunately, it was a short lived flight as the fish shook its head and gained its freedom.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Cray Fish Animal Behavior

    • 305 Words
    • 2 Pages

    We asked ourselves if the weight of the cray fish would affect the outcome of the winner or loser at all. To start off the experiment, we chose one really big cray fish that appeared to…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We determined the hit probability of a dart by throwing it onto a fixed target one hundred times.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Lionfish Research Paper

    • 1872 Words
    • 8 Pages

    Did you know that almost eighty percent of the fish living on a reef could be killed by a single fish that is only about the size of a human hand? This fish happens to be called the lionfish and is mostly known for its beautiful features and deadly poison. Lionfish are indigenous to the Pacific Ocean; however, they have recently invaded the Atlantic Ocean and are growing in population at an uncontrollable rate. Marine biologists and even everyday snorkelers fear the dangers of these fish and have even started taking the matters of getting rid of them into their own hands. On the other hand doctors, chefs, and even snorkelers consider lionfish to be very useful and entertaining. According to marine biologists, the…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Cherrylog Road

    • 799 Words
    • 4 Pages

    Dickey, J. (2011). Cherrylog road. In A. Booth and K. Mays (Eds.), The Norton introduction to…

    • 799 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cheater Case

    • 601 Words
    • 3 Pages

    here is to estimate the likelihood of a successful attack by the cheater. Use the worst-case cheater.…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The Fish

    • 629 Words
    • 3 Pages

    How is the fish characterized? Is it simply a weak victim because it “didn’t fight”? Comment on lines 65-76. In what sense has “victory filled up” the boat, given the fact the speaker finally let the fish go?…

    • 629 Words
    • 3 Pages
    Good Essays
  • Best Essays

    American Indian Conjuring

    • 3080 Words
    • 13 Pages

    Cited: Bagai, Eric. (n.d.). The secret of the bullet catch. Retrieved October 2, 2010, from…

    • 3080 Words
    • 13 Pages
    Best Essays
  • Better Essays

    Coonstriped shrimp is on the best choice with a 3.30 score. Even though it is branded as a best choice, catching the shrimp still wields a problem. The problem of catching the shrimp is that there is bycatch with every batch of shrimp caught.…

    • 1692 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    bar management

    • 34722 Words
    • 139 Pages

    References: Furman, Eric, Lou, Harry, and Karen Barbas. The Little Black Book of Shots and Shooters. 2005…

    • 34722 Words
    • 139 Pages
    Powerful Essays
  • Powerful Essays

    The easiest understanding of first speculative attacks was reflected in the so-called models of first generation. The description can be found in works of Krugman , Flood and Garber , Blanco and Garber and…

    • 2260 Words
    • 65 Pages
    Powerful Essays
  • Powerful Essays

    [6] J. Daemen, R. Govaerts, and J. Vandewalle, Weak keys for IDEA, Advances in Cryptology - Crypto '93, Springer-Verlag (1994), pp. 224-231…

    • 2451 Words
    • 10 Pages
    Powerful Essays