Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014
Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Information Security has been most important issue in data communication. Any loss or threat to information can prove to be big loss to the organization. Encryption technique plays an important role in information security systems. Information security area there are many cryptography algorithm is available and comparison has been made on the basis on these parameters: rounds block size; key size; and encryption / decryption time; CPU process time in the form of throughput and power consumption. These results show that blowfish is better than other algorithm. Blowfish is more secure and fast computing algorithm. But there is some problem in the existing Blowfish algorithm.blowfish weak keys generates bad S-boxes; Since Blowfishs S-boxes are key dependent. There is a chosen plaintext attack against a reduced-round variant of blowfish algorithm that is made easier by the use of weak key. in this report proposed a new approach to increase the robust of blowfish algorithm and solve the weakness of sub key by generate strongest a cryptographic randomness keys and used in blowfishs S- boxes stages. The proposed algorithm the secret key changes frequently by using randomness fuzzy value which are derived by different fuzzy set of condition after modify algorithm apply encryption and decryption on image and also Modified the F function operation to use of Multithreading to improve the Execution time and improve the Security by the new key generation approach.
Keywords: Cryptography, Blowfish Algorithm, Fuzzy Logic, Fuzzification, Defuzzification
Edition: Volume 3 Issue 6, June 2014
Pages: 1525 - 1529
How to Cite this Article?
Maulik P. Chaudhari, Neha Parmar, "Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014478, Volume 3 Issue 6, June 2014, 1525 - 1529
111 PDF Views | 85 PDF Downloads
Similar Articles with Keyword 'Cryptography'
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Similar Articles with Keyword 'Blowfish Algorithm'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1833 - 1838Study of Secure Fault Tolerant Routing Protocol for IoT
Chaithra.S, Gowrishankar S
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 356 - 358A Survey on Securing IOT Based Devices Using Cryptanalysis
Saumya Priya
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 1289 - 1291Cryptography in Image Using Blowfish Algorithm
S. S. Sudha, S. Divya
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015
Pages: 1106 - 1110Enhancing Data Security of Data on Rest in Cloud using RSA and BLOWFISH Algorithm
Gurbind Kaur, Bikramjeet Singh Bumrah
Similar Articles with Keyword 'Fuzzy Logic'
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1772 - 1776A Survey on Facilitating Document Annotation Techniques
Priyanka C. Ghegade, Vinod S. Wadne
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1838 - 1842Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic
Pawan Kumar, Manoj Challa
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 956 - 959Fuzzy Expert System for Migraine Analysis and Diagnosis
Vishal Chandra
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1831 - 1834Comparison of Cluster Formation Algorithms Based On Fuzzy Logic Rules
Swati Atri, Dr. Nasib Singh Gill, Jaideep Atri
Similar Articles with Keyword 'Fuzzification'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1173 - 1177Prevention of Post-Operative Wound Infection in Accordance with Evidence Based Practice
Archana Maurya, Seema Mendhe
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1498 - 1500Building Fuzzy Associative Classifier Using Fuzzy Values
P. Kayal, S. Kannan
Informative Article, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 868 - 872Identification of Gait Disorders Using Fuzzy Expert System
Dr. M. Pushparani, B. Kalaivani
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1077 - 1083Data Mining Application in Diabetes Diagnosis using Biomedical Records of Pathological Attribute
Naila, Anuradha Sharma
Similar Articles with Keyword 'Defuzzification'
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar
Informative Article, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 868 - 872Identification of Gait Disorders Using Fuzzy Expert System
Dr. M. Pushparani, B. Kalaivani