Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Information Security has been most important issue in data communication. Any loss or threat to information can prove to be big loss to the organization. Encryption technique plays an important role in information security systems. Information security area there are many cryptography algorithm is available and comparison has been made on the basis on these parameters: rounds block size; key size; and encryption / decryption time; CPU process time in the form of throughput and power consumption. These results show that blowfish is better than other algorithm. Blowfish is more secure and fast computing algorithm. But there is some problem in the existing Blowfish algorithm.blowfish weak keys generates bad S-boxes; Since Blowfishs S-boxes are key dependent. There is a chosen plaintext attack against a reduced-round variant of blowfish algorithm that is made easier by the use of weak key. in this report proposed a new approach to increase the robust of blowfish algorithm and solve the weakness of sub key by generate strongest a cryptographic randomness keys and used in blowfishs S- boxes stages. The proposed algorithm the secret key changes frequently by using randomness fuzzy value which are derived by different fuzzy set of condition after modify algorithm apply encryption and decryption on image and also Modified the F function operation to use of Multithreading to improve the Execution time and improve the Security by the new key generation approach.

Keywords: Cryptography, Blowfish Algorithm, Fuzzy Logic, Fuzzification, Defuzzification

Edition: Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Share this Article

How to Cite this Article?

Maulik P. Chaudhari, Neha Parmar, "Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014478, Volume 3 Issue 6, June 2014, 1525 - 1529

42 PDF Views | 39 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2701 - 2704

Review on Self Organized Trust Model for Distributed Systems

Suyog Ashokrao Nagare

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this Article

Similar Articles with Keyword 'Blowfish Algorithm'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1106 - 1110

Enhancing Data Security of Data on Rest in Cloud using RSA and BLOWFISH Algorithm

Gurbind Kaur, Bikramjeet Singh Bumrah

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S, Gowrishankar S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1289 - 1291

Cryptography in Image Using Blowfish Algorithm

S. S. Sudha, S. Divya

Share this Article

Similar Articles with Keyword 'Fuzzy Logic'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1838 - 1842

Predicting and Extending of Sensor Lifetime in Wireless Sensor Networks using Fuzzy Logic

Pawan Kumar, Manoj Challa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 491 - 492

A Novel Study on Complex Fuzzy Logic

K Rajesh, D. Rajeswara Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1831 - 1834

Comparison of Cluster Formation Algorithms Based On Fuzzy Logic Rules

Swati Atri, Dr. Nasib Singh Gill, Jaideep Atri

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 851 - 854

Facial Expression Recognition Using Fuzzy Logic

Sanjay Singh Pal, Muzammil Hasan

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 3001 - 3006

A Fuzzy Based Approach of Energy Efficient Hierarchical Clustering Method in Wireless Sensor Networks

G S M Vamsi, Neha Choubey

Share this Article

Similar Articles with Keyword 'Fuzzification'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1498 - 1500

Building Fuzzy Associative Classifier Using Fuzzy Values

P. Kayal, S. Kannan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 868 - 872

Identification of Gait Disorders Using Fuzzy Expert System

Dr. M. Pushparani, B. Kalaivani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 355 - 358

Improved Scene Text Recognition Using Fuzzy Based Method

Anju Maria Babu, Radhika K. T

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1173 - 1177

Prevention of Post-Operative Wound Infection in Accordance with Evidence Based Practice

Archana Maurya, Seema Mendhe

Share this Article

Similar Articles with Keyword 'Defuzzification'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Informative Article, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 868 - 872

Identification of Gait Disorders Using Fuzzy Expert System

Dr. M. Pushparani, B. Kalaivani

Share this Article
Top