SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov – Dec. 2015), PP 24-30
www.iosrjournals.org
DOI: 10.9790/0661-17622430 www.iosrjournals.org 24 | Page
Simulated Analysis and Enhancement of Blowfish Algorithm
1
Rohan Kumar, 2
Rahul Thakkar, 3
Manoj Kumar
1,2,3
School of Computer Application Lovely Professional University
Abstract: This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses
on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for
encryption as well as decryption algorithms and also give the sufficient description of key generation, key
expansion, function and working principle of Blowfish cipher with proper explanations. Taking the current era,
Most of the famous systems which offer security for a network or web or to a data are vulnerability to attacks and
they are broken at some point of time by effective cryptanalysis methods, irrespective of its complex algorithmic
design. In the general, today’s cryptography world is bounded to an interpretive of following any one or multi
encryption scheme and that too for a single iteration on a single file only. This is evident in the maximum of the
encryption-decryption cases. It also describes the comparisons between older blowfish and enhances blowfish. It
also shows enhance Blowfish algorithm for encryption and decryption of data. It is also give the proper simulated
analysis of encryption and decryption time for different file formats using a windows application. It describe
feature of application and its process and efficiency as well as calculation of time and throughput.
Keywords: Cryptography, Function F1, Function F2, Enhance Blowfish Algorithm, Security, Encryption,
Decryption, AES, Feistal Cipher, Windows Application.
I. Introduction Of Cryptology
Cryptology the technique or methodology and science of protection or secret writing or reading and
sending of messages in encrypted form [1]. It works based on two main areas: cryptography and cryptanalysis.
Cryptography is basically related with converting data into some unreadable form to make them secure
and safe to attacks. Where the term cryptanalysis is related with breaking or decryption of code and messages
which are in coded form. Cryptanalysis is used to break cryptographic security systems and gain access to the
contents of encrypted messages, even if the cryptographic key is unknown [2].
II. Introduction To Cryptography
An encryption calculation assumes a critical part in securing the information in putting away or
exchanging it[1][9]. The file encryption techniques calculations are ordered into Symmetric (mystery) and
Asymmetric (open) keys encryption [3]. In Symmetric key encryption or mystery key encryption, one and only
key is utilized for both encryption and decoding of information. Information encryption standard (DES), Triple
DES, Advanced Encryption Standard (AES) and Blowfish Encryption Algorithm [1]. In open key encryptation
utilizes two keys, one for encryption and other for unscrambling RSA[4].
III. Existing Blowfish Encryption Algorithm
Blowfish was composed in 1993 by Bruce Scheier as an issue, option to current encryption algorithms
[1]. Blowfish is a balanced piece encryption calculation planned in thought with [5]:-
 fast: It encodes information on huge 32-bit chip at a rate of 26 clock cycles for each byte. [5]
 compact: It can run in under 5k of memory that is least memory correlation to other cipher[6].
 simple: It utilizes expansion, XOR, lookup table with 32-bit operands [7].
 secure: The key length of variable, it can be in the scope of 32bit to 448 bits: default length is 128 bits
key [3] [1].
 it is suitable for applications where the key does not change frequently, in the same way as
correspondence connection or a programmed record encryptor.
 unpatented and emine
 Blowfish provides a good encryption rate in software and no effective cryptanalysis of it has been
found to date [9].
 Schneir designed Blowfish as a general - purpose algo, intended as an alternative to the DES and free
of the problems and constraints associated with other algorithms [8].
 Blowfish is a Feistel block cipher with a 64 bits block size and a variable key size up to 448 bits long [5]
[10].
 It is consists of total 16 round process or functioning as well as DES or Feistel[11].
Simulated Analysis and Enhancement of Blowfish Algorithm
DOI: 10.9790/0661-17622430 www.iosrjournals.org 25 | Page
IV. Description Of Blowfish Algorithm
Blowfish symmetric square figure calculation encodes piece information of 64-bits in one time. It will
take after the feistel system and this calculation is separated into two sections [8].
1. Key-development: Blowfish is a Feistel system square figure with a 64 bits piece size and a vary key
size up to 448 bits long[8].the 448 bits limit is here to beyond any doubt that each bit of each sub-
key relies on upon each piece bit of the key.
2. Data-Encryption :It have a capacity to emphasize sixteen rounds of system. Each round comprises of a
key-subordinate change, and a key information subordinate alteration. All operations are XOR and
increases on 25
bits plain-text [5]. The main processes are four ordered exhibit information maintenance
tables for every round [8].
V. Key Expenssion
1. The initial 25
bits of the key are XOR with PA1.it is the initial 25
-bit enclose the P-array [6].
2. The second 25
bits of the key are XOR with PA2, as well as key are XOR until each of the 448, or less, keys
bits have been XOR [7].
3. By cycle the keys-bit by coming back to the start of the key, unless the whole P-exhibit has been XOR with
key-value [8]. The key, until the whole PA-show has been XOR.
VI. Blowfish Encryption And F1-Function
Blowfish algorithm is a Feistel structure network containing of sixteen rounds [5]. The input is a 26
-bits
data elements, X
Divide X into two 32-bit halves: XL, XR
For i = 1 to 16:
XL = XL XOR Pi
XR = (XL) XOR XR
Simulated Analysis and Enhancement of Blowfish Algorithm
DOI: 10.9790/0661-17622430 www.iosrjournals.org 26 | Page
Exchange XL and XR
Exchange XL and XR (and Undo the last-one swapping.)[11].
VII. Proposed Blowfish Algorithm
In the new introduced algorithm a file which has data is splits into desired number of parts according
user’s need and then after the crypto-graphical encryption phase is used. In order to get high reliability paper
defines more than one crypto scheme which really gives surety of more safety and reliability. It describe the
method that make difference between the cryptographic scheme by providing various keys for each encryption of
split files; key should be given correctly at the time of decryption for batter results. Using enhanced Blowfish
algorithm for Encrypt and Decrypt of data which gives as a better results both in terms of performance and as
well as safety. In enhancement of the algorithm we use another function F2 for more complexity to crystalize.
In order to crypto-graphical aspects, in order to enhance the functionality of the Blowfish algorithm it is
introduced to modify the F1-Function as F2-Function by taking the concepts of multithread.
VIII. Existing Function F1
The F1 function is: F1(XL) = ((S1,a + S2,b mod 232
) XOR S3,c) + S4,d mod 232
) [8].
Where a, b, c, d are four 8 bit quartered derived from XL. Decryption process is the same as encryption process,
except the P-arrays are used in opposite. It produced 32 bits.Ӊ is additional XOR 232
[8] [6].
F1= ( (S1[a] + S2[b] mod 232
) ^ S3[c] ) + S[d] mod 232
).
IX. Enhance Function F2
 Enhance F2-Function: Function F1 plays pivot role in the algorithm or design, and decided to modify
Function F1[12].
 Original function F1 is defined as follows [8][6].
F1= ( (S1[a] + S2[b] mod 232
) ^ S3[c] ) + S[d] mod 232
).
 Instead, modify the F1-Function by replacing two addition operators by two XOR Operators.
 Thus the modified F2-function is written as,
Simulated Analysis and Enhancement of Blowfish Algorithm
DOI: 10.9790/0661-17622430 www.iosrjournals.org 27 | Page
F2= ((S1 [a] ^ S2 [d] mod 232
) + (S3 [b]) ^ S[c] mod 232
)).
 This improvement increases the simultaneous process of two XOR operators [12]. In the original F1-
function it process in sorted order and it needs 25
Addition operations and 24
XOR operations [8]. But in
the modified F2-function it needs the same 48 gate operations 25
-XORs, 24
-additions but time taken to
processed these operations will be decrease because of multithreading process [12].
 Execution of 32 XOR operations in parallel order using threads and hence time taken to complete 16
gate operations will be equivalent to the time taken to complete 32 XOR operations since running it in
parallel environment [12].
 The remaining steps remain the same as that of Blowfish algorithm. The Enhance blowfish encryption
algorithm runs on the input plain text:-
F = ((S1 [a] XOR S2 [d] mod 232
) + (S3 [b]) XOR S[c] mod 232
)).
X. Enhance Feistal Structure
In advance and enhance feistal structure of Blowfish algorithm, there is used of two function F1 and F2.
Here F1 is the old function or the original one. Here first half of plain text is xor with p1or permutation box, and
then after F1 is come in action. After swapping of XL and XR xor with function key F2. This process in goes 16
rounds alternative move with F1 and F2. This movement makes plain text encryption more complex structure.
XI. Significant Of Enhance Blowfish
1. The process time of algorithm is approximately decreased compare with the original algorithm.
2. Here 2-XOR gates and 1-ADDITION are used but the original F1-function uses 2-ADDITIONs and 1-
XOR gate and there is no abrupt change in the execution time or clock cycles required for successful
Simulated Analysis and Enhancement of Blowfish Algorithm
DOI: 10.9790/0661-17622430 www.iosrjournals.org 28 | Page
execution. This is because all fundamental logical operations like AND, OR, XOR takes more or less
equal time when running or execution under any programming languages since those languages are
logically driven.
3. It’s complicated for the attacker to realize that the F1-function is modified and hence chances of attack
are less on comparing with the original algorithm [10].
4. Since introduced system bring changes only to the order of process and no changes is made to the actual
functionalities did not added or removed new operations just changed only the order of process of
previous XOR and Addition so doing cryptanalysis is not necessary [12].
5. Algorithm become for complex thus security improved.
6. Two symmetric F functions are used which are quite difficult to cryptanalyze.
XII. Simulated Analysis Of Blowfish Algorithm Using Windows Application
The all enhancement and significant of Blowfish algorithm are done using the windows application. This
application is basically developed in the C# language. The application is tested on the personal computer with
configuration Windows 8.1, 4GB RAM 64 bit system, 2.40 GHz processor. Significant of application is
following:-
1. We can select any type of file format to encrypt or decrypt.
2. This application is well define for encrypt as well as decrypt any type of file or any size.
3. It also able to do multiple encryptions i.e. if user wants to encrypt the already encrypted file, user can do
it very frequently.
4. We can decrypt a file as much times as we want.
5. Users select a file and then after user click on encryption or decryption button a new window is open to
save the file location.
6. Then after an input dialog of insert key is open. It consists of two key textbox for re-conformation of
key. In both condition encryption and decryption user need to give same key.
7. After successful insertion of key it will encrypt or decrypt a file within some second.
Simulated Analysis and Enhancement of Blowfish Algorithm
DOI: 10.9790/0661-17622430 www.iosrjournals.org 29 | Page
XIII. Performance Analysis Of Different File Format Using Blowfish Algorithm
Throughput of encryption and decryption is calculated as the total plain text and cypher text in KB and
time is calculated as the time that an encryption process takes time to produced cipher-text from plain-text and
decryption process takes to produced plain-text from cipher-text. It shows the efficiency in encryption and
decryption time. This application can take different file formats like pdf, text, image, docs, xls, ppts, zip, video
files in any range. The performance chat and table is design to show the encryption time, decryption time of
each file format individually.
The performance table is design to show the encryption time, decryption time of each file format individually.
Encryption and Decryption rate in MB/SEC
File Type Size Encryption Time Decryption Time
PDF 861KB 3.37 3.55
TXT 40KB 1.52 2.65
JPEG/BMP/JPG 144KB 1.40 1.55
PPT 877KB 1.26 1.22
XLS 71KB 1.80 1.35
ZIP 7KB 1.84 4.41
MP4 23591KB 1.93 1.40
DOC 50KB 1.98 1.31
XIV. Conclusions
Cryptology the technique or methodology and science of protection or secret writing or reading and
sending of messages in encrypted form. Blowfish is the symmetric block cipher, where simply one and only key
is utilized for encryption and unscrambling. Blowfish was composed in 1993 by Bruce Scheier as an issue, option
Fig. decryption window
Fig. Encryption window
Simulated Analysis and Enhancement of Blowfish Algorithm
DOI: 10.9790/0661-17622430 www.iosrjournals.org 30 | Page
to existing encryption calculations. the key length is variable ,it can be in the scope of 32bit to 448 bits: default
128 bits key length. It is Unregistered and eminence free. Blowfish is one of the quickest piece figures all in all
utilization, aside from when evolving keys. It also provides a batter data safety when transmitted over any
unsecure way. Attackers will not have any guesses about modification both in terms of algorithm. That is, it has a
good performance without compromising the security and the modified F2-function also improved the
performance by decreasing the rounds up to some percentages and decrease the processing time. Use of two
functions F1 and F2 make algorithm structure more complex for the attacker. Using of application user can easily
secure all types of file within some second. The complete simulated analysis is described and tries to make
algorithm more secure.
Reference
[1]. M. Anand Kumar and Dr. S. Karthikeyan Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI:
10.5815/ijcnis.2012.02.04.
[2]. Cryptography And Network Security-William Stallings.
[3]. Gurjeevan Singh, Ashwani Kumar, K. S. Sandha /International Journal of Engineering Research and Applications (IJERA) ISSN:
2248-9622
[4]. M. Anand Kumar and Dr.S.Karthikeyan I. J. Computer Network and Information Security, 2012, 2, 22-
[5]. Jasdeep Singh Bhalla, Preeti Nagrath International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013
ISSN 2250-3153
[6]. P. KarthigaiKumar, K.Baskaran,” An ASIC implementation of low power and high throughput blowfish crypto algorithm”,
Microelectronics Journal 41 (2010), pp.347–355.
[7]. Pratap et al., International Journal of Advanced Research in Computer Science and Software Engineering 2(9), September - 2012, pp.
196-201
[8]. Kevin Allison, Keith Feldman Ethan Mick Schneier, Bruce. "Description of a New Variable-Length Key, 64-Bit Block
Cipher(Blowfish)." Blowfish Paper. 1993. Web. 18 Mar. 2012.
[9]. Milind Mathur, Ayush Kesarwani Proceedings of National Conference on New Horizons in IT - NCNHIT 2013
[10]. Deepak Kumar Dakate, Pawan Dubey International Journal of Advanced Research in Computer Engineering & Technology Volume
1, Issue 4, June 2012
[11]. Afaf M. Ali Al-Neaimi, Rehab F. Hassan IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.3,
March 2011.
[12]. Chakarapani.k Journal of Theoretical and Applied Information Technology 31st
January 2012. Vol. 35 No.2

Más contenido relacionado

La actualidad más candente

PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...IJNSA Journal
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE Mohammed Abdul Lateef
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksIOSR Journals
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted dataSELASI OCANSEY
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationIRJET Journal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of commonIJNSA Journal
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database SecurityIRJET Journal
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersIJNSA Journal
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 

La actualidad más candente (20)

PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
PREDOMINANCE OF BLOWFISH OVER TRIPLE DATA ENCRYPTION STANDARD SYMMETRIC KEY A...
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
Unit 2
Unit 2Unit 2
Unit 2
 
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
DATA SECURITY WITH AES ENCRYPTION, ELLIPTIC CURVE ENCRYPTION AND SIGNATURE
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Encryption techniques
Encryption techniques Encryption techniques
Encryption techniques
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted data
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
Encryption
EncryptionEncryption
Encryption
 
An Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA ImplementationAn Efficient VLSI Architecture for AES and It's FPGA Implementation
An Efficient VLSI Architecture for AES and It's FPGA Implementation
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
Encryption
EncryptionEncryption
Encryption
 
Unit 4
Unit 4Unit 4
Unit 4
 
A performance evaluation of common
A performance evaluation of commonA performance evaluation of common
A performance evaluation of common
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block CiphersA Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 

Destacado

DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMijsrd.com
 
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsJohn Congdon
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGAnitin3940
 
Latest VLSI Project Titles 2015
Latest VLSI Project Titles 2015Latest VLSI Project Titles 2015
Latest VLSI Project Titles 2015musthafa01
 
Built-in Self Repair for SRAM Array using Redundancy
Built-in Self Repair for SRAM Array using RedundancyBuilt-in Self Repair for SRAM Array using Redundancy
Built-in Self Repair for SRAM Array using RedundancyIDES Editor
 
“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...
“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...
“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...iosrjce
 
Static-Noise-Margin Analysis of Modified 6T SRAM Cell during Read Operation
Static-Noise-Margin Analysis of Modified 6T SRAM Cell during Read OperationStatic-Noise-Margin Analysis of Modified 6T SRAM Cell during Read Operation
Static-Noise-Margin Analysis of Modified 6T SRAM Cell during Read Operationidescitation
 
A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...
A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...
A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...iosrjce
 
An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
A combined approach using triple des and blowfish
A combined approach using triple des and blowfishA combined approach using triple des and blowfish
A combined approach using triple des and blowfisheSAT Publishing House
 
Performance Comparison and Enhancement of Blowfish Algorithm
Performance Comparison and Enhancement of Blowfish AlgorithmPerformance Comparison and Enhancement of Blowfish Algorithm
Performance Comparison and Enhancement of Blowfish Algorithmeditor1knowledgecuddle
 

Destacado (14)

DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHMDATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
DATA SECURITY IN CLOUD USING BLOWFISH ALGORITHM
 
Encryption: It's For More Than Just Passwords
Encryption: It's For More Than Just PasswordsEncryption: It's For More Than Just Passwords
Encryption: It's For More Than Just Passwords
 
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
Latest VLSI Project Titles 2015
Latest VLSI Project Titles 2015Latest VLSI Project Titles 2015
Latest VLSI Project Titles 2015
 
Ramakrishnan_M
Ramakrishnan_MRamakrishnan_M
Ramakrishnan_M
 
Built-in Self Repair for SRAM Array using Redundancy
Built-in Self Repair for SRAM Array using RedundancyBuilt-in Self Repair for SRAM Array using Redundancy
Built-in Self Repair for SRAM Array using Redundancy
 
“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...
“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...
“Power and Temperature Analysis of 12T CMOS SRAM Designed With Short Channel ...
 
ME-Resume
ME-ResumeME-Resume
ME-Resume
 
C0211520
C0211520C0211520
C0211520
 
Static-Noise-Margin Analysis of Modified 6T SRAM Cell during Read Operation
Static-Noise-Margin Analysis of Modified 6T SRAM Cell during Read OperationStatic-Noise-Margin Analysis of Modified 6T SRAM Cell during Read Operation
Static-Noise-Margin Analysis of Modified 6T SRAM Cell during Read Operation
 
A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...
A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...
A Novel Low Power Energy Efficient SRAM Cell With Reduced Power Consumption u...
 
An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
A combined approach using triple des and blowfish
A combined approach using triple des and blowfishA combined approach using triple des and blowfish
A combined approach using triple des and blowfish
 
Performance Comparison and Enhancement of Blowfish Algorithm
Performance Comparison and Enhancement of Blowfish AlgorithmPerformance Comparison and Enhancement of Blowfish Algorithm
Performance Comparison and Enhancement of Blowfish Algorithm
 

Similar a Simulated Analysis and Enhancement of Blowfish Algorithm

A new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithmA new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithmTELKOMNIKA JOURNAL
 
PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1
PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1 PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1
PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1 IJCNCJournal
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithmsijsrd.com
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
New Lightweight Cryptographic Algorithm
New Lightweight Cryptographic AlgorithmNew Lightweight Cryptographic Algorithm
New Lightweight Cryptographic Algorithmarunkumar2949
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2IAEME Publication
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final pptAjay AJ
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportsakhi rehman
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET Journal
 
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyIAEME Publication
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
 
Java implementation and performance evaluation of some
Java implementation and performance evaluation of someJava implementation and performance evaluation of some
Java implementation and performance evaluation of someAlexander Decker
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 

Similar a Simulated Analysis and Enhancement of Blowfish Algorithm (20)

A new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithmA new multi-level key block cypher based on the Blowfish algorithm
A new multi-level key block cypher based on the Blowfish algorithm
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Js2517181724
Js2517181724Js2517181724
Js2517181724
 
PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1
PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1 PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1
PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
New Lightweight Cryptographic Algorithm
New Lightweight Cryptographic AlgorithmNew Lightweight Cryptographic Algorithm
New Lightweight Cryptographic Algorithm
 
Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2Analysing space complexity of various encryption algorithms 2
Analysing space complexity of various encryption algorithms 2
 
Blow fish final ppt
Blow fish final pptBlow fish final ppt
Blow fish final ppt
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
New modification on feistel DES algorithm based on multi-level keys
New modification on feistel DES algorithm based on  multi-level keys New modification on feistel DES algorithm based on  multi-level keys
New modification on feistel DES algorithm based on multi-level keys
 
Aes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_reportAes 128 192_256_bits_project_report
Aes 128 192_256_bits_project_report
 
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
IRJET-Block-Level Message Encryption for Secure Large File to Avoid De-Duplic...
 
Hardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technologyHardware implementation of the serpent block cipher using fpga technology
Hardware implementation of the serpent block cipher using fpga technology
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
 
Java implementation and performance evaluation of some
Java implementation and performance evaluation of someJava implementation and performance evaluation of some
Java implementation and performance evaluation of some
 
Introducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEAIntroducing an Encryption Algorithm based on IDEA
Introducing an Encryption Algorithm based on IDEA
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 

Más de iosrjce

Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 
Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...iosrjce
 

Más de iosrjce (20)

Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 
Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...
 

Último

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 

Último (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 

Simulated Analysis and Enhancement of Blowfish Algorithm

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov – Dec. 2015), PP 24-30 www.iosrjournals.org DOI: 10.9790/0661-17622430 www.iosrjournals.org 24 | Page Simulated Analysis and Enhancement of Blowfish Algorithm 1 Rohan Kumar, 2 Rahul Thakkar, 3 Manoj Kumar 1,2,3 School of Computer Application Lovely Professional University Abstract: This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for encryption as well as decryption algorithms and also give the sufficient description of key generation, key expansion, function and working principle of Blowfish cipher with proper explanations. Taking the current era, Most of the famous systems which offer security for a network or web or to a data are vulnerability to attacks and they are broken at some point of time by effective cryptanalysis methods, irrespective of its complex algorithmic design. In the general, today’s cryptography world is bounded to an interpretive of following any one or multi encryption scheme and that too for a single iteration on a single file only. This is evident in the maximum of the encryption-decryption cases. It also describes the comparisons between older blowfish and enhances blowfish. It also shows enhance Blowfish algorithm for encryption and decryption of data. It is also give the proper simulated analysis of encryption and decryption time for different file formats using a windows application. It describe feature of application and its process and efficiency as well as calculation of time and throughput. Keywords: Cryptography, Function F1, Function F2, Enhance Blowfish Algorithm, Security, Encryption, Decryption, AES, Feistal Cipher, Windows Application. I. Introduction Of Cryptology Cryptology the technique or methodology and science of protection or secret writing or reading and sending of messages in encrypted form [1]. It works based on two main areas: cryptography and cryptanalysis. Cryptography is basically related with converting data into some unreadable form to make them secure and safe to attacks. Where the term cryptanalysis is related with breaking or decryption of code and messages which are in coded form. Cryptanalysis is used to break cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown [2]. II. Introduction To Cryptography An encryption calculation assumes a critical part in securing the information in putting away or exchanging it[1][9]. The file encryption techniques calculations are ordered into Symmetric (mystery) and Asymmetric (open) keys encryption [3]. In Symmetric key encryption or mystery key encryption, one and only key is utilized for both encryption and decoding of information. Information encryption standard (DES), Triple DES, Advanced Encryption Standard (AES) and Blowfish Encryption Algorithm [1]. In open key encryptation utilizes two keys, one for encryption and other for unscrambling RSA[4]. III. Existing Blowfish Encryption Algorithm Blowfish was composed in 1993 by Bruce Scheier as an issue, option to current encryption algorithms [1]. Blowfish is a balanced piece encryption calculation planned in thought with [5]:-  fast: It encodes information on huge 32-bit chip at a rate of 26 clock cycles for each byte. [5]  compact: It can run in under 5k of memory that is least memory correlation to other cipher[6].  simple: It utilizes expansion, XOR, lookup table with 32-bit operands [7].  secure: The key length of variable, it can be in the scope of 32bit to 448 bits: default length is 128 bits key [3] [1].  it is suitable for applications where the key does not change frequently, in the same way as correspondence connection or a programmed record encryptor.  unpatented and emine  Blowfish provides a good encryption rate in software and no effective cryptanalysis of it has been found to date [9].  Schneir designed Blowfish as a general - purpose algo, intended as an alternative to the DES and free of the problems and constraints associated with other algorithms [8].  Blowfish is a Feistel block cipher with a 64 bits block size and a variable key size up to 448 bits long [5] [10].  It is consists of total 16 round process or functioning as well as DES or Feistel[11].
  • 2. Simulated Analysis and Enhancement of Blowfish Algorithm DOI: 10.9790/0661-17622430 www.iosrjournals.org 25 | Page IV. Description Of Blowfish Algorithm Blowfish symmetric square figure calculation encodes piece information of 64-bits in one time. It will take after the feistel system and this calculation is separated into two sections [8]. 1. Key-development: Blowfish is a Feistel system square figure with a 64 bits piece size and a vary key size up to 448 bits long[8].the 448 bits limit is here to beyond any doubt that each bit of each sub- key relies on upon each piece bit of the key. 2. Data-Encryption :It have a capacity to emphasize sixteen rounds of system. Each round comprises of a key-subordinate change, and a key information subordinate alteration. All operations are XOR and increases on 25 bits plain-text [5]. The main processes are four ordered exhibit information maintenance tables for every round [8]. V. Key Expenssion 1. The initial 25 bits of the key are XOR with PA1.it is the initial 25 -bit enclose the P-array [6]. 2. The second 25 bits of the key are XOR with PA2, as well as key are XOR until each of the 448, or less, keys bits have been XOR [7]. 3. By cycle the keys-bit by coming back to the start of the key, unless the whole P-exhibit has been XOR with key-value [8]. The key, until the whole PA-show has been XOR. VI. Blowfish Encryption And F1-Function Blowfish algorithm is a Feistel structure network containing of sixteen rounds [5]. The input is a 26 -bits data elements, X Divide X into two 32-bit halves: XL, XR For i = 1 to 16: XL = XL XOR Pi XR = (XL) XOR XR
  • 3. Simulated Analysis and Enhancement of Blowfish Algorithm DOI: 10.9790/0661-17622430 www.iosrjournals.org 26 | Page Exchange XL and XR Exchange XL and XR (and Undo the last-one swapping.)[11]. VII. Proposed Blowfish Algorithm In the new introduced algorithm a file which has data is splits into desired number of parts according user’s need and then after the crypto-graphical encryption phase is used. In order to get high reliability paper defines more than one crypto scheme which really gives surety of more safety and reliability. It describe the method that make difference between the cryptographic scheme by providing various keys for each encryption of split files; key should be given correctly at the time of decryption for batter results. Using enhanced Blowfish algorithm for Encrypt and Decrypt of data which gives as a better results both in terms of performance and as well as safety. In enhancement of the algorithm we use another function F2 for more complexity to crystalize. In order to crypto-graphical aspects, in order to enhance the functionality of the Blowfish algorithm it is introduced to modify the F1-Function as F2-Function by taking the concepts of multithread. VIII. Existing Function F1 The F1 function is: F1(XL) = ((S1,a + S2,b mod 232 ) XOR S3,c) + S4,d mod 232 ) [8]. Where a, b, c, d are four 8 bit quartered derived from XL. Decryption process is the same as encryption process, except the P-arrays are used in opposite. It produced 32 bits.Ӊ is additional XOR 232 [8] [6]. F1= ( (S1[a] + S2[b] mod 232 ) ^ S3[c] ) + S[d] mod 232 ). IX. Enhance Function F2  Enhance F2-Function: Function F1 plays pivot role in the algorithm or design, and decided to modify Function F1[12].  Original function F1 is defined as follows [8][6]. F1= ( (S1[a] + S2[b] mod 232 ) ^ S3[c] ) + S[d] mod 232 ).  Instead, modify the F1-Function by replacing two addition operators by two XOR Operators.  Thus the modified F2-function is written as,
  • 4. Simulated Analysis and Enhancement of Blowfish Algorithm DOI: 10.9790/0661-17622430 www.iosrjournals.org 27 | Page F2= ((S1 [a] ^ S2 [d] mod 232 ) + (S3 [b]) ^ S[c] mod 232 )).  This improvement increases the simultaneous process of two XOR operators [12]. In the original F1- function it process in sorted order and it needs 25 Addition operations and 24 XOR operations [8]. But in the modified F2-function it needs the same 48 gate operations 25 -XORs, 24 -additions but time taken to processed these operations will be decrease because of multithreading process [12].  Execution of 32 XOR operations in parallel order using threads and hence time taken to complete 16 gate operations will be equivalent to the time taken to complete 32 XOR operations since running it in parallel environment [12].  The remaining steps remain the same as that of Blowfish algorithm. The Enhance blowfish encryption algorithm runs on the input plain text:- F = ((S1 [a] XOR S2 [d] mod 232 ) + (S3 [b]) XOR S[c] mod 232 )). X. Enhance Feistal Structure In advance and enhance feistal structure of Blowfish algorithm, there is used of two function F1 and F2. Here F1 is the old function or the original one. Here first half of plain text is xor with p1or permutation box, and then after F1 is come in action. After swapping of XL and XR xor with function key F2. This process in goes 16 rounds alternative move with F1 and F2. This movement makes plain text encryption more complex structure. XI. Significant Of Enhance Blowfish 1. The process time of algorithm is approximately decreased compare with the original algorithm. 2. Here 2-XOR gates and 1-ADDITION are used but the original F1-function uses 2-ADDITIONs and 1- XOR gate and there is no abrupt change in the execution time or clock cycles required for successful
  • 5. Simulated Analysis and Enhancement of Blowfish Algorithm DOI: 10.9790/0661-17622430 www.iosrjournals.org 28 | Page execution. This is because all fundamental logical operations like AND, OR, XOR takes more or less equal time when running or execution under any programming languages since those languages are logically driven. 3. It’s complicated for the attacker to realize that the F1-function is modified and hence chances of attack are less on comparing with the original algorithm [10]. 4. Since introduced system bring changes only to the order of process and no changes is made to the actual functionalities did not added or removed new operations just changed only the order of process of previous XOR and Addition so doing cryptanalysis is not necessary [12]. 5. Algorithm become for complex thus security improved. 6. Two symmetric F functions are used which are quite difficult to cryptanalyze. XII. Simulated Analysis Of Blowfish Algorithm Using Windows Application The all enhancement and significant of Blowfish algorithm are done using the windows application. This application is basically developed in the C# language. The application is tested on the personal computer with configuration Windows 8.1, 4GB RAM 64 bit system, 2.40 GHz processor. Significant of application is following:- 1. We can select any type of file format to encrypt or decrypt. 2. This application is well define for encrypt as well as decrypt any type of file or any size. 3. It also able to do multiple encryptions i.e. if user wants to encrypt the already encrypted file, user can do it very frequently. 4. We can decrypt a file as much times as we want. 5. Users select a file and then after user click on encryption or decryption button a new window is open to save the file location. 6. Then after an input dialog of insert key is open. It consists of two key textbox for re-conformation of key. In both condition encryption and decryption user need to give same key. 7. After successful insertion of key it will encrypt or decrypt a file within some second.
  • 6. Simulated Analysis and Enhancement of Blowfish Algorithm DOI: 10.9790/0661-17622430 www.iosrjournals.org 29 | Page XIII. Performance Analysis Of Different File Format Using Blowfish Algorithm Throughput of encryption and decryption is calculated as the total plain text and cypher text in KB and time is calculated as the time that an encryption process takes time to produced cipher-text from plain-text and decryption process takes to produced plain-text from cipher-text. It shows the efficiency in encryption and decryption time. This application can take different file formats like pdf, text, image, docs, xls, ppts, zip, video files in any range. The performance chat and table is design to show the encryption time, decryption time of each file format individually. The performance table is design to show the encryption time, decryption time of each file format individually. Encryption and Decryption rate in MB/SEC File Type Size Encryption Time Decryption Time PDF 861KB 3.37 3.55 TXT 40KB 1.52 2.65 JPEG/BMP/JPG 144KB 1.40 1.55 PPT 877KB 1.26 1.22 XLS 71KB 1.80 1.35 ZIP 7KB 1.84 4.41 MP4 23591KB 1.93 1.40 DOC 50KB 1.98 1.31 XIV. Conclusions Cryptology the technique or methodology and science of protection or secret writing or reading and sending of messages in encrypted form. Blowfish is the symmetric block cipher, where simply one and only key is utilized for encryption and unscrambling. Blowfish was composed in 1993 by Bruce Scheier as an issue, option Fig. decryption window Fig. Encryption window
  • 7. Simulated Analysis and Enhancement of Blowfish Algorithm DOI: 10.9790/0661-17622430 www.iosrjournals.org 30 | Page to existing encryption calculations. the key length is variable ,it can be in the scope of 32bit to 448 bits: default 128 bits key length. It is Unregistered and eminence free. Blowfish is one of the quickest piece figures all in all utilization, aside from when evolving keys. It also provides a batter data safety when transmitted over any unsecure way. Attackers will not have any guesses about modification both in terms of algorithm. That is, it has a good performance without compromising the security and the modified F2-function also improved the performance by decreasing the rounds up to some percentages and decrease the processing time. Use of two functions F1 and F2 make algorithm structure more complex for the attacker. Using of application user can easily secure all types of file within some second. The complete simulated analysis is described and tries to make algorithm more secure. Reference [1]. M. Anand Kumar and Dr. S. Karthikeyan Published Online March 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcnis.2012.02.04. [2]. Cryptography And Network Security-William Stallings. [3]. Gurjeevan Singh, Ashwani Kumar, K. S. Sandha /International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 [4]. M. Anand Kumar and Dr.S.Karthikeyan I. J. Computer Network and Information Security, 2012, 2, 22- [5]. Jasdeep Singh Bhalla, Preeti Nagrath International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 ISSN 2250-3153 [6]. P. KarthigaiKumar, K.Baskaran,” An ASIC implementation of low power and high throughput blowfish crypto algorithm”, Microelectronics Journal 41 (2010), pp.347–355. [7]. Pratap et al., International Journal of Advanced Research in Computer Science and Software Engineering 2(9), September - 2012, pp. 196-201 [8]. Kevin Allison, Keith Feldman Ethan Mick Schneier, Bruce. "Description of a New Variable-Length Key, 64-Bit Block Cipher(Blowfish)." Blowfish Paper. 1993. Web. 18 Mar. 2012. [9]. Milind Mathur, Ayush Kesarwani Proceedings of National Conference on New Horizons in IT - NCNHIT 2013 [10]. Deepak Kumar Dakate, Pawan Dubey International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 [11]. Afaf M. Ali Al-Neaimi, Rehab F. Hassan IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.3, March 2011. [12]. Chakarapani.k Journal of Theoretical and Applied Information Technology 31st January 2012. Vol. 35 No.2