EXISTING

WORKS: 3 PAGES

CONCEPT,

PROS AND CONS IN THE EXISTING WORK,

1. Title: The design and implementation of passwords management system based on blowfish cryptographic algorithm

CITATION:

Wang, M. and

Que, Y., 2009, December. The design and implementation of passwords management

system based on blowfish cryptographic algorithm. In Computer

Science-Technology and Applications, 2009. IFCSTA’09. International Forum on (Vol.

2, pp. 24-28). IEEE.

In

this modern era, particularly all over the Internet, it is easy to find that we

have a ton of username and secret key sets to be stored and to be remembered to

store in confidential data, and the measure of information is extending day by

day. They are in excessive number for us to recollect and it is also dangerous

to record them on a scratch pad/hardcopy. To tackle this issue, the author has

designed and implemented a unique Password Management System (PMS) which can

easily deal with storing usernames and passwords on various websites for the

clients. The client can save the pairs safely and productively with full

reliability using this unique system. This core and the basic strength of this

system lie in the Blowfish Algorithm. This algorithm was designed and unfolded

by Bruce Schneier in 1993. It is essentially a symmetric piece figure.

In

this paper we have come across a lot of affirmative aspects of the algorithm,

this algorithm is secured than many other cryptographic calculations and method

s. This so because as it helps in resisting any plausibility of digital

assault, which is it’s exceptionally attractive property. Additionally ,

because of the variable key size used which between 122 to 448 bits helps it to

be highly secured than other algorithms. This algorithm is immune against differential related-key

assaults, since the entire ace key includes many round keys that are

particularly free, making such assaults exceptionally confused or infeasible.

Such self-sufficiency is very fortunate.

Further,

the Password Management System(PMS) created here is rapid in terms of getting

the stored information because of the use of this algorithm. As this algorithm

is quick and practicable for the use on different platforms therefore it has

favourable chances of being used in every field of data security. The information

in the storehouse of PMS is secured in form of “cipher text” which is

the reason it can’t be scrutinized by some other client. Presently, if the

client/watcher needs to utilize the database or the put away information he/she

need to specify or pass the legitimate distinguishing proof which in this

manner influences the structure to be secure and reliable. This is conceivable

in light of the fact that the system has been produced utilizing the blowfish

calculation and is a fundamental use of this calculation.

The

framework is mainly versatile as it is reached out to the Internet with the

assistance of web administrations. Additionally the fundamental calculation

utilized here is likewise adaptable due to high encryption rate, direct memory

utilization, high computational proficiency and fulfilling equipment

exhibitions. Additionally, the framework that is created/invented can be used

as a working model for various embedded systems required nowadays.

The

system utilized utilizations a variable size key of 64 bits to 448 bits and the

limited the key line to be in various of 32 bits which is the reason the

calculation versatile and furthermore it’s made/created structure.

There

are many disadvantages of using this algorithm but there are many disadvantages

too.1Vulnerable to cyber attack: The

framework has been created utilizing the blowfish calculation which contain few

classes having powerless keys. Precisely, the 4 rounds of the calculation which

are exposed to second request differential assaults. Along these lines, the

framework is powerless against assaults as a result of the extensive no. of

frail keys.2 Key Length: The

key size utilized for encoding ought to be numerous of 32 bits. 3 Memory

utilization: The memory utilized by the netowork for protection is substantial,

which makes an impediment of this network.

2. Title: New Encryption Standard and Particular Case of Blowfish Algorithm

CITATION:

Maganty, C.S. and Prasanthi, K.S., 2013. New Encryption Standard and Particular

Case of Blowfish Algorithm. IJECCE, 4(1), pp.107-112.

The basic piece of information to be protected today, majority of the elements bargains of the encoding calculation, which guarantees the present creating web and network applications. These calculations are catsed-off from numerous points of view, for example, they are utilized to secure the data in remote frameworks against the noxious ambushes. In any case, securing the data isn’t free of cost, so as here, if the securing of information requires the utilization of a few resources, for example, C.P.U time, Memory use, Battery control, time required for encryption, and so forth. The creator proposes a fresh out of the plastic new a piece figure which utilizes a variable size mystery key, and this square is called as Blowfish. It is fundamentally a Feistel arrange, which rehashes the essential encryption process 16 times. The span of the piece is 64 bits in length, with a variable size key which can be the length of 448 bits. On the off chance that we examine the current conditions and states of the information to be protected, our fundamental concentration and additionally the want is to replace the protection factor that confines the effect of Cryptanalysis being done on Blowfish figuring. The work proposed by the writer bargains of extensive measure of effort and an improvable perspective on security over the across the board framework and its applications. Despite the way that there is a confounding presentation arrange required before any encryption can happen, the genuine encryption of data is greatly compelling on significant chip. The creator has examined the Requirements for a standard encryption figuring. Test resultsproved that the blowfish calculation is more suitable for remote systems with secure and dependable data transmission. The creator centers to make it supportive for structures having slightest course of action by decreasing the no of bits in plain content and in addition the key.

Function F:

The proposed function F:

THE PROPOSED ALGORITHM IN IT AS SHOWN

BELOW:

There are many advantages of using this

algorithm which as follows: 1 Enhanced Security: The security level of the

proposed blowfish calculation is superior to the regular blowfish calculation

on the grounds that the proposed work- does not produce all the 18 sub keys,

rather create just 1 key of 64 bits long for each four rounds and the first key changes with left roundabout

move of 5,7,9,11 and 13 bits for each 4 rounds. Subsequently, here is no

possibility of redundancy of sub-keys, upgrading the security of the

calculation. 2Lessened Vulnerability to assault:It is predominantly observed

that the programmers assault the frameworks, or frameworks with extensive piece

estimate are more pruned to assaults. So here, we have diminished the piece

size of the plain content to 32 bits from 64 bits, expanding the unwavering

quality of the framework. 3Decreased key size:The lessening in square size of

plain content additionally influences the key size. What’s more, subsequently

the key size is lessened to 16 bit from 32 bits display in regular calculation.