Blowfish Algorithm in computer science.pptx

baxodirbaxramov2008 6 views 23 slides Apr 14, 2025
Slide 1
Slide 1 of 23
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23

About This Presentation

This is full presetation about blowfish algorithm


Slide Content

Blowfish Algorithm Made by Boxo

Group members Abdusaid Idea(Which algorithm) Baxodir Presentation Sayyora Research

Plan History What is it? Encryption End Decryption

Let’s Go So

History Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.

About

Understanding

The algorithm consists of two parts A key expansion part A Data encryption part 01 02

01 A Key- Expansion part

A Key Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes.

02 A Data- Encryption Part

Encryption 01 Decryption 02

01 Encyption

Encryption Algorithm The input is a 64-bit data element, x. Divide x into two 32-bit halves xL, xR For i 1 to 16 xL xL XOR Pi xR F(xL) XOR xR Swap xL and xR Swap xL and xR (Undo the last swap.)

Encryption Algorithm(2) xR xR XOR P17 xL xL XOR P18 Recombine xL and xR Function F Divide xL into four eight-bit quarters a, b, c, and d F(xL) ((S1,a S2,b mod 232) XOR S3,c) S4, d mod 232

02 Decryption Algorithm

Decryption Algorithm Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order.

Cryptanalysis of Blowfish

Cryptanalysis of Blowfish In 1996, Serge Vaudenay found a known-plaintext attack requiring 28r 1 known plaintexts to break, where r is the number of rounds. Moreover, he also found a class of weak keys that can be detected and broken by the same attack with only 28+1 known plaint exts. This attack cannot be used against the full 16-round Blowfish

Conclusion Encryption helps to protect sensitive information from unauthorized access, theft and other security threats . Encrypting data ensures that even if it falls into the wrong hands, it cannot be easily read or understood. It is an essential step for businesses, organizations and individuals to take to protect their data and maintain their privacy. All we have to use it for our security!

Source Google search Google images
Tags