Group members Abdusaid Idea(Which algorithm) Baxodir Presentation Sayyora Research
Plan History What is it? Encryption End Decryption
Let’s Go So
History Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products.
About
Understanding
The algorithm consists of two parts A key expansion part A Data encryption part 01 02
01 A Key- Expansion part
A Key Key expansion converts a key of at most 448 bits into several subkey arrays totaling 4168 bytes.
02 A Data- Encryption Part
Encryption 01 Decryption 02
01 Encyption
Encryption Algorithm The input is a 64-bit data element, x. Divide x into two 32-bit halves xL, xR For i 1 to 16 xL xL XOR Pi xR F(xL) XOR xR Swap xL and xR Swap xL and xR (Undo the last swap.)
Encryption Algorithm(2) xR xR XOR P17 xL xL XOR P18 Recombine xL and xR Function F Divide xL into four eight-bit quarters a, b, c, and d F(xL) ((S1,a S2,b mod 232) XOR S3,c) S4, d mod 232
02 Decryption Algorithm
Decryption Algorithm Decryption is exactly the same as encryption, except that P1, P2,..., P18 are used in the reverse order.
Cryptanalysis of Blowfish
Cryptanalysis of Blowfish In 1996, Serge Vaudenay found a known-plaintext attack requiring 28r 1 known plaintexts to break, where r is the number of rounds. Moreover, he also found a class of weak keys that can be detected and broken by the same attack with only 28+1 known plaint exts. This attack cannot be used against the full 16-round Blowfish
Conclusion Encryption helps to protect sensitive information from unauthorized access, theft and other security threats . Encrypting data ensures that even if it falls into the wrong hands, it cannot be easily read or understood. It is an essential step for businesses, organizations and individuals to take to protect their data and maintain their privacy. All we have to use it for our security!