Blowfish Algorithm

1514 Words7 Pages

Blowfish Symmetric Key Encryption Algorithm

Shraphalya B. Nalawade
Department of Electronics and Telecommunication NBN Sinhgad School of Engineering,
Savitribai Phule Pune University
Pune, India shraphalya.nalwade@gmail.com Dhanashri H. Gawali
Department of Electronics and Telecommunication
NBN Sinhgad School of Engineering,
Savitribai Phule Pune University
Pune, India dhanashree.gawali@gmail.com Abstract— Security is a primary concern for every communication system. There are many ways to provide security that is being communicated. One method to ensure security is the use of cryptographic algorithms like DES, AES, RC5, Blowfish etc. Cryptography is a method used for encoding the data which is being hacked by the unauthorized person. In this paper Blowfish algorithm is designed using VHDL (Very High Speed Integrated Circuit Hardware Description Language) programming language and simulated using Xilinx ISE 14.5 design suite. The Virtex-5 XC5VLX50T device used for synthesis of Blowfish algorithm. The simulation results show the minimum utilization of device resources.

Keywords—Cryptography; Symmetric and Asymmetric key Cryptography; Blowfish algorithm; VHDL; …show more content…

Cryptography is simply nothing but study of secret. Encryption refers to the transformation of data in “plain text” form into a form called “cipher text,” which is nothing but readable data is converted into unreadable form. Decryption refers to the transformation of data in “cipher text” form into a form called “plain text” which is nothing but unreadable data into readable or original form. The process of encryption and decryption depends on the key which is important part of

Open Document