Comparisons of Blowfish and Cast-128 Algorithms As Per Their Cryptography Strength and Encryption
Total Page:16
File Type:pdf, Size:1020Kb
COMPARISONS OF BLOWFISH AND CAST-128 ALGORITHMS AS PER THEIR CRYPTOGRAPHY STRENGTH AND ENCRYPTION 1HIRAL DESAI, 2SALOT PINAL, 3FIRDOS SHEIKH ALAM 1,2,3Pacific School of Engineering E-mail:1 [email protected], 2 [email protected], [email protected] Abstract— Rapid growth of internet required the need for securing information from eavesdropper or attacker. Encryption algorithms pay vital role to secure information. Encryption algorithms involve the process of converting plaintext to cipher text(unreadable text) with using different key size. This paper demonstrates the introduction of well known symmetric ciphers Blowfish and cast-128 also provide the security and performance analysis of blowfish and cast-128 algorithms as per key size, Cryptography strength and the function that is use in blowfish and cast-128 algorithms. Index Terms— Cipher Text, Eavesdropper, Encryption Algorithm, Plaintext, Key, Cryptographic Strength. I. INTRODUCTION II. DETAIL FEISTEL STRUCTURE OF BLOWFISH AND CAST-128 ALGORITHMS Cryptography is the art and science of protecting information from unwanted person and converting Figure 2.1.1 Shows the structure of Blowfish it into a form undistinguishable by its attackers algorithm and Figure 2.2.1 shows the Sructure of though stored and transmitted. The main aim of Cast-128 algorithm. cryptography is keeping data secure form unauthorized persons. Data cryptography mostly is 2.1. Blowfish Encryption the scramble of the content of data, such as text The plaintext is divided into two 32-bit halves LE0 data, image related data and audio, video related and E0. data to compose the data illegible, imperceptible or Encryption Side:- unintelligible during communication or storage LE1= RE0 ⊕ F(LE0,P1) called Encryption process. The reverse of data RE1= LEO ⊕ P1 encryption process is called data Decryption. LE1= REO ⊕ F(RE1) Cryptography provides a number of security goals For i=1 to 16 round do to avoid a security issue. Due to security REi=LEi-1 ⊕ Pi advantages of cryptography it is widely used today. LEi=REi-1 ⊕ F(REi) LE17=RE16 ⊕ P18 Blowfish is a symmetric block cipher developed by RE17=LE16 ⊕ P17 bruce schneier in1993.Blowfish uses a feistel Blowfish uses two primitive operations: structure. It encrypts 64-bit blocks of plaintext. 1) Addition : Addition of words, denoted by +, Blowfish makes use of key 14 32-bit key.(14*32=448 2) Bitwise exclusive-OR : This operation is denoted bit).That key is used to generate 18 32-bit by ⊕. subkeys(18*32=576 bit).Blowfish takes 16 round.The The 32-bit input to F is divided into 4 byte. keys are stored in a K array k1,k2….kj (1,2,….14). 4 S-Box is used each takes 8 bit as a input and gives 32 The sub keys are stored in the P array bit output.Thus each round includes the complex use :P1,p2,….p18.There are four S-boxes used in blowfish of XOR plus substitution using S-boxes. each with 256 32-bit entries. Total S-Box and P-array entry is 256*4=1024 So, 1024+18=1042 32-bit entry. CAST algorithms are introduce by Carlise Adams and Stafford Tavares. CAS-128 is a Symmetric encryption algorithm. CAST-128 uses a Feistel structure.64 bit block is input to the algorithm. Key size between 40 to 128 bits, in 8-bit increments(40,48,56,64…120,128).CAST-128 uses 12 or 16 round .For key size up to and including 80 bits , the algorithm uses 12 rounds instead of 16. For key sizes greater than 80 bits, the algorithm uses the full 16 round. Figure 2.1.1 : Structure of Blowfish encryption Proceedings of 7th IRF International Conference, 30th October 2015, Hyderabad, India, ISBN: 978-93-85832-30-7 37 Comparisons of Blowfish and Cast-128 Algorithms as Per Their Cryptography Strength and Encryption 2.2. CAST-128 Encryption Table 3.1 describe the security features of Blowfish algorithm and Table 3.2 describe the security features of CAST-128 algorithm. Table 3.1 Figure 2.2.1 : Structure of CAST-128 encryption Figure 2.2.1 shows the structure of cast-128.Split the plaintext into left and right 32-bit halves. Compute 16 pairs of subkeys (kmi,kri) from K. .Four S-Box is used each takes 8 bit as a input and gives 32 bit output. The Function of S-box F consist modular addition and subtraction and XOR operations. F is of Type 1, Type 2, or Type 3, depending on i. Exchange final L16 and R16 and concate result to produce final cipher text. Encryption Side: L1 = R0 Table 3.2 R1 = L0 ⊕ F(R0,kmi,kri) IV. COMPARISION OF ENCRYPTION TIME For i=1 to 16 round OF BLOWFISH AND CAST-128 Li = Ri-1 ALGORITHMS Ri = Li-1 ⊕ F(Ri-1,kmi,kri) If you are using Word, use either the Microsoft III. COMPARISION OF FIESTEL STRUCTURE Equation Editor or the MathType add-on OF BLOWFISH AND CAST-128 ALGORITHMS (http://www.mathtype.com) for equations in your paper (Insert | Object | Create New | Microsoft Blowfish and CAST-128 both algorithms are uses a Equation or MathType Equation). “Float over text” feistel structure,But have some different operations. should not be selected. Proceedings of 7th IRF International Conference, 30th October 2015, Hyderabad, India, ISBN: 978-93-85832-30-7 38 Comparisons of Blowfish and Cast-128 Algorithms as Per Their Cryptography Strength and Encryption V. UNITS The sentence punctuation follows the brackets [2]. Multiple references [2], [3] are each numbered with Use either SI (MKS) or CGS as primary units. (SI separate brackets [1]–[3]. When citing a section in a units are strongly encouraged.) English units may be book, please give the relevant page numbers [2]. In used as secondary units (in parentheses). This applies sentences, refer simply to the reference number, as in to papers in data storage. For example, write “15 [3]. Do not use “Ref. [3]” or “reference [3]” except at Gb/cm2 (100 Gb/in2).” An exception is when English the beginning of a sentence: “Reference [3] shows ... .” units are used as identifiers in trade, such as “3½ in Number footnotes separately in superscripts (Insert | disk drive.” Avoid combining SI and CGS units, such Footnote). Place the actual footnote at the bottom of as current in amperes and magnetic field in oversteps. the column in which it is cited; do not put footnotes in This often leads to confusion because equations do not the reference list (endnotes). Use letters for table balance dimensionally. If you must use mixed units, footnotes (see Table I). clearly state the units for each quantity in an equation. Please note that the references at the end of this The SI unit for magnetic field strength H is A/m. document are in the preferred referencing style. Give However, if you wish to use units of T, either refer to all authors’ names; do not use “et al.” unless there are magnetic flux density B or magnetic field strength six authors or more. Use a space after authors' initials. symbolized as µ0H. Use the center dot to separate Papers that have not been published should be cited as compound units, e.g., “A·m2.” “unpublished” [4]. Papers that have been submitted for publication should be cited as “submitted for VI. HELPFUL HINTS publication” [5]. Papers that have been accepted for publication, but not yet specified for an issue should be A. Figures and Tables cited as “to be published” [6]. Please give affiliations Because the final formatting of your paper is limited in and addresses for private communications [7]. scale, you need to position figures and tables at the top and bottom of each column. Large figures and tables C. Abbreviations and Acronyms may span both columns. Place figure captions below Define abbreviations and acronyms the first time they the figures; place table titles above the tables. If your are used in the text, even after they have already been figure has two parts, include the labels “(a)” and “(b)” defined in the abstract. Abbreviations such as SI, ac, as part of the artwork. Please verify that the figures and dc do not have to be defined. Abbreviations that and tables you mention in the text actually exist. Do incorporate periods should not have spaces: write not put borders around the outside of your figures. “C.N.R.S.,” not “C. N. R. S.” Do not use abbreviations Use the abbreviation “Fig.” even at the beginning of a in the title unless they are unavoidable (for example, sentence. Do not abbreviate “Table.” Tables are “INTERNATIONAL JOURNAL OF ENGINEERING numbered with Roman numerals. AND INNOVATIVE TECHNOLOGY” in the title of Include a note with your final paper indicating that this article). you request color printing. Do not use color unless it is necessary for the proper interpretation of your D. Equations figures. There is an additional charge for color Number equations consecutively with equation printing. numbers in parentheses flush with the right margin, as Figure axis labels are often a source of confusion. Use in (1). First use the equation editor to create the words rather than symbols. As an example, write the equation. Then select the “Equation” markup style. quantity “Magnetization,” or “Magnetization M,” not Press the tab key and write the equation number in just “M.” Put units in parentheses. Do not label axes parentheses. To make your equations more compact, only with units. As in Fig. 1, for example, write you may use the solidus ( / ), the exp function, or 1 “Magnetization (A/m)” or “Magnetization (A m ),” appropriate exponents. Use parentheses to avoid not just “A/m.” Do not label axes with a ratio of ambiguities in denominators.