Blowfish Technology
Abstract
The security concerns are always at the higher priveledges in the field of IT & Computers. Also maintaining the security is rather a cumbersome job. Cryptography provides the tools for having some kind of security aspects. Encryption Technologies are the part of the Cryptography. Though many different algorithms and implementations exist to obtain the cipher text , the ones presented here are considered as standards because they have been extensively reviewed by the internet community worldwide. Still some questions to strike the mind with available algorithms like which one to use? which one is better? What should be the criteria to study those algorithms? Generally Speed and the Key-length are the prime issues in to be taken care of for the Encryption algorithms. Blowfish a new secret-key block cipher having maximum speed and longer key length. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors. Seminar covers the detail introduction to fascinating features about ‘Blowfish Algorithm’.
www.rssbol.com
No comments:
Post a Comment