Security

Linux Based of Encryption Quality and Security Valuation of Blowfish Algorithm and Its Modified Version Using Digital Images

Download Now Free registration required

Executive Summary

There has been a tremendous enhancement in the field of cryptography, which tries to manipulate the plaintext so it becomes unreadable, less prone to hacker and crackers, and again obtain the plaintext back by manipulating this unreadable text and images in some way. In this paper, the authors have modified one secure algorithm Blowfish which are secret - key block cipher that enhance performance by modifying their function. Now in this paper, they want show some results of performance analysis Blowfish and compare it with its modified version to prove that the modification does not violate security requirements.

  • Format: PDF
  • Size: 848 KB