Linux Based of Encryption Quality and Security Valuation of Blowfish Algorithm and Its Modified Version Using Digital Images
Source: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
There has been a tremendous enhancement in the field of cryptography, which tries to manipulate the plaintext so it becomes unreadable, less prone to hacker and crackers, and again obtain the plaintext back by manipulating this unreadable text and images in some way. In this paper, the authors have modified one secure algorithm Blowfish which are secret - key block cipher that enhance performance by modifying their function. Now in this paper, they want show some results of performance analysis Blowfish and compare it with its modified version to prove that the modification does not violate security requirements.