0% found this document useful (0 votes)
116 views5 pages

Blow Fish Guide

netwinz Blowfish as a general-purpose algorithm, intended as an alternative to the aging DES and free of the problems and constraints associated with other algorithms. At the time Blowfish was released, many other designs were proprietary, encumbered by patents or were commercial/government secrets. Blowfish is unpatented. The algorithm is placed in the public domain, and can be freely used by anyone

Uploaded by

merlin664
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
116 views5 pages

Blow Fish Guide

netwinz Blowfish as a general-purpose algorithm, intended as an alternative to the aging DES and free of the problems and constraints associated with other algorithms. At the time Blowfish was released, many other designs were proprietary, encumbered by patents or were commercial/government secrets. Blowfish is unpatented. The algorithm is placed in the public domain, and can be freely used by anyone

Uploaded by

merlin664
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

net

netwinz Guide

BLOW FISH CIPHER


Introduction:
Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier
and included in a large number of cipher suites and encryption products.

Schneier designed Blowfish as a general-purpose algorithm, intended as an


alternative to the aging DES and free of the problems and constraints associated
with other algorithms. At the time Blowfish was released, many other designs
were proprietary, encumbered by patents or were commercial/government
secrets. Blowfish is unpatented. The algorithm is placed in the public domain, and
can be freely used by anyone.

Blowfish has a 64-bit block size and a variable key length from 1 bit up to 448 bits.
It is a 16-round Feistel cipher and uses large key-dependent S-boxes.

Blowfish's key schedule starts by initializing the P-array and S-boxes with values
derived from the hexadecimal digits of pi, which contain no obvious pattern. The
secret key is then, byte by byte, cycling the key if necessary, XORed with all the P-
entries in order. A 64-bit all-zero block is then encrypted with the algorithm as it
stands. The resultant ciphertext replaces P1 and P2. The same ciphertext is then
encrypted again with the new subkeys, and P3 and P4 are replaced by the new
ciphertext. This continues, replacing the entire P-array and all the S-box entries. In
all, the Blowfish encryption algorithm will run 521 times to generate all the
subkeys - about 4KB of data is processed.
HOW TO CONDUCT THE EXPERIMENT:
Click on Presentation Layer on the Main Window and Then Select “BLOW FISH ”
Module from the Modules displayed in the centre of the window.

BLOW FISH Window will open up as shown in SNAPSHOT-1.

SNAPSHOT-1

TRANSMITTER:

1. Enter the “IP Address” of the computer to which you intend to send data.
2. Enter the Key for Encryption.
3. Enter the Data that needs to be encrypted in the “TEXT” textbox.
4. Click on “ENCRYPT” button to encrypt the data and display the encrypted
data in the table.
The table displays the Block of Encryption, Original Character and the
encrypted code as shown in SNAPSHOT-2.

Look how padding is applied at the end of the table if data is not modulo 8.
5. Click on the “SEND” button to send the encrypted Data to the destination
IP.

SNAPSHOT-2
Use Loop back Address “127.0.0.1” to send the Data to the same computer.

RECEIVER:

In the Receiver Window, the Data is displayed in the table as soon as the frame is
received. The Code as well as Ascii representation of the code if possible is
displayed in the table as shown in SNAPSHOT-3

SNAPSHOT-3

1. Enter the Key value same as entered on the server in the “KEY” textbox.
2. Click on “DECRYPT” button to decrypt the data. The Decrypted data is
shown in the “TEXT” textbox on the receiver as shown in SNAPSHOT-4
SNAPSHOT-4

Transmitter and Receiver Messages are Displayed in the “Message Window” on


the extreme right.

Reset Button:

Click On “RESET BUTTON” to reset all the controls to initial values.

Click on “HELP BUTTON” to Open BLOW FISH Manual.

Click on “EXIT BUTTON” To Close BLOW FISH Window.

Copyright © 2011 Emblitz Technologies Pvt Ltd. All rights reserved.

You might also like