Blow Fish Guide
Blow Fish Guide
netwinz Guide
Blowfish has a 64-bit block size and a variable key length from 1 bit up to 448 bits.
It is a 16-round Feistel cipher and uses large key-dependent S-boxes.
Blowfish's key schedule starts by initializing the P-array and S-boxes with values
derived from the hexadecimal digits of pi, which contain no obvious pattern. The
secret key is then, byte by byte, cycling the key if necessary, XORed with all the P-
entries in order. A 64-bit all-zero block is then encrypted with the algorithm as it
stands. The resultant ciphertext replaces P1 and P2. The same ciphertext is then
encrypted again with the new subkeys, and P3 and P4 are replaced by the new
ciphertext. This continues, replacing the entire P-array and all the S-box entries. In
all, the Blowfish encryption algorithm will run 521 times to generate all the
subkeys - about 4KB of data is processed.
HOW TO CONDUCT THE EXPERIMENT:
Click on Presentation Layer on the Main Window and Then Select “BLOW FISH ”
Module from the Modules displayed in the centre of the window.
SNAPSHOT-1
TRANSMITTER:
1. Enter the “IP Address” of the computer to which you intend to send data.
2. Enter the Key for Encryption.
3. Enter the Data that needs to be encrypted in the “TEXT” textbox.
4. Click on “ENCRYPT” button to encrypt the data and display the encrypted
data in the table.
The table displays the Block of Encryption, Original Character and the
encrypted code as shown in SNAPSHOT-2.
Look how padding is applied at the end of the table if data is not modulo 8.
5. Click on the “SEND” button to send the encrypted Data to the destination
IP.
SNAPSHOT-2
Use Loop back Address “127.0.0.1” to send the Data to the same computer.
RECEIVER:
In the Receiver Window, the Data is displayed in the table as soon as the frame is
received. The Code as well as Ascii representation of the code if possible is
displayed in the table as shown in SNAPSHOT-3
SNAPSHOT-3
1. Enter the Key value same as entered on the server in the “KEY” textbox.
2. Click on “DECRYPT” button to decrypt the data. The Decrypted data is
shown in the “TEXT” textbox on the receiver as shown in SNAPSHOT-4
SNAPSHOT-4
Reset Button: