Presentation 1 Blowfish Transformation

Click here to load reader

download Presentation 1 Blowfish Transformation

of 22

description

this presentation is describing the Blowfish encryption standard. Effort by Arjun Bedi, PEC Chandigarh.contact: [email protected]

Transcript of Presentation 1 Blowfish Transformation

\o|auuac Ali la:iYou:cs a:c Aua: a:ta:19 Iebruary 2008Presented by: Arjun Bedilmaee Lnorvption usine Blook-Based1ransformation Aleorithm

1Abstraot4st 41 the avaiiabie encrypti4n aig4rithms are mainiy used 14r tetuai data and may n4t be suitabie 14r muitimedia data such as images. In this paper, ve intr4duce a bi4ck-based trans14rmati4n aig4rithm based 4n the c4mbinati4n 41 image trans14rmati4n and a veii kn4vn encrypti4n and decrypti4n aig4rithm caiied Bi4v1ish. 1he 4riginai image vas divided int4 bi4cks, vhich vere rearranged int4 a trans14rmed image using a trans14rmati4n aig4rithm presented here, and then the trans14rmed image vas encrypted using the Bi4v1ish aig4rithm.

2Results1he resuits sh4ved that the c4rreiati4n betveen image eiements vas signi1icantiy decreased by using the pr4p4sed technique. 1he resuits ais4 sh4v that increasing the number 41 bi4cks by using smaiier bi4ck sizes resuited in a i4ver c4rreiati4n and higher entr4py.

3Proposed 1eohnique

4Comparison prooessO o::clatio:. i:tc:ccc:cc:cv oi i|c: iua-c to llai: iua-c at sauc ixcl locatio:.O l:t:ov.is a statistical ucasu:c oi :a:cou:css t|at ca: |c uscc to c|a:actc:izc t|c tcxtu:c oi t|c i:ut iua-c

5O o::clatio: O l:t:ov

6:i-i:al lua-cllllIkA:

k\llll

7BlowfishO csi-:cc i: |v l:ucc c|:cic:O llowiis| is u:atc:tcc. a:c will :cuai: so i: all cou:t:ics a:c ca: |c i:cclv uscc |v a:vo:cO llowiis| :oviccs a -ooc c:c:vtio: :atc i: soitwa:c a:c :o ciicctivc c:vta:alvsis oi it |as |cc: iou:c to catcO csi-: i:clucc |cvccc:cc:t |oxcs a:c a |i-|lv coulcx |cv sc|cculcou:cc. |tt.www.sc|:cic:.couac:|lowiis|isc.|tul

8Blowfishi|c: cctailsO ++ |its |cv lc:-t|. cw iulcuc:tatio:s oi llowiis| also uscs .o |cv lc:-t|. w|ic| uav ua|c it uo:c slow.O lloc| sizcs o+ |its.O t:uctu:c is cistcl :ctwo:|O kou:cs o.

9Blowfish Prooessou:cc. |tt.www.|c:o:-va:-.couc:vtoci|c:_|lowiis|_.|tul|tt.c:.wi|iccia.o:-wi|illowiis|_ci|c:

10O icstcl :ctwo:| oi |lowiis| co:tai:s o :ou:cs. i: t|c c:c i:al lcit ki-|t a:t is Xk wit| l l.O llowiis| lcv sc|cculc al-o:it|u i:itializcs l.l...l su| |cvs a:c ...+ |v usi:- |cx ci-its oi ll.

11llowiis| Al-o:it|u14 1inaiize 18 sub-keys and + s tabies, ve need t4 appiy Bi4v1ish aig4rithm (18-+*2soj.2 = 10+2.2 = s21 times. 14 initiaiize 18 sub-keys and + s tabies, ve need 18*12 - +*2so*12 = s1o - 121o8 = 111++ binary digits 41 PI, 4r 111++.+ = 81oo he digits 41 PI.

121ransformationproposed aleorithm in the paper

13LxperimentsO I|c al-o:it|u was alicc o: a |it uacc :|u iua-c t|at |as t|c sizc oi ixcls x ixcls wit| .o colo:s.

14CA3L 1

15CA3L 2

16CA3L 3

170ther available aleorithms

18ConolusionI|c a|ovc cascs s|ow t|at usi:- t|c :ooscc al-o:it|uiollowcc |v t|c llowiis| al-o:it|u :csultcc i: a lowc:co::clatio: a:c a |i-|c: c:t:ov coua:cc to usi:- t|cllowiis| alo:c. ivici:- t|c iua-c i:to a la:-c: :uu|c: oi|loc|s uacc t|c c:io:ua:cc cvc: |cttc:. I|c :csultss|owcc t|at t|c co::clatio: was :ccuccc cvc: iu:t|c: a:c t|cc:t:ov was i:c:cascc as t|c :uu|c: oi |loc|s is i:c:cascc.

19Applvine 4- bit plane teohniqueIo |icc scc:ct iua-c wc uav usc + lit la:c tcc|:iqucsc4pe 14r 1uture eperiments

20#esuitant Image

211hanks for listenine

22