International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 181 - Issue 25 |
Published: Nov 2018 |
Authors: Rekha C., Krishnamurthy G. N., Dilip Kumar S. M. |
![]() |
Rekha C., Krishnamurthy G. N., Dilip Kumar S. M. . An Alternate Key Scheduling Algorithm for Blowfish and its Performance Analysis. International Journal of Computer Applications. 181, 25 (Nov 2018), 7-14. DOI=10.5120/ijca2018918065
@article{ 10.5120/ijca2018918065, author = { Rekha C.,Krishnamurthy G. N.,Dilip Kumar S. M. }, title = { An Alternate Key Scheduling Algorithm for Blowfish and its Performance Analysis }, journal = { International Journal of Computer Applications }, year = { 2018 }, volume = { 181 }, number = { 25 }, pages = { 7-14 }, doi = { 10.5120/ijca2018918065 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2018 %A Rekha C. %A Krishnamurthy G. N. %A Dilip Kumar S. M. %T An Alternate Key Scheduling Algorithm for Blowfish and its Performance Analysis%T %J International Journal of Computer Applications %V 181 %N 25 %P 7-14 %R 10.5120/ijca2018918065 %I Foundation of Computer Science (FCS), NY, USA
Information security depends on the strength of cryptographic algorithm and key. The generated keys must be so secure that there is no better way to break it. Design of such good key scheduling algorithm is crucial part in symmetric cryptosystem, which is used to create a number of subkeys, used in encryption/decryption process in block cipher. In this paper a methodology is proposed for generating keys using an alternate key scheduling algorithm of blowfish. However, Blowfish has some demerits including complex key scheduling algorithm, high computational cost and static substitution of S-box. Therefore such demerits are taken care to improve the performance of key generation algorithm of blowfish algorithm. This alternating key scheduling algorithm decreases the computational cost and uses the dynamic substitution of S-box. The effectiveness of the proposed scheme is verified by performing security analysis and also metrics evaluation.