13 views

Original Title: Abdul Waqee 271 Farhan Khan 182 Waleed Khan 239 Encryption Decryption Using Blowfish Algorithm

Uploaded by Waqar Asif

- Assign 11
- Main
- High Resolution ISAR Processing Using Real Data_ISAR-to-SAR Approach
- Fourier Transformer
- String
- Nth UE Selection Algorithm Modification
- IT1352-Crtptography Network Security
- maze problem in Artificial intelligence.
- Algorithmic Sketchbook
- 3429ibt Jalandhar Schedule 28 April- 03 May 14
- General Directions
- Bootstrap Method
- matrix
- phylogeny_22Jan2007
- Digital Systems
- pdf topic 5 6 mult
- Tut5_BinaryTree
- Average With Indirects
- Penggunaan Transformasi Lapplace2
- 20130514110507transportation Problem

You are on page 1of 2

Abdul Waqeel, Farhan Khan, and Waleed Khan from the Department of Communication System

Engineering of National University of Science and Technology, Islamabad

for operations. The signal is passed through an Analog to

Abstract— In this report we have implemented blowfish Digital converter for this purpose. The output of the signal is

algorithm’s encryption. In this report we’ll discuss the a Digital signal which is ready for encryption. The digital

encryption method we followed in our project. form of the base band signal is shown in fig.2.

I. INTRODUCTION

up to 448 bits. As said above it is a fiestal network, it

uses a simple encrypting function and repeats it 16 times. It

also uses 64-bit block size. It keeps two sub keys: 18-entry P-

array and four 256-entry S-boxes The S-boxes accept a 8-bit

input and gives a 32-bit output. 1 entry of P-array is used

after every round and passed through the fiestal network and

after final round; each half of the data block is XORed with

one of the two remaining unused P-entries as shown in fig.1

below.

Fig.2 shows the implementation of the fiestal function. It

splits the input 32-bits value to four 8-bit values which are

then passed as inputs to the S-boxes and then their outputs

are added to modulus of 232 to get the final output of 32-bits.

For Decryption the same process is reversed. The most

common and basic mistake while decrypting is using it in

inverse order i.e. taking XOR of P18 and P17 entries with the

text block and then using the P-entries in reverse order.

The P-array and S-boxes are initialized by hexadecimal Fig.2 shows the signal when converted from analog to digital

values of (pi) at the start. These values have no pattern. A 64- from,

bit zero blocks is encrypted and so the values of P1, P2 are

entered. This process continues 521 times until all sub keys

The digital signal is passed through the encrypter. To encrypt

are generated and 4KB of data is processed during the whole

the signal we first XORed the generated key with the first

process.

sample of the signal, the result is stored in a temporary

variable. Then the value of the same sample is XORed with

II.ENCRYPTION PROCESS the fiestal function of the system. When both values are

Fig.1 shows a base band signal in analog form, obtained, they are swapped and this process is repeated for

rest of the values of the fiestal and the generated key. When

the process finishes, the resultant values are stored in the new

ENCRYPTED SIGNAL. This process continues until all

values of the signal are encrypted. The encrypted signal in

digital form is shown in fig.3 with sample rate Ts=1.

Signal to be encrypted is first converted to its Digital form

Report #1

2

a Discrete to analog converter for transmission over a link.

The analog form of the signal is shown in the fig.4

III. REFERENCES

[1] http://www.schneier.com/blowfish.html

[2] http://www.schneier.com/blowfish-speed.html

[3] http://www.schneier.com/paper-blowfish-fse.html

[4] http://www.docstoc.com/docs/71701479/PAPER-7

[5] http://www.ijcaonline.org/journal/number25/pxc387770.pdf

[6] http://www.springerlink.com/content/w70j51u10402442r/

[7] http://pocketbrief.net/related/BlowfishEncryption.pdf

- Assign 11Uploaded bySure Avinash
- MainUploaded bymohammedtaskeen9898
- High Resolution ISAR Processing Using Real Data_ISAR-to-SAR ApproachUploaded byWesley George
- Fourier TransformerUploaded bySoliman2022
- StringUploaded byMohan Ram
- Nth UE Selection Algorithm ModificationUploaded byKUnal
- IT1352-Crtptography Network SecurityUploaded byFaizal Khan
- maze problem in Artificial intelligence.Uploaded byMohammed Faizul Gani
- Algorithmic SketchbookUploaded byEduardo Mendoza
- 3429ibt Jalandhar Schedule 28 April- 03 May 14Uploaded bySushant Sharma
- General DirectionsUploaded byAshok Ghunawat
- Bootstrap MethodUploaded byZdravko Vidakovic
- matrixUploaded byapi-351155679
- phylogeny_22Jan2007Uploaded byMukul Bhalla
- Digital SystemsUploaded bycataice
- pdf topic 5 6 multUploaded byapi-420649006
- Tut5_BinaryTreeUploaded byNam Nguyen Van
- Average With IndirectsUploaded byJuan Mendoza
- Penggunaan Transformasi Lapplace2Uploaded bysantaimen
- 20130514110507transportation ProblemUploaded byZul Shiraishi
- EE4CL4_lecture30Uploaded byMorteza Sepehran
- MiscUploaded byquike6041-1
- Post Stack Inversion.pdfUploaded byKanita Nur Izzati
- Optimization Mesh Morphing Optimization 8Uploaded byVikram Mangalore
- A Modified Greedy Algorithm for the Task Assignment ProblemUploaded bygigi
- 03_filtering.pdfUploaded bychuerubim
- VLSI TestingUploaded byVinod Khera
- Accuracy of Capacity Forecasting TemplateUploaded byTrupti Sankhe
- TUT-EEC-601.docUploaded bygkhanna_3
- A Survey of an Adaptive Weighted Spatio-Temporal Pyramid Matching for Video RetrievalUploaded byseventhsensegroup

- IMAGE PROCESSING USING MATLAB – LEARNING TOOLUploaded byskypillar88
- ENVI_userguid4.1.pdfUploaded byvlady1
- specific heat lab reportUploaded byapi-370218484
- Arens_15e_Ch15_Audit_Sampling_for_Tests_of_Controls_and_Substantive_Tests_of_Transactions.pdfUploaded byellen
- 1426-um001_-en-p_PowerMonitor_5000Uploaded byjohn_freddy1
- Sika Concrete Hand BookUploaded byIwan Tirta
- Vs 36mtseries 71716Uploaded byRakesh Sandarativju
- TRIHALTechnical Data Sheet - Standard Losses EnUploaded byFreddy Amador
- Mathematical Hydraulic Models of One-Dimensional Unsteady Flow in RiversUploaded byIjaems Journal
- upndu320Uploaded byliew99
- C57.19.01-2000Uploaded bybeto3672
- 32nmUploaded bybondxxx
- Chapter 9 Part 1 HWM 2nd Ed SolutionsUploaded byraghu_iict
- Notes AnyConnect 4 1-4.1.04011Uploaded bynspjsk
- InstallationUploaded byElcio Fontanesi Rossi
- Electropolymerization of N-vinylcarbazoleUploaded byPedro Roquero
- Chapter1-Regression-Introduction.pdfUploaded byHabib Mrad
- CrystalXcelsius4.5TutorialsUploaded bymkothakota
- Final Exam Solns Auto Morph Isms of GroupsUploaded byCassie Williams
- Final SolUploaded byRaghu Vamsi Potukuchi
- Sparse Social Domains Based Scalable Learning of Collective BehaviourUploaded byseventhsensegroup
- BP_RP26-1HeatExchangeEquipment.pdfUploaded byMohd Khairul
- UEEUploaded byPratap Reddy Chenikala
- Chapter_3_-_Stage_and_Continuous_Gas-Liquid_Separation_ProcessesUploaded byomarfhassan
- Use of Dithering in ADCUploaded byRajeev Ramachandran
- Nonlinear AnalysisUploaded byDeepak C. Rajwar
- FisherLabs_tw6.pdfUploaded byJorge B. Briceño Gomez
- examen 3Uploaded bycameraman01
- ESP WellTest Success StoryUploaded bydoubleuland
- Tf Seal SelectionUploaded byPete Pompes