Karpagam JCS ISSN: 2582 – 8525 (Print), 2583 – 3669 (Online)

Effective Use of Blowfish Algorithm in Analyzing Symmetrical Key Cryptographic Encryption

Abstract
Normally, the algorithms available in cryptography necessitate the keys that have to be shared and keep up relationship among the keys. The ultimate aim of allocation of keys is to atain an approved algorithm with very excellent arrangement of keys. RSA procedure is normal but a good number imperative hazard using the same is augmentative and for this reason does not promise distinctiveness of the key by not standing factual to the system requirements. In the event of getting better restrictions in the hand structure, a new cryptographic scheme of organizing the keys has to be proposed that brings into play the symmetric key procedure (Blowfish). Additionally, the suggested work makes use of ant colony based developmental computing technique to convene the necessity where there are changes in the key vigorously maturing with the time and the proposed method is found to be speedy and secured. A chronicle encompassing this method on a communication network has been implemented and another example of power saving is observed and the system is competent enough to meet the security necessities of modern networks.

View Full Article

Download or view the complete article PDF published by the author.

📥 Download PDF 👁️ View in Browser