Mr. Bruce Schneier: Blowfish algorithm invented by
Mr. Bruce Schneier, who is designing the Blowfish encryption algorithm, born on 15 January 1963 in the United States. He worked as a Cryptographer The Security Administrator Computer (Computer Security Specialist) and also a writer, too, Bruce has also written many books on the subject of Computer Security and Cryptography, and he is also the founder and Executive Director of the Office of Technology Counterpane Internet. Security with
Mr. Bruce Schneier live in cities Minneapolis, Minnesota with his wife, Ms. Karen Cooper, said Bruce Schneier, graduated with a degree in physics from the University of Rochester (University of Rochester) and graduated. Master's degree in computer science from the University of Americans (American University) Prior, he was the founder of the Office of Technology Counterpane Internet Security, he has worked in the Ministry of Defense, the US (United States Department of Defense) and the unit. of Bell Labs before
the study of Applied Cryptography is a popular and made him famous, the cryptography or Cryptography is huge, Schneier has designed and co-designed the technique to encode in multiple stages. algorithms including Blowfish, Twofish and MacGuffin both design techniques and random number generator in the Yarrow and Fortuna encoded with algorithm. Blowfish Blowfish 64 Bit Block Cipher encryption will encrypt the data are divided into blocks and 64 Bit key. Variable-Length Key will range in size from 32 Bit to 448 Bit-by-step operation that would have made the whole 16 rounds, which referred to a Feistel Network, and select the appropriate key on the S-boxes in coding. It has a structure similar to the work of algorithm CAST-128 is a Fixed S-boxes based on Diagram on the left, it will display the work of algorithms Blowfish The first line will be represented by the data 32 Bit known. the P-entries by step how to select Key or Subkey will consist of two parts: a 18-entry P-array and four of the 256-entry S-boxes by the S-boxes that will receive input data (Input) size. 8 Bit went to work in process, and will provide a 32 Bit Out (Output) by the P-array will be used in each iteration, from P1 to P16 and after the completion of the 16th round. Then in the 32 Bit of Data Block will be XORed (Exclusive OR) with P-array other two options are the P17 and P18 according Diagram right to express the inner working of the function F (F-function), which appeared from. Diagram above the function F that will start to share information, Size 32 Bit is 4 parts per 8 Bit to Input to the work of the 4 S-boxes inside the function F, and when the S. Output -box to be released as a 32 Bit data in any S-box will bring the positive. And then dividing the remainder by 232 and the XOR until the final data with a 32 Bit same table key algorithms Blowfish starts configuration Subkey called P-array and S-box, which includes the value of. hexadecimal digits of Pi, which is disorganized and difficult to arrange. The secret key is made XORed with P-entries or data is 32 bit left in every round from P1 to P16 and in every round to Generate Subkey up every time when XORed in the round. Then it goes into operation in the function F, which consists of 4 S-box, then it will again XORed with P-entries or 32 Bit Data Block size on the right hand side. Then switch to the data by the 32 Bit P-entries are switched to the right-hand to left-hand and 32 Bit P-entries on the left to switch to the right. It is the end of each work cycle. It works this way until the end of 16 laps and completed 16 laps and then it will again XORed with P-array at 17 and 18, which is Subkey 2, the last step is to end encryption. And the process will be a combination of 32 Bit Block Cipher, the two sides together Cipher text size 64 Bit like a cipher Blowfish, will be run (Run) 521 times to Generate value of all. Subkey happened to the meat of the CPU with a 4 KB in size Process, which is very small.
การแปล กรุณารอสักครู่..
