Loading

Three Fish Algorithm: T-Mix Cipher using SHA-256
S Shajarin1, P Leelavathi2, B Reddaiah3, G Amrutha Vani4, C Swetha5

1S. Shajarin, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (A.P), India.
2P. Leelavathi, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (A.P), India.
3B. Reddaiah, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (A.P), India.
4G. Amrutha Vani, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (A.P), India.
5C. Swetha, Department of Computer Science and Technology, Yogi Vemana University, Kadapa (A.P), India.

Manuscript received on 23 August 2022 | Revised Manuscript received on 30 August 2022 | Manuscript Accepted on 15 September 2022 | Manuscript published on 30 September 2022 | PP: 5-11 | Volume-11 Issue-10, September 2022 | Retrieval Number: 100.1/ijitee.J926709111022 | DOI: 10.35940/ijitee.J9267.09111022
Open Access | Ethics and  Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In every organization, use of online services is increasing. With this the sensitive data is carried over internet on daily basis. Hence, there is a chance of misleading the data by unauthorized parties. So, there is need to provide security for that data and cryptography is the science that helps in providing security. By using cryptography different types of security algorithms have been developed. Three fish is a symmetric-key and tweakable block cipher algorithm designed as a part of the skein hash function. The strength of three fish encryption relies on 128-bit tweak value. The proposed work focuses on strengthening Encryption Process by implementing tweak buffer along with input. Whereas key scheduling is secured by applying SHA-256 algorithm. SHA-256 is a secured hash function which belongs to SHA-2 family. Three Fish is used in providing security on software and hardware. It is also implemented in electronic media such as transactions like banking. 
Keywords: Three Fish Block Cipher Algorithm, Symmetric Keys, Tweakable Block Cipher, Electronic Media.
Scope of the Article: Web Algorithms