Improvised Blowfish under Bouncy Castle Framework
Rakhee Single1, S. G. Vaidya2, M. B. Ansari3

1Rakhee Single, Department of Computer Science of Engineering, Shreeyash College of Engineering and Technology, Aurangabad (Maharashtra), India.
2Prof. S. G. Vaidya, Department of Computer Science of Engineering, Shreeyash College of Engineering and Technology, Aurangabad (Maharashtra), India.
3Prof. M. B. Ansari, Department of Computer Science of Engineering, Shreeyash College of Engineering and Technology, Aurangabad (Maharashtra), India.
Manuscript received on 12 November 2016 | Revised Manuscript received on 24 November 2016 | Manuscript Published on 30 November 2016 | PP: 15-18 | Volume-6 Issue-6, November 2016 | Retrieval Number: F2395116616/16©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Greater demand for Internet applications require data to be transmitted securely with improved facilities for networking. But the transmission of data in the public communication system is not secure because of the interception and improper handling by indiscreet. It is necessary to secure the information we want to convey. This need to secure information introduces the concept “Cryptography”, which is the art and science of writing hidden. Cryptography before the modern age was effectively synonymous with encryption, data conversion means readable in an apparent nonsense. The proposed system uses Bouncy Castle APIs for cryptography, which is founded in 2000 year. Basically bouncy castle is a collection of APIs used in cryptography. Using Bouncy Castle APIs for cryptography provides security information such as data confidentiality, data integrity, authentication and non-repudiation.
Keywords: Bouncy Castle, Cryptography, Blowfish Algorithm, Homomorphic Encryption.

Scope of the Article: Patterns and Frameworks