A New Method for Modifying Blowfish Algorithm for IoT
Shally Nagpal1, Suneet Kumar2, Suresh Chand Gupta3
1Shally Nagpal, Research Schola, B. Tech from Maharishi Markandeshwar College Of Engineering, Ambala, India.
2Suneet Kumar, Associate Professor, Department of Computer Science and Engineering, Bhagwant university, Ajmer (Rajasthan), India.
3Suresh Chand Gupta, Associate Professor, Department of Computer Science and Engineering, Bhagwant university, Ajmer (Rajasthan), India.
Manuscript received on 20 August 2019 | Revised Manuscript received on 27 August 2019 | Manuscript Published on 26 August 2019 | PP: 331-334 | Volume-8 Issue-9S August 2019 | Retrieval Number: I10530789S19/19©BEIESP | DOI: 10.35940/ijitee.I1053.0789S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Due to rapid development of internet and web applications, the prominence and the importance of the information exchange using the internet is growing. Communication through internet faces data safety as an important issue. Data has to be safe when communicating as slightly loss or danger to transmitted data can be responsible for excessive harm to the society. For network safety encryption plays a vibrant part. Many times it is little bit confusing to choose best encryption, as there are many cryptography methods for securing the data during transmission. For many applications Blowfish is currently assumed to be insecure. So it turns out to be essential to enhance this procedure through addition of different levels of safety so that it can be used in several reliable communication channels. Blowfish algorithm is modified in a way that it is platform independent; however the present encryption schemes are restricted to platform dependent proposal. This proposed modified blowfish algorithm supports text, images and media files.
Keywords: Network Security, Symmetric Block Cipher, Cell Automata, Internet of Things, Entropy.
Scope of the Article: Network Security Trust & Privacy