Вы находитесь на странице: 1из 18

Design and Implementation of

Blowfish Algorithm based on Verilog HDL

PRESENTED BY

N.AJAY (15845A0402)
T.SATHISH (15845A0403)
P.GOVARDHAN (14841A0485)
UNDER THE GUIDANCE OF

T.SHIRISHA
(Assistant professor)
INTRODUCTION

 Information security has become an important issue in data


communication. encryption algorithms have come up as a
solution and play an important role in information security
system.

 Blowfish is a symmetric block cipher that can be effectively


used for encryption and safeguarding of data. it takes a
variable-length key, from 32 bits to 448 bits, making it ideal
for securing data.
 Blowfish is based on “CRYPTOGRAPHY” mechanism

 Where cryptography is a greek word it means


crypto = hidden
graphy= way of writing
ENCRYPTION

Encryption is the process of converting plane text to


“cipher text”

Cipher text ?

Cipher text is an encrypted information which is


unreadable by a human or computer without the
proper cipher to decrypt it
ENCRYPTION
STANDARDS

1. DATA ENCRYPTION STANDARD (DES)


2. ADVANCED ENCRYPTION STANDARD (AES)
3. “BLOWFISH” ALGORITHM
1. DES
 DES is having plaintext range of 64bit and key length
of 56 bit.

2. AES

 AES is having plain text range of 128 bit and variable key
length of between 128,192,256
3. BLOWFISH ALGORITHM
The blowfish algorithm is having plaintext range of 128 bit and
variable key length from 32 bits to 448 bits and it performs 16
rounds of operations.
There are two
parts in this
algorithm

Structure
of 1. KEY
EXPANSION
Blowfish
algorithm
2. ROUND
STRUCTURE
64
WORKING OF
32 32
KEY EXPANSION

32
64
WORKING OF ROUND
32 32
STRUCTURE
32

ROUND 1

ROUND 2

ROUND 16
IT USES SYMMETRIC KEY
ENCRYPTION AND DECRYPTION
ADVANTAGES
 LICENSE FREE

 MORE SECURE

 IMPROVED PERFORMANCE

 LESS POWER CONSUMPTION

 SMALLER DESIGN SIZE

 AT A TIME ENCRYPTION AND DECRYPTION

CAN BE PERFORMED
APPLICATIONS

Widely used for computer and


communication network.
Android devices
IOT(Inter net of things)
Image processing units
Software Used:
 XILINX

Language Used:
• VERILOG HDL
TIMING DIAGRAM
CONCLUSION
 The Blowfish algorithm can achieve high-speed data transfer up to
4 bits per clock, which is 9 times faster than a Pentium.

 The test results show that the maximum frequency of this


Blowfish cipher chip is 50MHz.

 The proposed architecture has satisfied the need of high-speed


data transfer and can be applied to security device

Вам также может понравиться