Documente Academic
Documente Profesional
Documente Cultură
7, July 2011
Journal of Global Research in Computer Science
RESEARCH PAPER
Available Online at www.jgrcs.info
Abstract: On considering the current scenario, Most of the existing systems which offer security to a network or web or to a data are vulnerable
to attacks and they are breached at some point of time by effective cryptanalysis, irrespective of its complex algorithmic design. In general,
todays crypto world is restricted to a practice of following any one single encryption scheme and that too for a single iteration on a single file
basis. This is evident in the 99% of the encryption-decryption cases. So, A need for practically strong and infeasible to get attacked technique
becomes vital. In this paper, we propose a Software tool which involves Cryptographic enciphering and deciphering using two algorithms of
different dimensions and also they are well assisted with File Splitting and Merging mechanisms. We used modified Blowfish algorithm and
RC4 algorithm for Encryption and Decryption of data. Our results clearly justifies that our tool serves as a better solution both in terms of
performance as well as security.
Modified F-Function
Function F plays an important role in the algorithm, and we
decided to modify function F. Original function F is defined
as follows. [3]
F(X) = ((S1 + S2 mod 232) XOR S3) + S4 mod 232
Instead, we modified the F-Function by replacing 2 addition
operations as XOR Operations. Thus the modified F-
Function is written as,
Figure 3:RC4 Algorithmic Design
F(X) = ((S1 XOR S2 mod 232) + (S3 XOR S4 mod 232))
This modification leads to the simultaneous execution of
two XOR operations. In the case of original F-function
SIGNIFICANT FEATURES
CONCLUSION
Figure 12: RC4 Decryption This paper will satisfy our foremost aim of providing a
system which is infeasible to get breached. It also
Table 1: Comparison of Execution time provides a high end data security when transmitting over
Time Vs Start Time End Time Elapsed any insecure medium. Intruders will not have any idea about
Algorithm (ms) (ms) Time our modification both in terms of algorithm as well as in our
(ms) design, so breaching this system is highly impossible. We
are sure that this software tool is unique of its kind and it
Original
Blowfish 1289281669804 1289281670225 499 can also be tuned in terms of higher performance and
Algorithm security in mere future by adding or replacing cryptographic
Modified
part because of its modularity in design. That is, it has a
blowfish 1289282873275 1289282873706 431 good performance without compromising the security and
algorithm the modified F-function also enhances the performance by
reducing the clock cycles up to 33% and reduces the
Thus it is experimentally proved that the execution time of execution time up to 14% [2].
modified blowfish algorithm is 13.5% lesser than the
original algorithm.