International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 07 Issue: 11 | Nov 2020
p-ISSN: 2395-0072
www.irjet.net
COMPARATIVE STUDY ON BLOWFISH AND TWOFISH ALGORITHMS FOR IMAGE ENCRYPTION AND DECRYPTION Chadalavada Lasya Chowdary1, Pavithra Nallamothu2, Marthala Charan Reddy3, Burra Vijay Babu4 1Lasya
student of B.Tech Computer Science and Engineering, K L University, Vijayawada, Andhra Pradesh, India student of B.Tech Computer Science and Engineering, K L University, Vijayawada, Andhra Pradesh, India 3Charan student of B.Tech Computer Science and Engineering, K L University, Vijayawada, Andhra Pradesh, India 4Vijay Babu: Professor, Dept. of Computer Science and Engineering, K L University, Andhra Pradesh, India ---------------------------------------------------------------------***---------------------------------------------------------------------2Pavitra
Abstract - Web and System applications are growing very fast and the requirements to secure such applications is also being expanded. One among the requirements is Image security. As number of web assaults have been increasing image security has became the greatest concern. To prevent such assaults, Encryption algorithms are very useful. Encryption algorithms can guarantee protection, privacy and data security for making web a safer place. The two main fundamental characteristics of any encryption algorithm is its speed and security. In this paper we have compared the speed of two encryption algorithms Blowfish and Twofish by encrypting and decrypting different types of image files. Through different sizes of image files we have analyzed the encryption and decryption speed of both the algorithms. From the results we have found that Blowfish takes less time to encrypt and decrypt the image file when compared to Twofish. Blowfish algorithm is better when compared to Twofish as far as the encryption and decryption speed is considered. Key Words: Blowfish, Twofish, Encryption, Decryption, Image.
1. INTRODUCTION Now-a-days the number of organizations have been increasing rapidly and a huge amount of data is being generated by them every day on the internet and they store it in the cloud. Data has been the greatest resource for an association and to maintain its privacy, validation and access control has to be redistributed. To secure the data and to maintain its privacy we are encrypting the data. Encryption is a procedure which is used to convert unique message or a plaintext into a ciphertext and transmits the data securely and safely over the cloud. They are two types of encryption algorithms. Symmetric-key encryption and Assymmetric -key encryption. In Symmetric key encryption we use only one key to encrypt and decrypt the data. Examples are AES, DES, 3DES, Blowfish, Twofish etc.. For Assymmetric encryption algorithm we use two keys i.e. a private key and a public key. For encrypting the data we use a public key and for decrypting the data we use a private key. Example for asymmetric encryption algorithm is Diffie Hellman (DH). In this paper we are going to implement the Blowfish and Twofish algorithms. By using these two algorithms we are going to encrypt and decrypt the various sizes image files. We know that blowfish algorithm is strongest among all the algorithms.
Fig -1: Encryption/Decryption Process
Š 2020, IRJET
|
Impact Factor value: 7.529
|
ISO 9001:2008 Certified Journal
|
Page 941