Blowfish
Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.
Keywords for this software
References in zbMATH (referenced in 22 articles )
Showing results 1 to 20 of 22.
Sorted by year (- Raja, S. P.: Multiscale transform-based secured joint efficient medical image compression-encryption using symmetric key cryptography and ebcot encoding technique (2019)
- Ferretti, Luca; Marchetti, Mirco; Andreolini, Mauro; Colajanni, Michele: A symmetric cryptographic scheme for data integrity verification in cloud databases (2018)
- Amandeep; Geetha, G.: Analysis of Bitsum attack on block ciphers (2016)
- Kozhevnikov, A. A.; Polikarpov, S. V.; Rumyantsev, K. E.: On differential properties of a symmetric cryptoalgorithm based on pseudo-dynamic substitutions (2016)
- Jawad, Lahieb Mohammed; Sulong, Ghazali: Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption (2015)
- Dong, Le; Wu, Wenling; Wu, Shuang; Zou, Jian: Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes (2014)
- Wu, Yue; Zhou, Yicong; Noonan, Joseph P.; Agaian, Sos: Design of image cipher using Latin squares (2014)
- Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Slender-set differential cryptanalysis (2013)
- Isobe, Takanori: A single-key attack on the full GOST block cipher (2013)
- Abdelraheem, Mohamed Ahmed; Leander, Gregor; Zenner, Erik: Differential cryptanalysis of round-reduced printcipher: computing roots of permutations (2011)
- Borghoff, Julia; Knudsen, Lars R.; Leander, Gregor; Thomsen, Søren S.: Cryptanalysis of PRESENT-like ciphers with secret S-boxes (2011)
- Isobe, Takanori: A single-key attack on the full GOST block cipher (2011)
- Kara, Orhun: Reflection cryptanalysis of some ciphers (2008)
- Katos, Vasilios; Doherty, Bernard: Exploring confusion in product ciphers through regression analysis (2007)
- De Drézigué, David; Fizaine, Jean-Paul; Hansma, Nils: In-depth analysis of the viral threats with openoffice.org documents. (2006) ioport
- Clapp, Craig S. K.: Joint hardware/software design of a fast stream cipher (1998)
- Moriai, Shiho; Shimoyama, Takeshi; Kaneko, Toshinobu: Higher order differential attack of a CAST cipher (1998)
- Clapp, Craig S. K.: Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors (1997)
- Schneier, Bruce; Whiting, Doug: Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium processor (1997)
- Kelsey, John; Schneier, Bruce; Wagner, David: Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES (1996)