Proposal New Approach for Blowfish Algorithm by Using Random Key Generator


There are three basic encryption methods: hashing, symmetric cryptography, and asymmetric cryptography. Each of these encryption methods has their own uses, advantages, and disadvantages. All the three of these encryption methods use cryptography or the science of scrambling data. Although there are several pieces to an encryption process, the two main pieces are the algorithms and the keys. Blowfish, a symmetric block cipher and a Feistel network which follows simple Enciphering and Deciphering functions of 16 times each. The strength of the Blowfish algorithm relies on its sub-key generation and its basic confusion and diffusion based design. The proposed method are generate key drawn from parts of the image and by the size of key used with Blowfish.