{"title":"一个创新的原理图设计,以定制河豚更好的安全性","authors":"Shally Nagpal, Suneet Kumar","doi":"10.1109/ISPCC53510.2021.9609357","DOIUrl":null,"url":null,"abstract":"with the advent of the internet, protection has become a chief worry. And the past of safety permits a superior expertise of the development of safety tools. The net arrangement itself permitted for plenty of safekeeping fears to arise. Many corporations secure themselves from the net with the help of firewalls and encryption mechanisms. The corporations can create an “intranet” remains connected to the internet and secured it from possible threats. To maintain integrity of data healthier encryption techniques are required for improved safety. It is required to consider various issues such as key size, block size and encryption ratio for better encryption. Encryption is required to provide security of documents that are exported to secondary storage devices (such as pen drive, SD card) so that unauthorized access is not possible. It is very easy to decrypt the document if a key is stored along with the document on secondary storage. Instead of storing the key along with document it is better to generate cryptographic keys from user password while encrypting or decrypting the file. A new scheme to customize blowfish variable parameters (Key generation from user defined password) is proposed and evaluated on the hardness of keys for various encryption standards with proposed algorithm.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An innovative Schematic design to Customize Blowfish for Better Security\",\"authors\":\"Shally Nagpal, Suneet Kumar\",\"doi\":\"10.1109/ISPCC53510.2021.9609357\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"with the advent of the internet, protection has become a chief worry. And the past of safety permits a superior expertise of the development of safety tools. The net arrangement itself permitted for plenty of safekeeping fears to arise. Many corporations secure themselves from the net with the help of firewalls and encryption mechanisms. The corporations can create an “intranet” remains connected to the internet and secured it from possible threats. To maintain integrity of data healthier encryption techniques are required for improved safety. It is required to consider various issues such as key size, block size and encryption ratio for better encryption. Encryption is required to provide security of documents that are exported to secondary storage devices (such as pen drive, SD card) so that unauthorized access is not possible. It is very easy to decrypt the document if a key is stored along with the document on secondary storage. Instead of storing the key along with document it is better to generate cryptographic keys from user password while encrypting or decrypting the file. A new scheme to customize blowfish variable parameters (Key generation from user defined password) is proposed and evaluated on the hardness of keys for various encryption standards with proposed algorithm.\",\"PeriodicalId\":113266,\"journal\":{\"name\":\"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPCC53510.2021.9609357\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCC53510.2021.9609357","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An innovative Schematic design to Customize Blowfish for Better Security
with the advent of the internet, protection has become a chief worry. And the past of safety permits a superior expertise of the development of safety tools. The net arrangement itself permitted for plenty of safekeeping fears to arise. Many corporations secure themselves from the net with the help of firewalls and encryption mechanisms. The corporations can create an “intranet” remains connected to the internet and secured it from possible threats. To maintain integrity of data healthier encryption techniques are required for improved safety. It is required to consider various issues such as key size, block size and encryption ratio for better encryption. Encryption is required to provide security of documents that are exported to secondary storage devices (such as pen drive, SD card) so that unauthorized access is not possible. It is very easy to decrypt the document if a key is stored along with the document on secondary storage. Instead of storing the key along with document it is better to generate cryptographic keys from user password while encrypting or decrypting the file. A new scheme to customize blowfish variable parameters (Key generation from user defined password) is proposed and evaluated on the hardness of keys for various encryption standards with proposed algorithm.