Data Structures Tutorial

Data Structures Tutorial Asymptotic Notation Structure and Union Array Data Structure Linked list Data Structure Type of Linked list Advantages and Disadvantages of linked list Queue Data Structure Implementation of Queue Stack Data Structure Implementation of Stack Sorting Insertion sort Quick sort Selection sort Heap sort Merge sort Bucket sort Count sort Radix sort Shell sort Tree Traversal of the binary tree Binary search tree Graph Spanning tree Linear Search Binary Search Hashing Collision Resolution Techniques

Misc Topic:

Priority Queue in Data Structure Deque in Data Structure Difference Between Linear And Non Linear Data Structures Queue Operations In Data Structure About Data Structures Data Structures Algorithms Types of Data Structures Big O Notations Introduction to Arrays Introduction to 1D-Arrays Operations on 1D-Arrays Introduction to 2D-Arrays Operations on 2D-Arrays Strings in Data Structures String Operations Application of 2D array Bubble Sort Insertion Sort Sorting Algorithms What is DFS Algorithm What Is Graph Data Structure What is the difference between Tree and Graph What is the difference between DFS and BFS Bucket Sort Dijkstra’s vs Bellman-Ford Algorithm Linear Queue Data Structure in C Stack Using Array Stack Using Linked List Recursion in Fibonacci Stack vs Array What is Skewed Binary Tree Primitive Data Structure in C Dynamic memory allocation of structure in C Application of Stack in Data Structures Binary Tree in Data Structures Heap Data Structure Recursion - Factorial and Fibonacci What is B tree what is B+ tree Huffman tree in Data Structures Insertion Sort vs Bubble Sort Adding one to the number represented an array of digits Bitwise Operators and their Important Tricks Blowfish algorithm Bubble Sort vs Selection Sort Hashing and its Applications Heap Sort vs Merge Sort Insertion Sort vs Selection Sort Merge Conflicts and ways to handle them Difference between Stack and Queue AVL tree in data structure c++ Bubble sort algorithm using Javascript Buffer overflow attack with examples Find out the area between two concentric circles Lowest common ancestor in a binary search tree Number of visible boxes putting one inside another Program to calculate the area of the circumcircle of an equilateral triangle Red-black Tree in Data Structures Strictly binary tree in Data Structures 2-3 Trees and Basic Operations on them Asynchronous advantage actor-critic (A3C) Algorithm Bubble Sort vs Heap Sort Digital Search Tree in Data Structures Minimum Spanning Tree Permutation Sort or Bogo Sort Quick Sort vs Merge Sort Boruvkas algorithm Bubble Sort vs Quick Sort Common Operations on various Data Structures Detect and Remove Loop in a Linked List How to Start Learning DSA Print kth least significant bit number Why is Binary Heap Preferred over BST for Priority Queue Bin Packing Problem Binary Tree Inorder Traversal Burning binary tree Equal Sum What is a Threaded Binary Tree? What is a full Binary Tree? Bubble Sort vs Merge Sort B+ Tree Program in Q language Deletion Operation from A B Tree Deletion Operation of the binary search tree in C++ language Does Overloading Work with Inheritance Balanced Binary Tree Binary tree deletion Binary tree insertion Cocktail Sort Comb Sort FIFO approach Operations of B Tree in C++ Language Recaman’s Sequence Tim Sort Understanding Data Processing

Blowfish algorithm

The Blowfish algorithm is the very first encryption algorithm which is symmetric. It was firstly used as an alternate algorithm for the DES algorithm. It was designed by Bruce Steiner in 1993. By symmetric, we mean that the algorithm uses the same key for encryption and decryption of the data. The algorithm is used to protect the sensitive data.

The symmetric encryption technique converts the given data into cipher text. Cipher text refers simply to the coded form of sensitive information generally used to prevent data leakage and for many other security purposes.

Use of Blowfish Algorithm

  • The Blowfish algorithm is used today in many products, including password management tools, email interaction tools, and much more.
  • Blowfish algorithm is used for DES encryption as it is significantly faster, safer and easier to implement.
  • The primary speciality of the Blowfish algorithm is that no practical cryptanalysis has been found till today. In other words, this algorithm has no practical way to decode or understand the data encrypted by this algorithm.
  • Cryptanalysis, in simple terms, is the technique to interpret the encrypted data used by usual hackers to barge into any encrypted database.
  • Note that blowfish is not like the SHAS12 algorithm as it is not a hashing algorithm.
  • Blowfish algorithm is open source and entirely in the public domain with no royalty charges and is more accessible and secure to use.
  • Blowfish also follows Feistel structure, and the size of plain text to be encrypted by the blowfish algorithm is usually sixty-four bits.
  • The storage required for storing the cipher key is variable (not fixed) but usually varies between 32 to 448 bits. Also, the default value or the size of any cipher key is 120 bit if not specified.

How are the keys expanded?

The procedure used for the transformation of the original key to sub-keys is explained step by step here in brief:

Your original key is divided into several sub-keys, usually 18. Once they are created, they are stored in the data structure called p array and are represented as P0, P1, .....Pn-1, ..., P17 respectively. Like the IDEA algorithm, the keys in the Blowfish algorithm are divided into several S boxes. Unlike the DES algorithm, the s-boxes in Blowfish algorithms are derived depending on the original key. In this algorithm, we derive 4 s boxes, each of which can hold approximately 512 entries of 32 bits each.

Steps to expand the original key

The first step for generating keys in the Blowfish algorithm is to initialize the data structures, P-array and S-boxes (substitution boxes). The value in p-array is initialized with the value of pi.

The 2nd and essential step is to fill the p-array. This is done by assigning the value in the follow way to each index in the p array.

P0= P0 XOR  First 32 BITS OF ORIGINAL KEY.
.
.
Pn= Pn XOR  (n=1)th 32 BITS OF ORIGINAL KEY.
.
.
P17= P17 XOR  18th(last) 32 BITS OF ORIGINAL KEY.

For example, the value of 1st sub-key P0 would equal the result of XOR between the initial value of P0 and the first 32 bits of the original key.

Encryption of data by the Blowfish algorithm

The central plain text to be encrypted by the Blowfish algorithm is firstly divided into two parts, and then a total of 16 rounds are performed to encrypt data in the Blowfish algorithm.

The step-by-step procedure for the encryption is:

  1. Divide the plane text into equal parts; left 32 bits and right part, 32 bits.
  2. Perform XOR operation on the left part with the nth sub-key. The result obtained is applied to a function f. We will look at this function separately for better clarity.
  3. After applying the function, the output received is passed as an input for XOR with the correct part.
  4. After performing the second step, the output received after the XOR between left and sub-key is now considered as the right part of the plain text, and similarly, the result from the right part is considered as left. Simply said, the values of the results are swapped.
  5. Iterate on steps 2, 3, and 4 up to the 16th sub-key (P15).
  6. After 16 rounds, the swapping of the results is paused, and each of the left and right parts is applied with the 17th and the 18th sub-key.
  7. The result from the 6th step is your final cipher text.



ADVERTISEMENT
ADVERTISEMENT