Corpus ID: 213194408

A Reflection Attack on Blowfish

  title={A Reflection Attack on Blowfish},
  author={T. Gonz{\'a}lez},
Since its introduction in 1993, the Blowfish algorithm has come to be regarded as a strong algorithm. However, some attacks are possible for certain poor choices of keys. A certain class of keys called reflectively weak keys are examined, and a method for detecting these weak keys is studied. If a weak key is detected, then it is possible 
A Survey of VPN Security Issues
Data security plays a crucial role in modern times; most business is transacted over the internet and even to wireless devices, which is much more vulnerable than when running on an internal network.Expand
Effectuation of Blowfish Algorithm using Java Cryptography
--The cognitive content of the paper delineates some key features like importing the data in Java using MySQL database, creating the text file and a pdf file for storing the output and importing theExpand
Secure algorithms for SAKA protocol in the GSM network
  • N. Saxena, N. Chaudhari
  • Computer Science
  • 2017 10th IFIP Wireless and Mobile Networking Conference (WMNC)
  • 2017
New secure algorithms named NewA3, NewA8, and NewA5 algorithms are proposed to use with a secure and efficient authentication and key agreement (AKA) protocol in the GSM network with respect to the A3, A4, and A5 algorithms. Expand
A secure approach for SMS in GSM network
A proposed approach, based on encryption and digital signature efficiently embeds the confidentiality, integrity, authentication, and non-repudiation in the SMS messages. Expand
A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy
A secure framework for health information transmission is proposed within a central cloud-based model, which is compatible with the Malaysian telehealth strategy and suggests specific techniques to achieve this goal. Expand
Android Machine Interface : Integrating anAndroid Mobile Device into an Industrial Control System
The interaction between humans and industrial machinery have long been dominated by purpose-built hardware made to withstand the tough environment of the factory floor. Advances in hardware and sofExpand


A New Class of Weak Keys for Blowfish
Two reflection attacks on r-round Blowfish which is a fast, software oriented encryption algorithm with a variable key length k work successfully on approximately 2k+32-16r number of keys which are called reflectively weak keys. Expand
On the Weak Keys of Blowfish
This paper shows that the disclosure of F allows to perform a differential cryptanalysis which can recover all the rest of the key with 248 chosen plaintexts against a number of rounds reduced to eight. Expand
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Blowfish, a new secret-key block cipher, is proposed, a Feistel network, iterating a simple encryption function 16 times, which is very efficient on large microprocessors. Expand
Reflection Attacks on Product Ciphers, Fast Software Encryption
  • Cambridge Secuirty Workshop Proceedings, Springer-Verlag,
  • 1994