SlideShare a Scribd company logo
FACULITY OF ELECTRONIC
TECNOLOGY
COMPUTETR ENGINEERING
(MSc)
By: Haitham Farag Daw
1
Cryptography andCryptography and
Network SecurityNetwork Security
OutLine
2
Blowfish Encryption Algorithm
Paper Search
Nmap Tool
Blowfish Encryption
Algorithm
3
-----------------------------------------------------------------
Main point
 Introduction
 Structure
 Cryptanalysis
 Comparison
 References
4
Introduction
 designed in 1993 by Bruce Blowfish
 64-bit block cipher with variable length key
 Large key-dependent S-boxes
 More resistant to cryptanalysis
 Key-dependent permutations
 Diverse Mathematical Operations
 Combine XOR and addition
5
Continue
 Fast
 Compact It can run in less than 5K of memory.
 Simple to code
 Easily modifiable for different security levels
 Secure: The key length is variable ,it can be in
the range of 32~448 bits: default 128 bits key
length.
 Unpatented and royality-free.
6
Structure of BF
 Feistel iterated block cipher
 Scalable Key (32 to 448 bits)
 Simple operation that are efficient on
microprocessors
 XOR, Addition, Table lookup, etc
 Employ Precomputable Subkeys
 Variable number of iterations
7
8
Implementation: Encryption
( )
171617
181617
11
111
PRR
PLL
PLR
RPLFL
iii
iiii
⊕=
⊕=
⊕=
⊕⊕=
−−
−−−
Wikipedia,
http://en.wikipedia.org/wiki/Image:BlowfishDiagram.png
Arrays:
P – Number of rounds + 2 elements
4 S-boxes – 256 elements
9
Implementation: Function F(x(
( ) [ ] [ ]( ) [ ]( )
[ ]07
81516232431031
4
321
−
−−−−
+
⊕+=
XS
XSXSXSXF
Wikipedia,
http://upload.wikimedia.org/wikipedia/en
/8/81/BlowfishFFunction.png
Addition is mod 232
10
Data Encryption
• Divide 64-bits into two 32-bit halves: XL, XR
• For i = 1 to 16
o XL = XL XOR Pi
o XR=F(XL) XOR XR
o Swap XL and XR
• Swap XL and XR (Undo the last swap )
• XR=XR XOR P17
• XL = XL XOR P18
• Concatenate XL and XR
11
Cryptanalysis
 Differential Attack
 After 4 rounds a differential attack is no better than a brute
force attack
 Weak Keys
 S-box collisions
 blowfish algorithm has yet to be cracked as the key size
is high, requires 2448
combinations
12
Future Concerns
 Simplifications
 Fewer and Smaller S-boxes
 Fewer Iterations
 On-the-fly subkey calculation
 Twofish
 AES Finalist
 128-bit Block Size
 More Operations
13
Comparison
14
References
 Wikipedia (for illustrations)
 http://en.wikipedia.org/wiki/Blowfish_cipher
 Applied Cryptography
 Bruce Schneier
 John Wiley and Sons, Inc. 1996
 The Blowfish Paper
 http://www.schneier.com/paper-blowfish-fse.html
15
Paper Search
-----------------------------------------------------------------
16
New Approach for Modifying Blowfish
Algorithm by Using
Multiple Keys
by
Afaf et al in
VOL.11 No.3, March 2011, Amman, Jordan,
Baghdad, Iraq
17
Nmap Tool
-----------------------------------------------------------------
18
Outline
Introduction
Port Scanning
 Nmap
 Anti-Port Scanning
 Reference
19
Introduction
IP Addresses: Finding out an IP Address
 Through Instant Messaging Software
 Through Internet Relay Chat
 Through Your website
 Through Email Headers
20
21
Port Scanning
 Port Scanning is normally the first step that an
attacker undertakes.
 List of Open Ports
 Services Running
 Exact Names and Versions of all the Services or
Daemons.
 Operating System name and version
Blowfish Cryptosystem
Major Tools Available
 Some of the best and the most commonly used Port
Scanners are:
 Nmap
 Superscan
 Hping
 Nessus
 Common Features of all above Port Scanners:
 Very Easy to Use
 Display Detailed Results
23
Nmap
 Nmap (Network Mapper) is a security scanner originally
written by Gordon Lyon , (1997).
 Is a free and open source, Website nmap.org.
 Nmap runs on all major computer operating systems
 Used to discover
 hosts and services on acomputer network, and security
auditing
 Thus creating a "map" of the network.
24
25
 Determain what..
 operating systems
 vulnerability detection.
 It was designed to rapidly scan large networks
 Nmap is also capable of adapting to network
conditions including latency and congestion during a
scan
 Nmap sends specially crafted packets to the target
host and then analyzes the responses.
Nmap features
 Host discovery
 Port scanning
 Version detection
 OS detection
 Nmap can provide further information on targets,
including reverse DNS names, device types, and
MAC addresses.
26
27
28
29
Anti-Port Scanning
 Some useful Anti-Port Scanning software available
are:
 Scanlogd
 BlackICE
 Snort
 Abacus Port sentry
 And multi tools using to hide the IP address .
30
Reference
 http://nmap.org/book/man.html
 http://nmap.org/book/install.html
 http://nmap.org/nsedoc
 H.mondo89@yahoo.com
31

More Related Content

PPTX
Understanding NMAP
PDF
AES by example
PPTX
PPTX
Transposition Cipher
PPT
DES (Data Encryption Standard) pressentation
PPTX
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Understanding NMAP
AES by example
Transposition Cipher
DES (Data Encryption Standard) pressentation
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...

What's hot (20)

PDF
symmetric key encryption algorithms
PDF
2. Stream Ciphers
PDF
Introduction to Cryptography
PPTX
Introduction to Cryptography
PPTX
3 public key cryptography
PPTX
Kerberos
PPT
Polyalphabetic Substitution Cipher
PPTX
Cryptography.ppt
PPT
Software security
PDF
Nmap basics
PPTX
Rest API Security - A quick understanding of Rest API Security
PPTX
SHA- Secure hashing algorithm
PPTX
Blow fish final ppt
PPTX
Cryptography.ppt
PPT
Secure Socket Layer
PDF
Hacking With Nmap - Scanning Techniques
PDF
Nmap Basics
PPTX
Symmetric and asymmetric key cryptography
PPTX
Keyloggers
symmetric key encryption algorithms
2. Stream Ciphers
Introduction to Cryptography
Introduction to Cryptography
3 public key cryptography
Kerberos
Polyalphabetic Substitution Cipher
Cryptography.ppt
Software security
Nmap basics
Rest API Security - A quick understanding of Rest API Security
SHA- Secure hashing algorithm
Blow fish final ppt
Cryptography.ppt
Secure Socket Layer
Hacking With Nmap - Scanning Techniques
Nmap Basics
Symmetric and asymmetric key cryptography
Keyloggers
Ad

Similar to Blowfish Cryptosystem (20)

PDF
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
PDF
An exhaustive review of the stream ciphers and their performance analysis
PDF
Performance and Power Consumption Analysis of Symmetric Encryption Algorithms...
PDF
26.1.7 lab snort and firewall rules
PDF
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
PDF
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
PDF
Pluribus SDN Technology
PPTX
Ospf routing protocol in gns3
PDF
Modification of l3 learning switch code for firewall functionality in pox con...
PDF
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
PDF
Real-time applications on IntelXeon/Phi
PDF
Network analysis Using Wireshark Lesson 3: locating wireshark
PDF
Explorando Go em Ambiente Embarcado
PDF
(Open) MPI, Parallel Computing, Life, the Universe, and Everything
ODP
Code Red Security
PDF
Networking in Java with NIO and Netty
PDF
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
PDF
IPSflexresponse-eng
PDF
TiReX: Tiled Regular eXpression matching architecture
PPTX
We will charge you. How to [b]reach vendor’s network using EV charging station.
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
An exhaustive review of the stream ciphers and their performance analysis
Performance and Power Consumption Analysis of Symmetric Encryption Algorithms...
26.1.7 lab snort and firewall rules
Simple AEAD Hardware Interface SAEHI in a SoC: Implementing an On-Chip Keyak/...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
Pluribus SDN Technology
Ospf routing protocol in gns3
Modification of l3 learning switch code for firewall functionality in pox con...
MICRO ROTOR ENHANCED BLOCK CIPHER DESIGNED FOR EIGHT BITS MICRO-CONTROLLERS (...
Real-time applications on IntelXeon/Phi
Network analysis Using Wireshark Lesson 3: locating wireshark
Explorando Go em Ambiente Embarcado
(Open) MPI, Parallel Computing, Life, the Universe, and Everything
Code Red Security
Networking in Java with NIO and Netty
Laporan Praktikum Keamanan Siber - Tugas 4 -Kelas C - Kelompok 3.pdf
IPSflexresponse-eng
TiReX: Tiled Regular eXpression matching architecture
We will charge you. How to [b]reach vendor’s network using EV charging station.
Ad

Recently uploaded (20)

PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Cell Structure & Organelles in detailed.
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PDF
Pre independence Education in Inndia.pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
PPTX
NOI Hackathon - Summer Edition - GreenThumber.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
TR - Agricultural Crops Production NC III.pdf
Insiders guide to clinical Medicine.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Cell Structure & Organelles in detailed.
Open folder Downloads.pdf yes yes ges yes
The Final Stretch: How to Release a Game and Not Die in the Process.
human mycosis Human fungal infections are called human mycosis..pptx
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Microbial disease of the cardiovascular and lymphatic systems
Cardiovascular Pharmacology for pharmacy students.pptx
Pre independence Education in Inndia.pdf
Week 4 Term 3 Study Techniques revisited.pptx
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
NOI Hackathon - Summer Edition - GreenThumber.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
STATICS OF THE RIGID BODIES Hibbelers.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
COMPUTERS AS DATA ANALYSIS IN PRECLINICAL DEVELOPMENT.pptx

Blowfish Cryptosystem