28
Dynamic Routing With Security Using A Blow Fish Algorithm

Dynamic Routing with Security using a Blow fish Algorithm

Embed Size (px)

DESCRIPTION

This paper proposes dynamic routing with security using a cryptographic algorithm within multiple organization system. The security has become one of the major issues for data communication over worldwide networks.

Citation preview

Page 1: Dynamic Routing with Security using a Blow fish Algorithm

Dynamic Routing With Security

Using A Blow Fish Algorithm

Page 2: Dynamic Routing with Security using a Blow fish Algorithm

CONTENTS 1. Introduction

2. Existing system

3. Proposed system

4. Basic definition and concepts

5. Cryptography system

6. References

7. Conclusion

Page 3: Dynamic Routing with Security using a Blow fish Algorithm

The dynamic routing provides to avoid two consecutive packets on the same link and updates the routing information from neighbors of the router in the network .

Blow fish algorithm which is a strongest security and fast the data processed from the client to the server.

Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA.

It’s common aim to defeat threats over the internet.

INTRODUCTION

Page 4: Dynamic Routing with Security using a Blow fish Algorithm

EXISTING SYSTEM IP Security (IPSec) and the Secure Socket Layer (SSL)

are popularly supported and implemented in many systems and platforms.

Although IPSec and SSL improve the security level for data transmission, they unavoidably introduce substantial overheads.

The algorithm was not provided strong security in the organization system, because it has to be less keys strength. such as DES, Triple DES and AES.

Page 5: Dynamic Routing with Security using a Blow fish Algorithm

PROPOSED SYTEMExplore a strong security enhanced dynamic routing

based on cryptographic algorithm in existing wired and wireless networks.

Dynamic routing algorithm that could be randomizes delivery paths for data transmission over wired and wireless networks.

Providing a strongest security depends on key length from client to server within multiple- autonomous system.

Randomization of delivery paths for data transmission to provide considerably small path similarity

Page 6: Dynamic Routing with Security using a Blow fish Algorithm

ADVANTAGES OF PROPOSED SYSTEM

Over head is minimized.Automation of path setupStrong security and fast data encryption and

decryption.Very less time for bulk encryption and data processed

in the cryptographic system.

Page 7: Dynamic Routing with Security using a Blow fish Algorithm

BASIC DEFINITION AND CONCEPTS Distributed computingAutonomous systems Multi-Autonomous systemClient-Server SystemDynamic routing

Page 8: Dynamic Routing with Security using a Blow fish Algorithm

DISTRIBUTED COMPUTING

It utilizes network of many computers We can share the work among all computersComputational result much more quicklyIt allows many users to interact openlyHigher degree of openness is beneficialIt supports scalability, as the no of systems increased the

overhead on the network

Page 9: Dynamic Routing with Security using a Blow fish Algorithm

AUTONOMOUS SYSTEM

Single administration is needed It uses Interior Gateway Protocol(IGP)IGP is used for Intra-Autonomous communicationIGP is using in single autonomous systems like schools,

colleges, institutions, Banks, and small companies

Page 10: Dynamic Routing with Security using a Blow fish Algorithm

MULTI-AUTONOMOUS SYSEMMultiple organizations with different administrationIt uses Border Gateway Protocol(BGP)It is used for Inter-Autonomous communicationsDifferent from other routing protocols BGP advertisements also include path information, along

with the reachable destination and destination pair It runs over TCP to maintain reliability issuesBGP allows a receiver to authenticate messages, so that

the identity of the sender can be verified

Page 11: Dynamic Routing with Security using a Blow fish Algorithm

CLIENT-SERVER COMPUTING The diagram depicts typical

client server interactionsA server machine is a high

performance host A client machine initiates a

request Client machine shares

resources of server machine

It is a form of distributed computing

Page 12: Dynamic Routing with Security using a Blow fish Algorithm

CRYPTOGRAPHY SYSTEMCryptography is the science of encrypting and decrypting

written communicationCryptanalysis is the process of trying to decrypt encrypted

data without the keyCryptosystem is the system that provides encryption and

decryption

Page 13: Dynamic Routing with Security using a Blow fish Algorithm

CRYPTOGRAPHY SYSTEM (contd.)Plaintext: actual data Encryption alg:performs

substitutions and transformations on plain text

Cipher text: encrypted data

Secret key: input to the algorithm

Decryption alg: convert the cipher text in to plain text

Page 14: Dynamic Routing with Security using a Blow fish Algorithm

BLOW FISH ALGORITHMBlowfish is a symmetric block cipher that can be

effectively used for encryption and safeguarding of data. It takes a variable-length key, from 32 bits to 448 bits,

making it ideal for securing data. Blowfish was designed in 1993 by Bruce Schneier as a

fast, free alternative to existing encryption algorithms. Blowfish is unpatented and license-free, and is available

free for all uses.

Page 15: Dynamic Routing with Security using a Blow fish Algorithm

BLOW FISH ALGORITHMBlowfish Algorithm is a Feistel Network, iterating a

simple encryption function 16 times. The block size is 64 bits, and the key can be any length up

to 448 bits. Although there is a complex initialization phase required

before any encryption can take place, the actual encryption of data is very efficient on large microprocessors.

Page 16: Dynamic Routing with Security using a Blow fish Algorithm

FEISTEL NETWORKSA Feistel network is a general method of transforming any

function (usually called an Ffunction). The working of a Feistal Network is given below:

Split each block into halves Right half becomes new left half New right half is the final result when the left half is

XOR’d with the result of applying f to the right half and the key.

Note that previous rounds can be derived even if the function f is not invertible.

Page 17: Dynamic Routing with Security using a Blow fish Algorithm

FEISTEL NETWORK

Page 18: Dynamic Routing with Security using a Blow fish Algorithm

BLOW FISH ALGORITHM Manipulates data in large blocks Has a 64-bit block size. Has a scalable key, from 32 bits to at least 256 bits. Uses simple operations that are efficient on

microprocessors.

Page 19: Dynamic Routing with Security using a Blow fish Algorithm

BLOW FISH ALGORITHMBlowfish uses a large number of sub keys. These keys

must be precomputed before any data encryption or decryption

The P-array consists of 18 32-bit subkeys:P1, P2,..., P18There are four 32-bit S-boxes with 256 entries eachS1,0, S1,1,..., S1,255S2,0, S2,1,..,, S2,255S3,0, S3,1,..., S3,255S4,0, S4,1,..,, S4,255

Page 20: Dynamic Routing with Security using a Blow fish Algorithm

BLOW FISH ALGORITHMBlowfish has 16 rounds.The input is a 64-bit data element, x.Divide x into two 32-bit halves: xL, xR.Then, for i = 1 to 16:xL = xL XOR PixR = F(xL) XOR xRSwap xL and xRAfter the sixteenth round, swap xL and xR again to undo

the last swap.

Page 21: Dynamic Routing with Security using a Blow fish Algorithm

BLOW FISH ALGORITHMSwap xL and xRAfter the sixteenth round, swap xL and xR again to undo

the last swap.Then, xR = xR XOR P17 and xL = xL XOR P18.Finally, recombine xL and xR to get the ciphertext.

Page 22: Dynamic Routing with Security using a Blow fish Algorithm
Page 23: Dynamic Routing with Security using a Blow fish Algorithm

REPRESENTATION OF ‘F’

Page 24: Dynamic Routing with Security using a Blow fish Algorithm

APPLICATIONS OF ALGORITHMBulk encryption: The algorithm should be efficient in

encrypting data files or a continuous data stream. Packet encryption: The algorithm should be efficient in

encrypting packet-sized data. (An ATM packet has a 48- byte data field.)

Hashing: The algorithm should be efficient in being converted to a one way hash function.

This algorithm is implemented on large, medium and small size processors.

Page 25: Dynamic Routing with Security using a Blow fish Algorithm

COMPARISONS

Page 26: Dynamic Routing with Security using a Blow fish Algorithm

CONCLUSIONIn this paper main objective is provide a fast data

encryption and decryption and strong security for data communication in the multiple-organization system.

The objective of the paper is a taking very less time for data processing to other algorithm and cost also very less to implement any kinds of the large networks we may use this algorithm, so The dynamic routing with security for data transmission in the multiple-organizations system

Page 27: Dynamic Routing with Security using a Blow fish Algorithm

Queries?

Page 28: Dynamic Routing with Security using a Blow fish Algorithm

REFERENCES B. Schneier, Applied Cryptography,

John Wiley & Sons, New York, 1994. B. Schneier, Description of a New Variable-Length Key,

64-Bit Block Cipher (Blowfish)Fast Software Encryption, Cambridge Security Workshop

Proceedings

(December 1993), Springer-Verlag, 1994, pp. 191-204.