{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Assignment3

# Assignment3 - Andrew Maselli...

This preview shows pages 1–3. Sign up to view the full content.

http://en.wikipedia.org/wiki/Image:Ssh_b Andrew Maselli March 08, 2010 CECS 478 Homework #3 I, Andrew Maselli, pledge that this is my own independent work, which conforms to the guidelines of academic honesty as described in the course syllabus. RC4 encryption Algorithm According to the official web site 1 of the Blowfish Encryption Algorithm, “Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA”. This means that Blowfish is a method for encrypting (hiding the content) of a data-stream (or a written message). Since it is a block cipher it encrypts messages in blocks rather than encrypting individual bytes (or bits) at a time. The web site states: “Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.” Perhaps because of the last sentence, Schneier notes on his blog: “Two nights ago, my encryption algorithm Blowfish was mentioned on the Fox show "24." An alleged computer expert from the fictional anti-terror agency CTU was trying to retrieve some files from a terrorist's laptop. This is the exchange between the agent and the terrorist's girlfriend: They used Blowfish algorithm. How can you tell? By the tab on the file headers. Can you decrypt it? CTU has a proprietary algorithm. It shouldn't take that long. We'll start by trying to hack the password. Let's start with the basics. Write down nicknames, birthdays, pets -- anything you think he might have used.” 1 http://www.schneier.com/blowfish.html Accessed October 4, 2008

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
Wikipedia provides a simplified description of how Blowfish works 2 . The cipher text is encrypted with a key with a size that is a multiple of 8 ranging from 32-448 bits.
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

### Page1 / 5

Assignment3 - Andrew Maselli...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document
Ask a homework question - tutors are online