Assignment3 - Andrew Maselli...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon Andrew Maselli March 08, 2010 CECS 478 Homework #3 I, Andrew Maselli, pledge that this is my own independent work, which conforms to the guidelines of academic honesty as described in the course syllabus. RC4 encryption Algorithm According to the official web site 1 of the Blowfish Encryption Algorithm, “Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA”. This means that Blowfish is a method for encrypting (hiding the content) of a data-stream (or a written message). Since it is a block cipher it encrypts messages in blocks rather than encrypting individual bytes (or bits) at a time. The web site states: “Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.” Perhaps because of the last sentence, Schneier notes on his blog: “Two nights ago, my encryption algorithm Blowfish was mentioned on the Fox show "24." An alleged computer expert from the fictional anti-terror agency CTU was trying to retrieve some files from a terrorist's laptop. This is the exchange between the agent and the terrorist's girlfriend: They used Blowfish algorithm. How can you tell? By the tab on the file headers. Can you decrypt it? CTU has a proprietary algorithm. It shouldn't take that long. We'll start by trying to hack the password. Let's start with the basics. Write down nicknames, birthdays, pets -- anything you think he might have used.” 1 Accessed October 4, 2008
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Wikipedia provides a simplified description of how Blowfish works 2 . The cipher text is encrypted with a key with a size that is a multiple of 8 ranging from 32-448 bits.
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 5

Assignment3 - Andrew Maselli...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online