{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Assignment3

# Assignment3 - I Travis McPeak pledge that this is my own...

This preview shows pages 1–3. Sign up to view the full content.

I, Travis McPeak, pledge that this is my own independent work, which conforms to the guidelines of academic honesty as described in the course syllabus. Travis McPeak October 14, 2008 CECS 478 Homework #3 Blowfish Description: According to the official web site 1 of the Blowfish Encryption Algorithm, “Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA”. This means that Blowfish is a method for encrypting (hiding the content) of a data-stream (or a written message). Since it is a block cipher it encrypts messages in blocks rather than encrypting individual bytes (or bits) at a time. The web site states: “Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.” Perhaps because of the last sentence, Schneier notes on his blog: “Two nights ago, my encryption algorithm Blowfish was mentioned on the Fox show "24." An alleged computer expert from the fictional anti-terror agency CTU was trying to retrieve some files from a terrorist's laptop. This is the exchange between the agent and the terrorist's girlfriend: They used Blowfish algorithm. How can you tell? By the tab on the file headers. Can you decrypt it? CTU has a proprietary algorithm. It shouldn't take that long. We'll start by trying to hack the password. Let's start with the basics. Write down nicknames, birthdays, pets -- anything you think he might have used.” 1 http://www.schneier.com/blowfish.html Accessed October 4, 2008

This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document
I, Travis McPeak, pledge that t academ Wikipedia provides a sim encrypted with a key with a size to generate unique sub-key P an on the key and the hexadecimal appear to be random and it is po any previous digits.
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

### Page1 / 4

Assignment3 - I Travis McPeak pledge that this is my own...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document
Ask a homework question - tutors are online