Assignment3 - I, Travis McPeak, pledge that this is my own...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
I, Travis McPeak, pledge that this is my own independent work, which conforms to the guidelines of academic honesty as described in the course syllabus. Travis McPeak October 14, 2008 CECS 478 Homework #3 Blowfish Description: According to the official web site 1 of the Blowfish Encryption Algorithm, “Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA”. This means that Blowfish is a method for encrypting (hiding the content) of a data-stream (or a written message). Since it is a block cipher it encrypts messages in blocks rather than encrypting individual bytes (or bits) at a time. The web site states: “Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. Blowfish is unpatented and license-free, and is available free for all uses.” Perhaps because of the last sentence, Schneier notes on his blog: “Two nights ago, my encryption algorithm Blowfish was mentioned on the Fox show "24." An alleged computer expert from the fictional anti-terror agency CTU was trying to retrieve some files from a terrorist's laptop. This is the exchange between the agent and the terrorist's girlfriend: They used Blowfish algorithm. How can you tell? By the tab on the file headers. Can you decrypt it? CTU has a proprietary algorithm. It shouldn't take that long. We'll start by trying to hack the password. Let's start with the basics. Write down nicknames, birthdays, pets -- anything you think he might have used.” 1 Accessed October 4, 2008
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
I, Travis McPeak, pledge that t academ Wikipedia provides a sim encrypted with a key with a size to generate unique sub-key P an on the key and the hexadecimal appear to be random and it is po any previous digits. The sub-key array gener
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/20/2010 for the course CECS 478 taught by Professor Englert during the Spring '10 term at CSU Long Beach.

Page1 / 4

Assignment3 - I, Travis McPeak, pledge that this is my own...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online