www.tjprc.org editor@tjprc.org
International Journal of Computer Science Engineering
and Information Technology Research (IJCSEITR)
ISSN(P): 2249-6831; ISSN(E): 2249-7943
Vol. 4, Issue 2, Apr 2014, 143-148
© TJPRC Pvt. Ltd.
SECURE IMAGE SHARING WITH ENCRYPTION OF BLOWFISH, AES AND RC4
HYBRID ALGORITHM WITH HASH FUNCTION
RAVINDER KAUR
1
, PANKAJ SHARMA
2
& MEENAKSHI SHARMA
3
1
M.Tech Student, Department of CSE, Sri Sai College of Engg. and Technology, Pathankot, Badhani, Punjab, India
2
Assistant Professor, Department of CSE, Sri Sai College of Engg. and Technology, Pathankot, Badhani, Punjab, India
3
Associate Professor, Department of CSE, Sri Sai College of Engg. and Technology, Pathankot, Badhani, Punjab, India
ABSTRACT
Grid computing is a distributed network in which several processors distributed globally and sharing the
computational resources to solve various problems. Security in every network is now a must and important part for the
successful communication in network. Normally network security is at much higher level on outer part of the network than
the inside part. This property of security sometime can act as hot cake for network intruders. Insider attacks combined with
various worm attacks could prove to be the bottleneck and disaster for network. There is need of optimized approaches to
handle such security issues. In our research we will focus on the combination of Advance Encryption Standard (AES) and
Rivest Cipher version 4 (RC4) to provide strong combination of encryption to defend against discussed security concerns
and then provide some hiding functions with help of hash functions such as MD5 or SHA1. Advance encryption standard
(AES) provides solution for security with whitener (Whitening is used to enhance the security of the cipher) with multiple
matrix in RC4 algorithm which is ten converted with hash function for best secure communication. Combination will prove
to be best fit for providing security with secret key to each and every block of AES combined with whitened text. RC4 will
produce multiple three layer matrix with different combination to enhance security which is finally interated with hash
function for providing hashed data which will provide more security in communication. Blowfish is a symmetric
blockcipher that can be effectively used for encryption and safeguarding of data. It takes a variable-length key, from 32 bits
to 448 bits, making it ideal for securingdata. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to
existing encryption algorithms. Blowfish is unpatented and license-free, and is available free for all uses.
KEYWORDS: Advance Encryption Standard, Rivest Cipher, Message Digest Level 5, SHA1, Grid Computing, Whiten
Text, Bluefish
INTRODUCTION
Security requirements within the distributed environment are based on the size of network and resources it require
for communication. In now a day ‟s many network services are tends to seek strong security measures as services are so
distributed in nature that once it broke or corrupted, then it is difficult to recover and recovery cost is very high.
Cryptography is an art of encrypting a plaintext such that it is rendered unreadable to others except the person for whom
the message is intended [1]. Encryption is the good solution for major types of attacks in the distributed network
environment. Cryptography renders the message unintelligible to outsider by various transformations [2].
Data cryptography is the scrambling of the content of data like text, image, audio and video to make it unreadable or
unintelligible during transmission. Its main goal is to keep the data secure from unauthorized access [3].