Generating Cipher Text using BLOWFISH Algorithm for Secured Data Communications
Ch. Usha Kumari1, T. Pavani2, A. Sampath Dakshina Murthy3, B. Lakshmi Prasanna4, M. Pala Prasad Reddy5

1Ch. Usha Kumari*, Gokaraju Rangaraju Institute of Engineering and Technology, Dept. of ECE, Hyderabad, Telangana, India.
2T. Pavani, Gokaraju Rangaraju Institute of Engineering and Technology, Dept. of ECE, Hyderabad, Telangana, India.
3A. Sampath Dakshina Murthy, Vignan’s Institute Of Information Technology, Dept. of ECE, VIIT, Visakhapatnam, India.
4B. Lakshmi Prasanna, Institute of Aeronautical Engineering, Hyderabad, Dept. of ECE, Hyderabad, Telangana, India.
5M Pala Prasad Reddy, Institute of Aeronautical Engineering, Dept. of EEE Hyderabad, Telangana, India.

Manuscript received on November 15, 2019. | Revised Manuscript received on 20 November, 2019. | Manuscript published on December 10, 2019. | PP: 117-121 | Volume-9 Issue-2, December 2019. | Retrieval Number: A5063119119/2019©BEIESP | DOI: 10.35940/ijitee.A5063.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Cryptography plays a major role in the network security. In order to secure the data one must do encryption of the original message. In this paper, the design and analysis of high speed and high performance BLOWFISH algorithm is implemented in VHDL coding and compared with AES (Advanced Encryption Standard) algorithm. The BLOWFISH algorithm involves the process of giving the data and key as input to the encryption block. BLOWFISH encryption algorithm is designed and programmed in VHDL coding. Then it is implemented in Xilinx 10.1. This research is carried in the following steps: designing of encryption algorithm, writing VHDL code, simulating the code on “ModelSim altera 6.5e”, synthesizing and implementing the code using Xilinx’s ISE 10.1.This research aims in developing flexible and technology independent architectures in the areas of VPN software, file compression, public domain software such as smart cards, etc. Also presents the comparison of BLOWFISH and AES algorithms. Experimental results show that BLOWFISH algorithm runs faster than AES algorithm while both of them consume almost the same Power. Keywords: BLOWFISH algorithm, AES algorithm, Cryptography, Feistel Networks, Encryption.
Keywords: Security, Firefly, Problem Identification, Problem Solving, Performance analysis.
Scope of the Article: Communications