Three Fish Algorithm: T-Mix Cipher using SHA-256
Open Access
- 30 September 2022
- journal article
- Published by Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP in International Journal of Innovative Technology and Exploring Engineering
- Vol. 11 (10), 5-11
- https://doi.org/10.35940/ijitee.j9267.09111022
Abstract
In every organization, use of online services is increasing. With this the sensitive data is carried over internet on daily basis. Hence, there is a chance of misleading the data by unauthorized parties. So, there is need to provide security for that data and cryptography is the science that helps in providing security. By using cryptography different types of security algorithms have been developed. Three fish is a symmetric-key and tweakable block cipher algorithm designed as a part of the skein hash function. The strength of three fish encryption relies on 128-bit tweak value. The proposed work focuses on strengthening Encryption Process by implementing tweak buffer along with input. Whereas key scheduling is secured by applying SHA-256 algorithm. SHA-256 is a secured hash function which belongs to SHA-2 family. Three Fish is used in providing security on software and hardware. It is also implemented in electronic media such as transactions like banking.Keywords
This publication has 5 references indexed in Scilit:
- Design and implementation of Threefish cipher algorithm in PNG fileSustainable Engineering and Innovation, 2021
- A Novel Modular Approach Based Substitution-Box Design for Image EncryptionIEEE Access, 2020
- Modified Blowfish AlgorithmIndonesian Journal of Electrical Engineering and Computer Science, 2018
- A Review and Comparative Analysis of Various Encryption AlgorithmsInternational Journal of Security and Its Applications, 2015
- Compact Implementation of Threefish and Skein on FPGAPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2012