Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
Nowadays,
it is important to deliver information in a safe and confidential manner to
specific individuals or entities. As the best way for the defense is to attack,
therefore, cryptanalysis study is important to highlight any weakness of any
security algorithm. Usually, attackers or any third-party tries to intercept to
do any malicious actions that might cause problems. Bluefish encryption is one
of the main methods of protection, which is a 64-bit Feistel network process.
The objective of this review paper is to find out in the literature the
possible cryptanalysis methods that applied to bluefish encryption. Where, the
analyst tries to analyze the ciphers of a particular encryption algorithm by
using many traditional methods. Thus, in this paper, review will be dedicated
for try to analyze the ciphers using artificial intelligence on symmetric
encryption algorithms, such as Blowfish. This approach to cryptanalysis may be
more efficient than traditional methods in terms of accuracy, speed, and memory
usage.
Country : Iraq
IRJIET, Volume 7, Issue 3, March 2023 pp. 111-114