Text this: Security analysis of blowfish algorithm