Performance and security analysis using B-128 modified blowfish algorithm

被引:7
作者
Kumar, Sunil [1 ]
Kumar, Dilip [1 ]
Singh, Naini [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Jamshedpur, India
关键词
Encryption; Decryption; Security; Blowfish; Block size; Throughput; Avalanche effect; IMAGE ENCRYPTION;
D O I
10.1007/s11042-023-15038-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is a domain having extensive applications in the twenty-first century and beyond. Encryption is a technique used to prevent data from being accessed without authorization. Symmetric key encryption algorithms are extremely fast compared to asymmetric key algorithms and hence, are used widely. Blowfish is a symmetric key encryption algorithm that is unpatented, free-to-use, fast, compact, and efficient. It is also a very secure algorithm. But, its 64-bit block size prevents it from being widespread. The paper aims to propose a modified version of the Blowfish algorithm that performs high-speed encryption with high throughput and supports 128-bit block size, enhancing its applicability in various areas. The algorithm can be an alternative to the AES algorithm with limited power consumption. The proposed algorithm is compared with the original Blowfish algorithm based on execution speed, throughput, and the avalanche effect. The algorithm's performance is also evaluated on images based on diffusion properties, image histogram, entropy, and correlation coefficient.
引用
收藏
页码:26661 / 26678
页数:18
相关论文
共 30 条
[1]  
Alabaichi Ashwak, 2013, 2013 Second International Conference on Informatics & Applications (ICIA), P12, DOI 10.1109/ICoIA.2013.6650222
[2]   A new hybrid digital chaotic system with applications in image encryption [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Sen Teh, Je ;
Alkhawaldeh, Rami S. .
SIGNAL PROCESSING, 2019, 160 :45-58
[3]  
At N., 2012, Proceedings of the Fifth IFIP International Conference on New Technologies, Mobility and Security-NTMS 2012, P1
[4]  
Bahnasawi MA, 2016, INT C MICROELECTRON, P285, DOI 10.1109/ICM.2016.7847871
[5]  
Christina L., 2014, INT J INNOV RES COMP, V2, P5009
[6]   Toward the design of adaptive selection strategies for multi-factor authentication [J].
Dasgupta, Dipankar ;
Roy, Arunava ;
Nag, Abhijit .
COMPUTERS & SECURITY, 2016, 63 :85-116
[7]   Extended visual cryptography techniques for true color images [J].
Dhiman, Kirti ;
Kasana, Singara Singh .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 70 :647-658
[8]   Traditional and Hybrid Encryption Techniques: A Survey [J].
Dixit, Pooja ;
Gupta, Avadhesh Kumar ;
Trivedi, Munesh Chandra ;
Yadav, Virendra Kumar .
NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 :239-248
[9]  
Harmouch Y., 2017, ADV INTELL SYST
[10]  
Jang SW, 2017, ANAL APPL MATH, V10, P5