Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data

被引:10
作者
Adeniyi, Abidemi Emmanuel [1 ]
Misra, Sanjay [2 ]
Daniel, Eniola [3 ]
Bokolo, Anthony, Jr. [4 ]
机构
[1] Precious Cornerstone Univ, Dept Comp Sci, Ibadan 200223, Nigeria
[2] Ostfold Univ Coll, Dept Comp Sci & Commun, N-1757 Halden, Norway
[3] Landmark Univ, Dept Comp Sci, Omu Aran 251103, Nigeria
[4] Inst Energy Technol, Dept Appl Data Sci, N-1777 Halden, Norway
关键词
time complexity; cryptographic algorithms; modified blowfish algorithm; blowfish algorithm; security;
D O I
10.3390/a15100373
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques. Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance. Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data. After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect. Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish. Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better. Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.7176% for normal Blowfish and 43.3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish. Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.0 ms for normal Blowfish and 248.4 ms for the modified Blowfish algorithm. Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.
引用
收藏
页数:14
相关论文
共 29 条
[1]  
Abiodun M.K., 2021, Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities, P189
[2]   Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions [J].
Adeniyi, Emmanuel A. ;
Falola, Peace Busola ;
Maashi, Mashael S. ;
Aljebreen, Mohammed ;
Bharany, Salil .
INFORMATION, 2022, 13 (10)
[3]  
Agrawal M., 2012, INT J ENG ADV TECHNO, V1 no, P79
[4]  
Alanazi H., 2010, ARXIV
[5]  
[Anonymous], 2013, 2013 15 INT C ADV CO
[6]  
Aumasson J.-P., 2017, Serious Cryptography: A Practical Introduction to Modern Encryption
[7]  
Barona R., 2017, P 2017 INT C CIRCUIT, P1
[8]   Secure knowledge management: Confidentiality, trust, and privacy [J].
Bertino, Elisa ;
Khan, Latifur R. ;
Sandhu, Ravi ;
Thuraisingham, Bhavani .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03) :429-438
[9]  
Christina L., 2014, INT J INNOV RES COMP, V2, P5009
[10]   Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing [J].
Corpuz, Reynaldo R. ;
Gerardo, Bobby D. ;
Medina, Ruji P. .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, :157-162