scispace - formally typeset
Open AccessJournal ArticleDOI

Modified Blowfish algorithm analysis using derivation cases

TLDR
In this paper, the modified Blowfish algorithm (MBA) was analyzed and enhanced with two derivation processes in the f-function which was originally placed to prevent symmetry, and the derivation case was analyzed using avalanche effect and time efficiency.
Abstract
This study analyzed and enhanced the modified Blowfish algorithm (MBA) encryption. The modification retained the original structure, process and the use of two S-boxes in the MBA but presented two derivation processes in the f-function which was originally placed to prevent symmetry. The derivation case’s performance was analyzed using avalanche effect and time efficiency. After comparing the first and second derivation process presented in the MBA, the second derivation further improved the avalanche effect by 5.47%, thus improving security. The performance also showed that the second modification is faster by 39.48% in encryption time, and 38.34% faster in decryption time. The first derivation case in the modified Blowfish was slower in time because of the difference in the placement of the shift rotation. The key generation time was found to be independent of the input size while the encryption and decryption time was found to be directly proportional to file size. With this, the second modification is considered to be better.

read more

Citations
More filters
References
More filters
Journal ArticleDOI

A Comprehensive Evaluation of Cryptographic Algorithms

TL;DR: Cost and performance of popularly used cryptographic algorithms DES, 3DES, AES, RSA, RSA and blowfish are implemented and analyzed in detail to show an overall performance analysis, unlike only theoretical comparisons.
Journal ArticleDOI

A Review and Comparative Analysis of Various Encryption Algorithms

TL;DR: This paper has analysed various encryption algorithms on the basis of different parameters and compared them to choose the best data encryption algorithm so that the user can use it in their future work.
Journal ArticleDOI

A Survey on the Cryptographic Encryption Algorithms

TL;DR: This paper evaluated and compared the performance of these encryption algorithms based on encryption and decryption time, throughput, key size, avalanche effect, memory, correlation assessment and entropy, and choose a suitable encryption algorithm based on different parameters that are best fit to the user requirements.
Journal ArticleDOI

Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling

TL;DR: The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography.
Journal ArticleDOI

Comparative Study of Different Cryptographic Algorithms

TL;DR: Comparison of comparative encryption algorithms in performance of three most useful algorithms: Data Encryption Standard (DES), Triple DES (3DES) also known as Triple Data Enc encryption Algorithm (TDEA), and Advanced Enc encryption Standard (AES).