Fig 5 - uploaded by Rajan Patel
Content may be subject to copyright.
Minimum to maximum Blowfish round execution

Minimum to maximum Blowfish round execution

Source publication
Conference Paper
Full-text available
Cryptography is the first line of defense to protect the data from intruder. Symmetric cryptography and asymmetric cryptography are two cryptographic based algorithms that serve the security goals: confidentiality, availability, authentication and integrity. Asymmetric algorithms are known as public key cryptography that uses two keys: one public k...

Context in source publication

Context 1
... single 64 bits block encryption executing time of Blowfish block cipher is 555 μs with 1 GB Pentium Dual 2.20 GHz CPU, 1 GB RAM and 32 bit Operating System configuration parameters. Figure 5 represents that as number of rounds increase, the encryption time is also increase. However the encryption operation time can reduce by decreasing the total number of Blowfish rounds operation instead of regular sixteen Blowfish rounds. ...

Similar publications

Preprint
Full-text available
In modern as well as ancient ciphers of public key cryptography, substitution boxes find a permanent seat. Generation and cryptanalysis of 4-bit as well as 8-bit crypto S-boxes is of utmost importance in modern cryptography. In this paper, a detailed review of cryptographic properties of S-boxes has been illustrated. The generation of crypto S-boxe...
Article
Full-text available
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. One of the main fields of information security is the concept of hidden exchange of information. For this purpose, various methods inclu...
Chapter
Full-text available
Today, users work with many types of data whether it be text, audio, video, or picture file. Storing of such data is of crucial importance. The current trend that provides with easy storage and access to our data is cloud. Cloud computing is a way to manage all such data at a place and access them as and when required. With this storage, it is impo...
Conference Paper
Full-text available
The idea of the Internet of Things (IoT) is to connect or give access to everything to the Internet. IoT environment not only provides the facility of Human to Machine connectivity, however, it also creates Machine to Machine connectivity. As everything is going to connect to the Internet and also generating the data. So, the data generating by the...
Preprint
Full-text available
Healthcare is an essential application of e-services, where for diagnostic testing, medical imaging acquiring, processing, analysis, storage, and protection are used. Image ciphering during storage and transmission over the networks used has seen implemented using many types of ciphering algorithms for security purpose. Current cyphering algorithms...

Citations

... The conclusion was that Blowfish emerged as the most suitable algorithm, especially when constrained by time and memory. Rajan Patel and Pariza Kamboj, as outlined in [12], introduced an enhancement scheme for the Blowfish algorithm. They achieved this by reducing the number of encryption rounds using a special key, bolstering security against bruteforce attacks. ...
Article
Full-text available
Within Wireless Body Area Networks (WBANs), wearable devices (WDs) capture vital parameters and process this information. The processed data is then conveyed to a wearable device controller (WDC) before being securely archived within a medical server. Data privacy preservation becomes imperative, preventing unauthorized access and potential compromise. The focal point of the presented research centers on safeguarding data privacy. This objective is accomplished through a two-fold approach: firstly, by encrypting the data within the wearable device controller before storage in the server; secondly, by regulating access to the data for different entities seeking to retrieve it. The innovation of this work lies in its emphasis on ensuring privacy within the wearable device controller itself. It is shown that privacy is obtained using minimum computations. Also, security analysis is performed by identifying various threats and how it is addressed. The encryption process, key generation, and key refreshing are executed employing the MATLAB programming environment.
... Furthermore, the suggested approach reduces the blowfish cipher's execution time [19]. In contrast, Ross and Josephraj achieved a parallel processing technique in 2017 by modifying the Feistel F-function of Blowfish using the Runge-Kutta (RK) method. ...
... Blowfish operations were done using the shared secret key. It uses a variable-length key ranging from 32 to 448 bits, with 128 bits being the default [7,19,[26][27][28]. The structure of this algorithm for the encryption process is shown in Figure 3. ...
... F-Function[19] ...
... Some Blowfish modifications focused on changing the number of rounds to increase speed and, in turn, improve protection [24] [13] [17] [19]. Although a minimum of 5 rounds was stated, no minimum number was specified [25]. Also, modify was used to reduce the number of S-Boxes from four to two [10] [15]. ...
Article
Full-text available
Data has become increasingly popular for advanced digital content transmission. Researchers are concerned about the protection of data. The transmission of digital data over a network has made multimedia data vulnerable to various threats, including unauthorized access and network hacking. As a result, the data must be protected with encryption methods based on symmetric encryption algorithms, which will ensure the data security. The Blowfish encryption algorithm is one of the most well-known cryptographic algorithms. However, each of the current algorithms has its own set of advantages and disadvantages. However, there are several drawbacks to using this algorithm, including complex computational operations, fixed (S-Box) and pattern issues, which can arise while dealing with more complex data, including texts. Many academics have sought to increase the algorithm's efficiency. The modifications to the Blowfish algorithms provided by researchers in prior works are summarized in this publication.
... Some Blowfish modifications focused on changing the number of rounds to increase speed and, in turn, improve protection [24] [13] [17] [19]. Although a minimum of 5 rounds was stated, no minimum number was specified [25]. Also, modify was used to reduce the number of S-Boxes from four to two [10] [15]. ...
Article
Full-text available
Data has become increasingly popular for advanced digital content transmission. Researchers are concerned about the protection of data. The transmission of digital data over a network has made multimedia data vulnerable to various threats, including unauthorized access and network hacking. As a result, the data must be protected with encryption methods based on symmetric encryption algorithms, which will ensure the data security. The Blowfish encryption algorithm is one of the most well-known cryptographic algorithms. However, each of the current algorithms has its own set of advantages and disadvantages. However, there are several drawbacks to using this algorithm, including complex computational operations, fixed (S-Box) and pattern issues, which can arise while dealing with more complex data, including texts. Many academics have sought to increase the algorithm's efficiency. The modifications to the Blowfish algorithms provided by researchers in prior works are summarized in this publication.
... The Blowfish F Function[9,10] ...
Article
Full-text available
With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.
... In distributed computing, linear rules have been generated for applications based on analysis of equal length cellular automata [28]. A new variable length key with respect of 64 bit block cipher has been described using blowfish algorithm [29]. Two practical and probable secure block have been represented using two-fish algorithm [30]. ...
Article
Full-text available
Authors propose a hardware based approach for reliable encryption in wireless network using Cellular Automata (CA). Distinct layers of encryption have been utilized in proposed model for enhancing data security. Transmitter and receiver modules are designed for performing state transition based encrypted activities. Transmitter module is required for capturing environmental turbulences (noise) from a specific geographical location and send encrypted signal to receiver module through wireless network. Receiver module analyses received signal after decryption for desired activities based on real time situations. Different hardware components are selected and compared based on market study targeting efficient construction of proposed modules. Time complexity and code break complexity are measured using different key lengths, keysets, and data sizes for proposed CA based encryption scheme achieving unique results in hardware based cryptography system. Encryption key length, index, and keyset are required for computing code break complexity in design model. Large data size is effectively managed to calculate protection ratio and reliability factor for realizing efficient protectiveness and accuracy. Comparative study between existing encryption technique and proposed CA based encryption technique is established based on time complexity and code break complexity.
... The first level is the symmetric key Blo wfis h cryptography technique. In this technique, the message is encrypted and converted into unreadable data as detailed in [19][20]. The second level is the steganography of the 3D image. ...
... After 16 rounds, keeping the previous addition and XOR operations fixed and swapping their results. The encrypted data is produced as detailed in [20] co mbin ing the message and the key. The ciphertext undergoes the inverse process of encryption using the same key and the undo swaps. ...
... Some researchers focused on the security aspect by modifying the f-function [27]- [29], but the latter concluded that the original blowfish algorithm was still more compact and more secure. Some optimizations on blowfish concentrated on the modification of the number of rounds to increase speed and ultimately enhance security [30] Although there was a mention of a minimum of five rounds, there was no minimum number set [31]. However, the recommended number of rounds is 16-8. ...
Article
Full-text available
Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry. The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower with key, encryption, and decryption average of 26.99ms, 1651.83ms, and 2765.04ms compared to blowfish with 21.65ms, 1297.76ms and 2176.59ms due to block size difference. Applying 128-bit block size increases security by decreasing the chances of having duplicate blocks that may leak information. The modified Blowfish is faster compared to Twofish with an encryption and decryption average time of 2418.08ms and 4002.70ms. The added derivation improved the avalanche of the modified blowfish. Blowfish achieved 47.14% while modified Blowfish attained 52.86%. © 2018 Institute of Advanced Engineering and Science All rights reserved.
... Some researchers focused on the security aspect by modifying the f-function [27]- [29], but the latter concluded that the original blowfish algorithm was still more compact and more secure. Some optimizations on blowfish concentrated on the modification of the number of rounds to increase speed and ultimately enhance security [30] Although there was a mention of a minimum of five rounds, there was no minimum number set [31]. However, the recommended number of rounds is 16-8. ...
Article
Full-text available
Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry. The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower with key, encryption, and decryption average of 26.99ms, 1651.83ms, and 2765.04ms compared to blowfish with 21.65ms, 1297.76ms and 2176.59ms due to block size difference. Applying 128-bit block size increases security by decreasing the chances of having duplicate blocks that may leak information. The modified Blowfish is faster compared to Twofish with an encryption and decryption average time of 2418.08ms and 4002.70ms. The added derivation improved the avalanche of the modified blowfish. Blowfish achieved 47.14% while modified Blowfish attained 52.86%. © 2018 Institute of Advanced Engineering and Science. All rights reserved.
Chapter
Wireless body area network (WBAN) consists of group of wearable devices placed inside or on the human body and wearable device controller. The devices are used to monitor and measure vital parameters, process them, transfer them to the wearable device controller. If an attacker tries to alter the information, the confidentiality of the data is lost and also it could prove fatal to the person to whom the data belongs to. The paper focuses on achieving confidentiality of the data by encrypting using the Modified Blowfish encryption algorithm. It is proved that the proposed method minimizes the encryption time by 50% as compared with Blowfish algorithm. The value calculated for avalanche of the Modified Blowfish is 48.5% and the Blowfish achieved 47.14%. Matlab is used in the research work for performing encryption of the data.KeywordsWireless body area network securityBlowfishMatlab