Fast 128-bit Multi-Pass Stream Ciphering Method (original) (raw)

Design and Implementation of an Improvement Of Blowfish Encryption Algorithm

2009

Block cipher is a major part of cipher algorithm like stream cipher and other techniques. Its power comes from dealing with plaintext as parts and operating on each block independently. Blowfish is a secret-key block cipher proposed by B. Shneier. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 8-bytes and the key can be any length up to 56-bytes. In this paper, a Blowfish was improved to encrypt 16-bytes using a variable key length from 8-bytes up to 144-bytes. During the design of Improved Blowfish algorithm, the pragmatic aim was to satisfy as many goals as possible while keeping the cipher simple. Only by keeping a cipher simple one can achieve a well-understood level of security, good performance, and a versatility of design that makes the cipher highly adaptable to future demands. The improved algorithm reduced the memory requirement by using a single S-box instead of four S-boxes without compromising security. The security of improv...

Description of a new variable-length key, 64-bit block cipher (Blowfish)

Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the actual encryption of data is very efficient on large microprocessors.

Development of a New Algorithm for Key and S-Box Generation in Blowfish Algorithm

2014

Blowfish algorithm is a block cipher algorithm, its strong, simple algorithm used to encrypt data in block of size 64-bit. Key and S-box generation process in this algorithm require time and memory space the reasons that make this algorithm not convenient to be used in smart card or application requires changing secret key frequently. In this paper a new key and S-box generation process was developed based on Self Synchronization Stream Cipher (SSS) algorithm where the key generation process for this algorithm was modified to be used with the blowfish algorithm. Test result shows that the generation process requires relatively slow time and reasonably low memory requirement and this enhance the algorithm and gave it the possibility for different usage.

A new multi-level key block cypher based on the Blowfish algorithm

TELKOMNIKA Telecommunication Computing Electronics and Control, 2020

Blowfish is a block cypher algorithm used in many applications to enhance security, but it includes several drawbacks. For example, the mix between the key and data is limited. This paper presents a new modification to the Blowfish algorithm to overcome such problems realised through a multi-state operation instead of an XOR. Our proposed algorithm uses three keys in the encryption and decryption processes instead of one for controlling the variable block bits sizes (1, 2, 4, and 8) bits and for determining the state table numbers. These tables are formed from the addition in a Galois field GF (2 n) based on block bit size to increase the complexity of the proposed algorithm. Results are evaluated based on the criteria of complexity, time encryption, throughout, and histogram, and show that the original Blowfish, those modified by other scholars, and our proposed algorithm are similar in time computation. Our algorithm is demonstrated to be the most complex compared with other well-known and modified algorithms. This increased complexity score for our proposed Blowfish makes it more resistant against attempts to break the keys. Keywords: Blowfish algorithm Encryption security Multi-level keys Symmetric block cipher This is an open access article under the CC BY-SA license. 1. INTRODUCTION Rapid development in information technology has led to a reliance on the transmission of electronic information via networks. As it is necessary to provide secure information environments, many researchers address this security challenge [1, 2]. One method for protecting information is the use of encryption algorithms between two parties involved in communication by converting the message into a human-unrecognisable form [3]. Algorithmic encryption is classified into symmetric key and asymmetric key encryption. Symmetric key encryption uses the same key to implement encryption and decryption, while asymmetric-key encryption incorporates different public and private keys. Symmetric algorithms include block and stream cyphers [4, 5], and Blowfish is an example of a block cypher [6]. Most modern encryption algorithms are based on the Feistel network, invented by Horst Feistel, which is defined as a common method for converting a function F into other permutation. Feistel networks comprise multiple rounds of repeated operations, such as a permutation process using P-boxes, substitution using S-boxes, and a logical XOR operation [7, 8]. An encryption algorithm depends on a key as the significant element that can be numeric, alphanumeric text or special symbols [9, 10]. However, modern cryptographic algorithms depend on functions with two states (0, 1) for encryption and decryption. As one of

Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms

— The growth rate of the internet exceeds than any other technology which is measured by users and bandwidth. Internet has been growing at a rapid rate since its conception, on a curve geometric and sometimes exponential. Today, the Internet is moving exponentially in three different directions such as size, processing power, and software sophistication making it the fastest growing technology humankind has ever created. With the rapid growth of internet, there is need to protect the sensitive data from unauthorized access. Cryptography plays a vital role in the field of network security. Currently many encryption algorithms are available to secure the data but these algorithms consume lot of computing resources such as battery and CPU time. This paper mainly focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael. These algorithms are compared and performance is evaluated. Experimental results are given to demonstrate the performance of these algorithms.

Performance Analysis of Blowfish, Idea and AES Encryption Algorithms

International Journal of Advance Research in Computer Science and Management Studies [IJARCSMS] ijarcsms.com

Network and internet applications are growing rapidly in the recent past. These applications are used by thousand of users and controlled by different administrative entities. It is mainly used as an efficient means for communication, entertainment and education. With the rapid growth of internet, there is a need for protecting confidential data. The Internet was however originally designed for research and educational purpose, not for commercial applications. So internet was not designed with security in mind. As the internet grows the existing security framework was not adequate for modern day applications. Cryptography plays a vital role in the field of network security. Currently many encryption algorithms are available to secure the data but these algorithms consume lot of computing resources such as battery and CPU time. This paper mainly focuses on three commonly used symmetric encryption algorithms such as Blowfish, IDEA and AES. These algorithms are compared and performance is evaluated.

A Comparative Study and Performance Evaluation of Cryptographic Algorithms: AES and Blowfish

There are many aspects of security ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of secret key Cryptography. It is the automated method in which security goals are accomplished. It includes the process of encryption that converts plaintext into cipher-text. The process of decryption reconverts the cipher-text into plain-text. Secure communication is the prime requirement of every organization. To achieve this, one can use many techniques or algorithms available for Cryptography. Various models were developed for the encryption in which keys were generated from the available data. ADVANCED ENCRYPTION STANDARD (AES) and BLOWFISH are commonly used for network data encryption. The main objective of this dissertation is to analyze encryption security, evaluated encryption speed and power consumption for both the algorithms. It is proved that the Blowfish encryption algorithm may be more suitable for wireless network application security.

Enhancement of Blowfish Encryption in Terms of Security Using Mixed Strategy Technique

2016

Cryptography plays an important role for protecting data from destructive forces and the unwanted actions of unauthorized users. Cryptographic algorithms have mathematically become more and more complex with time due to the ever increasing need for data security. However, the increase in the complexity of such algorithms incurs more computation overhead, which in turn leads to more execution time and high energy consumption recent years; successful studies have been made to speedup the execution of cryptographic algorithms. The Blowfish algorithm was designed by Bruce Schneier to replace Data Encryption Standard, which was the Federal Information processing Standard Cryptography [1]. It is a symmetrical block cipher [2] having the advantages of secure, fast, easy to implement etc. The operation part of Blowfish consists of XORs and additions on 32-bit words, and only 4KB or even less memory is needed when it runs. The key length ofBlowfish is anywhere from 32 bits to 448 bits, which makes datum safe enough.The proposed MS-Blowfish algorithm enhances the performance over Blowfish by modifying the function F of the existing Blowfish. There are a lot of benefits from parallel computing. The advantage of this system is its ability to handle large and extremely complex computations. The basic idea of this research is to simplify complicated cryptographic algorithms by splitting up their tasks to run in parallel successfully so that they execute fast and consume less energy. Amdhal's law states that possible speed gains are limited by the fraction of the software that can't be parallelized to run on multiple cores simultaneously [3]. The Parallel processing, Blowfish and Mixed Strategy concept in Game Theory are combined so that the security is increased.The Avalanche effect is used to show that the proposed MS-Blowfish algorithm possess good diffusion characteristics as that of original Blowfish algorithm [2] [4].The objective of this research paper is to study the Blowfish algorithm and enhance its performance using Parallel Processing and Mixed Strategy technique. RELATED WORK System Specification For this researcha Laptop with Intel Pentium T4500 @ 2.30GHz CPU, 4.00GB Dual-Channel DDR3 and Linux Mint 17.1 is used in which the performance data are collected. In this the software encrypts the text file size that ranges from 50 bytes to 208942 bytes.

An Implementation of 128 bit Blowfish Algorithm with Performance Improvement for High Speed Digital Processing Applications

2021

Cryptography is best known as a method for keeping the substance of a message mystery. The designed Blowfish as a generalpurpose algorithm intended as an alternative to the aging DES and free of the problems and constraints associated with other algorithms. The focus of proposed research is to implement built in self test using verilog coding on xilinx 14.7software. The main motivation behind for proposed algorithm is to extend the existing blowfish and improve performance. Previously it is designed for the 64 bit encryption and decryption process. Presently it is designed for the 128 bit processing. Calculate parameters using standard formula and approach and compare from existing work. Proposed 128 blowfish achieve better results than existing 64 blowfish. IndexTerms – Blowfish, Cryptography, DES, Xilinx, Encryption, Decryption, delay, power.

A Comparative Study of Twofish, Blowfish, and Advanced Encryption Standard for Secured Data Transmission

International Journal of Advanced Computer Science and Applications

Now-a-days, network security is becoming an increasingly significant and demanding research area of interest. Threats and attacks on information and Internet security are getting increasingly difficult to detect. As a result, encryption has emerged as a solution and now plays a critical role in information security systems. Many techniques are required to safeguard shared data. In this work, the encryption, decryption times, and throughput (speed) of the three most commonly used block cipher algorithms: Twofish, Blowfish, and AES were investigated using different file types. Comparison of symmetric encryption techniques of experiments on these types of algorithms uses a lot of computer resources including CPU time, memory, and battery power. Previous research has yielded diverse results in terms of time complexity, speed, space complexity, power consumption, and security. However, this research evaluated the effectiveness of each algorithm based on the following parameters: process time and speed. An application was developed for data simulation to test different file formats and for the encryption process and speed using Python 3.10.