A modified approach of blowfish algorithm based on S-box permutation using shuffle algorithm
Share
Abstract
Blowfish Algorithm has been widely analyzed and gradually accepted as a good and powerful cryptographic algorithm offering several advantages among which is suitability and efficiency for implementing hardware and software; it satisfies the basic requirements in cryptography with high in attack immunity and relatively low in algorithm complexity. In spite of undeniable success in cryptography, Blowfish (BF) still has drawbacks in the substitution and permutation of values in the substitution box (S-box) that can affect the encryption and decryption of the algorithm. This study adopted Fisher-Yates Shuffle (FYS) also known as Knuth shuffle (KS) for the permutation of S-box, and a modified Function F was used to enhance the BF algorithm to address this issue. The results show that Modified approach in Blowfish Algorithm outperformed the Original Blowfish in the encryption, decryption, and throughput of the algorithm.
Recommended Citation
Corpuz, R. R., Gerardo, B. D., & Medina, R. P. (2018). A modified approach of blowfish algorithm based on S-box permutation using shuffle algorithm. In Proceedings of the 2018 VII International Conference on Network, Communication and Computing (pp. 140-145). https://doi.org/10.1145/3301326.3301331
DOI
10.1145/3301326Type
Conference paperISBN
978-1-450-36553-6Keywords
Collections
- Conference Papers [14]
Related items
Showing items related by title, author, creator and subject.
-
A prediction-based curriculum analysis using the modified artificial bee colony algorithm
Due to the vast amount of students' information and the need of quick retrieval, establishing databases is one of the top lists of the IT infrastructure in learning institutions. However, most of these institutions do not ... -
Analysis of key randomness in improved one-time pad cryptography
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random and ... -
Neural network model using back-propagation algorithm with momentum term for credit risk evaluation system
Gante, Dionicio D.; Gerardo, Bobby ; Tanguilig, Bartolome T. III (The SCIence and Engineering Institute (SCIEI), 2016)This paper present the results of an experiment made with the aid of KangarooBPNN, a graphical user interface software in order to find the Mean Squared Error (MSE) of a supervised neural network model. In the previous ...