A Review of the Blowfish Algorithm Modifications in Terms of Execution Time and Security

Main Article Content

Raghad Abdul Hadi Abdul Qader
Auday H. Saeed AL-Wattar

Abstract

Data has become increasingly popular for advanced digital content transmission. Researchers are concerned about the protection of data. The transmission of digital data over a network has made multimedia data vulnerable to various threats, including unauthorized access and network hacking. As a result, the data must be protected with encryption methods based on symmetric encryption algorithms, which will ensure the data security. The Blowfish encryption algorithm is one of the most well-known cryptographic algorithms. However, each of the current algorithms has its own set of advantages and disadvantages. However, there are several drawbacks to using this algorithm, including complex computational operations, fixed (S-Box) and pattern issues, which can arise while dealing with more complex data, including texts. Many academics have sought to increase the algorithm's efficiency. The modifications to the Blowfish algorithms provided by researchers in prior works are summarized in this publication.


img7452.png


Article Details

How to Cite
Abdul Qader, R. A. H., & AL-Wattar, A. H. S. (2022). A Review of the Blowfish Algorithm Modifications in Terms of Execution Time and Security. Technium: Romanian Journal of Applied Sciences and Technology, 4(9), 89–101. https://doi.org/10.47577/technium.v4i9.7452
Section
Articles

References

Sumedha Kaushik & Ankur Singhal “Network Security Using Cryptographic Techniques,” International Journal of Advanced Research and Computer Science and Software Engineering (IJARCSSE), Volume 2, Issue 12, December 2012.

Anand Kumar M and Dr. S. Karthikeyan, "Investigating the Efficiency of Blowfish and Rejindael Algorithms", International Journal of Computer Network and Information Security, pp. 22-28, 2012.

Obaida Mohammad Awad Al-Hazaimeh, "Design of a New Block Cipher Algorithm", Network and Complex Systems, Vol. 3, No. 8, pp. 1-5, 2013.

Ali M Alshahrani, "Different Data Block Size Using to Evaluate the Performance Between Different Symmetric Key Algorithms", International Journal of Computer Networks and Communications, Vol. 6, No. 2, pp. 89-97, 2014.

K. Acharya, M. Sajwan, and S. Bhargaya, “Analysis of Cryptographic Algorithms for Network Security" International Journal of Computer Applications Technology and Research., vol. 3, issue no. 2, pp.130- 135–8887, 2013.

William Stallings, "Cryptography and Network Security", Fifth Edition, Pearson Publication, Prentice hall, 2013.

Landge, I.A.: "VHDL based Blowfish implementation for secured embedded system design", pp. 3–7, 2017.

Manikandan G, Rajendran P, Chakarapani K, Krishnan G and Sundarganesh G, "A Modified Crypto Scheme for Enhancing Data Security", Journal of Theoretical and Applied Information Technology, Vol. 35, No.2, pp.149-154, 2012.

Milind Mathur and Ayush Kesarwani, “Comparison Between DES, 3DES, RC2, RC6, BLOWFISH AND AES” Proceedings of National Conference on New Horizons in IT - NCNHIT 2013.

Christina and Joe Irudayaraj, "Optimized Blowfish Encryption Technique" ; International Journal of Innovative Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2014.

Tayseer S. Atia; "Development Of A New Algorithm For Key And S-Box Generation In Blowfish Algorithm" ; Journal of Engineering Science and Technology Vol. 9, No. 4, 2014 .

R. Corpuz, B. Gerardo, and R. Medina, “A modified approach of blowfish algorithm based on s-box permutation using shuffle algorithm”, pp. 140–145, 2018.

Godfrey L. Dulla et al., "A unique message encryption technique based on enhanced blowfish algorithm" To cite this article, 2019 .

Ashokkumar Kothandan, "Modified Blowfish Algorithm to Enhance its Performance and Security"; School of Computing National College of Ireland; 2020.

Theda Flare G. Quilala , Ariel M. Sison and Ruji P. Medina, "Modified Blowfish Algorithm" , 2018.

A. R. Reyes, E. Festijo, and R. Medina, “Blowfish-128: A modified blowfish algorithm that supports 128-bit block size,” 2018.

Godfrey L. Dulla, Bobby D Gerardo, Ruji P. Medina, "An Enhanced Blowfish (eBf) Algorithm for Securing x64FileMessage Content";; Technological Institute of the Philippines; 2018.

B. Shamina Ross, V. Josephraj, "Performance Enhancement of Blowfish Encryption Using RK-Blowfish Technique"; International Journal of Applied Engineering Research; ISSN 0973-4562 Volume 12, Number 20, 2017.

Rohan Kumar, Rahul Thakkar and Manoj Kumar; " Simulated Analysis and Enhancement of Blowfish Algorithm" ; IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II, 2015.

Monika Agrawal and Pradeep Mishra, "A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm"; International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-6, August, 2012.

Joseph Raj and Shamina Ross; "Enhancement Of Blowfish Encryption In Terms Of Security Using Mixed Strategy Technique"; 1Dept. of Computer Science, Kamaraj College, Thoothukudi-628003, INDIA 2Dept. of Computer Applications, Scott Christian College, Nagercoil-629001, INDIA; 2016

Vaibhav Poonia and Dr. Narendra Singh Yadav; "Analysis of modified Blowfish Algorithm in different cases with various parameters"; International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, ISSN 2091-2730, 2015.

Ashwak Mahmood Alabaichi, "A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm"; Indian Journal of Science and Technology, Vol 8(30), DOI: 10.17485/ijst/2015/v8i30/86800, November 2015

P. Patel, R. Patel, and N. Patel, “Integrated ECC and Blowfish for Smartphone Security,” Procedia Comput. Sci., vol. 78, pp. 210–216, 2016.

R. Patel and P. Kamboj, “Security Enhancement of Blowfish Block Cipher,” pp. 231–2382016.

N. J. Oishi, A. Mahamud, and Asaduzzaman, “Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6”; International Conference on Networking Systems and Security; pp. 1–5, 2016.

A. M. Alabaichi, R. Mahmood, F. Ahmad, and M. S. Mechee, "Randomness Analysis on Blowfish Block Cipher Using ECB and CBC Modes"; J. Appl. Sci., vol. 13, no. 6, pp. 768–789, Jun. 2013.

Afaf M. Ali Al-Neaimi and Rehab F. Hassan, "New Approach for Modifying Blowfish Algorithm by Using Multiple Keys" ; IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.3, March 2011.

Gurjeevan Singh, Ashwani Kumar, K. S. Sandha, "A Study of New Trends in Blowfish Algorithm"; International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, 2011.

Similar Articles

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

You may also start an advanced similarity search for this article.