Modified Blowfish Algorithm

Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry.  The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower with key, encryption, and decryption average of 26.99ms, 1651.83ms, and 2765.04ms compared to blowfish with 21.65ms, 1297.76ms and 2176.59ms due to block size difference. Applying 128-bit block size increases security by decreasing the chances of having duplicate blocks that may leak information. The modified Blowfish is faster compared to Twofish with an encryption and decryption average time of 2418.08ms and 4002.70ms. The added derivation improved the avalanche of the modified blowfish.  Blowfish achieved 47.14% while modified Blowfish attained 52.86%.

[1]  Vaibhav Poonia,et al.  Analysis of modified Blowfish algorithm in different cases with various parameters , 2015, 2015 International Conference on Advanced Computing and Communication Systems.

[2]  S. Fong-In,et al.  A partial encryption scheme using absolute-value chaotic map for secure electronic health records , 2014, The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE).

[3]  Pariza Kamboj,et al.  Security Enhancement of Blowfish Block Cipher , 2016 .

[4]  Ashwak Alabaichi A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm , 2015 .

[5]  Mansoor Ebrahim,et al.  Symmetric Algorithm Survey: A Comparative Analysis , 2013, ArXiv.

[6]  Vijay Kumar,et al.  A Survey on Various Cryptography Techniques , 2014 .

[7]  Serge Vaudenay,et al.  On the Weak Keys of Blowfish , 1996, FSE.

[8]  Rahul Hans,et al.  A Review and Comparative Analysis of Various Encryption Algorithms , 2015 .

[9]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[10]  Jorge E. Camargo,et al.  Study of Cryptographic Algorithms to Protect Electronic Medical Records in Mobile Platforms , 2015 .

[11]  Tayseer S. Atia DEVELOPMENT OF A NEW ALGORITHM FOR KEY AND S-BOX GENERATION IN BLOWFISH ALGORITHM , 2014 .

[12]  Nimisha Patel,et al.  Integrated ECC and Blowfish for Smartphone Security , 2016 .

[13]  Manish Ranjan,et al.  A Cloud Based Secure Voting System using Homomorphic Encryption for Android Platform , 2016 .

[14]  Gurjeevan Singh,et al.  Superiority of Blowfish Algorithm in Wireless Networks , 2012 .

[15]  A. Suruliandi,et al.  Performance analysis of encryption algorithms for Information Security , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).

[16]  Ashim Saha,et al.  An improved data security using DNA sequencing , 2013, MobileHealth '13.

[17]  T. Vino,et al.  Genome based highly secured image using DNA cryptography and trellis algorithm , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[18]  Ashish Kumar Kaundal,et al.  DNA Based Cryptography : A Review , 2006 .

[19]  Mahua Bhattacharya,et al.  Generation of novel encrypted code using cryptography for multiple level data security for Electronic Patient Record , 2015, 2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM).

[20]  Jeyamala Chandrasekaran,et al.  ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION , 2011 .

[21]  A. Rama Krishna,et al.  A Hybrid Cryptographic System for Secured Device to Device Communication , 2016 .

[22]  Faudziah Ahmad,et al.  Randomness analysis on blowfish block cipher using ECB and CBC modes , 2013 .

[23]  B. Ross Performance Enhancement of Blowfish Encryption Using RK-Blowfish Technique , 2017 .

[24]  Joseph Raj,et al.  ENHANCEMENT OF BLOWFISH ENCRYPTION IN TERMS OF SECURITY USING MIXED STRATEGY TECHNIQUE , 2016 .

[25]  K. Vasanth,et al.  BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY , 2015 .

[26]  L Christina,et al.  Optimized Blowfish Encryption Technique , 2014 .

[27]  H. S. Sheshadri,et al.  A Naïve Visual Cryptographic Algorithm for the Transfer of a Compressed Medical Images , 2015, Int. J. Recent Contributions Eng. Sci. IT.

[28]  Mohammed M. Fouad,et al.  Speech encryption applying a modified Blowfish algorithm , 2014, 2014 International Conference on Engineering and Technology (ICET).

[29]  Asaduzzaman,et al.  Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6 , 2016, 2016 International Conference on Networking Systems and Security (NSysS).