Security analysis of blowfish algorithm

Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient. We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good nonlinear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round. C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.

[1]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[2]  D. Roy Chowdhury,et al.  NLFS : A NEW NON-LINEAR FEEDBACK STREAM CIPHER , 2008 .

[3]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[4]  Monisha Sharma,et al.  Implementation and analysis of various symmetric cryptosystems , 2010 .

[5]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[6]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[7]  Aly A. Fahmy,et al.  A Proposal For A Key-Dependent AES , 2005 .

[8]  Obaida Mohammad Awad,et al.  NEW CRYPTOGRAPHIC ALGORITHMS FOR ENHANCING SECURITY OF VOICE DATA , 2010 .

[9]  Faiz Yousif Mohammad,et al.  A Novel S-box of AES Algorithm Using Variable Mapping Technique , 2009 .

[10]  Jeyamala Chandrasekaran,et al.  ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION , 2011 .

[11]  A. Moussa Data encryption performance based on Blowfish , 2005, 47th International Symposium ELMAR, 2005..

[12]  Onur Koçak,et al.  Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..

[13]  Omid Omidvar Encyclopedia Of Cryptography And Security , 2005 .

[14]  H. S. Mohan,et al.  Performance Analysis of AES and MARS Encryption Algorithms , 2011 .

[15]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[16]  Talaat A. Elgarf,et al.  Dynamic AES-128 with Key-Dependent S-box , 2013 .

[17]  Ramlan Mahmod,et al.  A proposal for improving AES S-box with rotation and key-dependent , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[18]  José María Sierra,et al.  The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..

[19]  S. G. Srikantaswamy,et al.  AN ANALYSIS OF THE DESIGN FACTORS AFFECTING THE PERFORMANCE OF CRYPTOSYSTEMS , 2011 .

[20]  R. Gunasekaran,et al.  A Novel Approach for Enciphering Data of Smaller Bytes , 2010 .

[21]  R.K. Meyers,et al.  An Implementation of the Blowfish Cryptosystem , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.

[22]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[23]  David Pointcheval,et al.  OAEP: Optimal Asymmetric Encryption Padding , 2011, Encyclopedia of Cryptography and Security.

[24]  Alexander Maximov,et al.  Some Words on Cryptanalysis of Stream Ciphers , 2006 .

[25]  Azmi Jaafar,et al.  An Immune System-Inspired Byte Permutation Function to Improve Confusion Performance of Round Transformation in Symmetric Encryption Scheme , 2012, CSA 2012.

[26]  Ed Dawson,et al.  Strict key avalanche criterion , 1992, Australas. J Comb..

[27]  Zaiton Muda,et al.  The new approach of Rijndael key schedule , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[28]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[29]  William Stallings,et al.  Cryptography and network security , 1998 .

[30]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .