An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box

The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. BA key varies from 32 to 448 bits to ensure a high level of security. However, the substitution box (S-Box) in BA occupies a high percentage of memory and has problems in security, specifically in randomness of output with text and image files that have large strings of identical bytes. Thus, the objective of this research is to enhance the BA to overcome these problems. The research involved three phases, algorithm design, implementation, and evaluation. In the design phase, a dynamic 3D S-Box, a dynamic permutation box (P-Box), and a Feistal Function (F-Function) were improved. The improvement involved integrating Cylindrical Coordinate System (CCS) and dynamic P-Box. The enhanced BA is known as Ramlan Ashwak Faudziah (RAF) algorithm. The implementation phase involved performing key expansion, data encryption, and data decryption. The evaluation phase involved measuring the algorithm in terms of memory and security. In terms of memory, the results showed that the RAF occupied 256 bytes, which is less than the BA (4096 bytes). In terms of randomness of text and image files that have large strings of identical bytes, the average rate of randomness for 188 statistical tests obtained values of more than 96%. This means that the RAF has high randomness indicating that it is more secured. Thus, the results showed that the RAF algorithm that integrates the CCS and dynamic P-Box serves as an effective approach that can consume less memory and strengthen security.

[1]  Carlisle M. Adams,et al.  The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.

[2]  Eli Biham,et al.  Differential Cryptanalysis of the Full 16-Round DES , 1992, Annual International Cryptology Conference.

[3]  K. G,et al.  A MODIFIED CRYPTO SCHEME FOR ENHANCING DATA SECURITY , 2012 .

[4]  Jaime Raigoza,et al.  Evaluating Performance of Symmetric Encryption Algorithms , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[5]  H. S. Mohan,et al.  Performance Analysis of AES and MARS Encryption Algorithms , 2011 .

[6]  Bruce Schneier,et al.  Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.

[7]  Kenneth W. Hsu,et al.  High speed SOC design for blowfish cryptographic algorithm , 2007, 2007 IFIP International Conference on Very Large Scale Integration.

[8]  N KrishnamurthyG,et al.  Performance Analysis of Blowfish and its Modified Version using Encryption quality, Key sensitivity, Histogram and Correlation coefficient analysis , 2009 .

[9]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[10]  Gaëtan Leurent,et al.  Narrow-Bicliques: Cryptanalysis of Full IDEA , 2012, EUROCRYPT.

[11]  Pushpa R. Suri,et al.  A Cipher based on 3D Array Block Rotation , 2010 .

[12]  A. Tamimi Performance Analysis of Data Encryption Algorithms , 2006 .

[13]  V Ramaswamy,et al.  Performance Enhancement Of Blowfish Algorithm By Modifying Its function , 2007 .

[14]  William Stallings,et al.  Cryptography and network security , 1998 .

[15]  John C. Russ,et al.  Introduction to Image Processing and Analysis , 2007 .

[16]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[17]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[18]  Aamna Patel,et al.  Image encryption and decryption using blowfish algorithm , 2012 .

[19]  Zaiton Muda,et al.  The new approach of Rijndael key schedule , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[20]  G. Manikandan,et al.  A New Approach for Improving Data Security using Iterative Blowfish Algorithm , 2012 .

[21]  Faudziah Ahmad,et al.  Randomness analysis on blowfish block cipher using ECB and CBC modes , 2013 .

[22]  Mohie M. Hadhoud,et al.  Energy Efficiency of Encryption Schemes for Wireless Devices , 2009 .

[23]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[24]  Juan Soto,et al.  Randomness Testing of the AES Candidate Algorithms , 1999 .

[25]  Daniel J. Bernstein,et al.  The Salsa20 Family of Stream Ciphers , 2008, The eSTREAM Finalists.

[26]  Zaiton Muda,et al.  Key Transformation Approach for Rijndael Security , 2010 .

[27]  W. Beyer CRC Standard Mathematical Tables and Formulae , 1991 .

[28]  M. D. Yücel,et al.  Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .

[29]  Y. Wu,et al.  Design Challenges in Security Processing , 2004 .

[30]  Mohd Ali,et al.  A New 128-Bit Block Cipher , 2009 .

[31]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[32]  H. Feistel Cryptography and Computer Privacy , 1973 .

[33]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[34]  Tingyuan Nie,et al.  Performance Evaluation of DES and Blowfish Algorithms , 2010, 2010 International Conference on Biomedical Engineering and Computer Science.

[35]  Obaida Mohammad Awad,et al.  NEW CRYPTOGRAPHIC ALGORITHMS FOR ENHANCING SECURITY OF VOICE DATA , 2010 .

[36]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[37]  Khalid Al-Zamil,et al.  Performance evaluation of three encryption/decryption algorithms , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[38]  Sherif Abdulbari Ali Improving The Randomness of Output Sequence for The Advanced Encryption Standard Cryptographic Algorithm , 2005 .

[39]  Malik Imran,et al.  Performance Evaluation of Symmetric Cryptography Algorithms : A Survey 1 , 2013 .

[40]  I. Abd-ElGhafar,et al.  Generation of AES Key Dependent S-Boxes using RC4 Algorithm , 2009 .

[41]  Terry Ritter,et al.  Substitution Cipher with Pseudo-Random Shuffling: the Dynamic Substitution Combiner , 1990, Cryptologia.

[42]  Martin Boesgaard,et al.  The Rabbit Stream Cipher - Design and Security Analysis , 2004, IACR Cryptol. ePrint Arch..

[43]  H. M. Elkamchouchi,et al.  Dynamically key-controlled symmetric block cipher KAMFEE , 2003, Proceedings of the Twentieth National Radio Science Conference (NRSC'2003) (IEEE Cat. No.03EX665).

[44]  Jeyamala Chandrasekaran,et al.  ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION , 2011 .

[45]  Alexander Maximov,et al.  Some Words on Cryptanalysis of Stream Ciphers , 2006 .

[46]  K. ThirunadanaSikamani,et al.  A secure PMS based on Fingerprint Authentication and Blowfish cryptographic algorithm , 2010, 2010 International Conference on Signal and Image Processing.

[47]  Kwok-Wo Wong,et al.  True random number generator based on mouse movement and chaotic hash function , 2009, Inf. Sci..

[48]  Faudziah Ahmad,et al.  Analysis of Some Security Criteria for S-boxes in Blowfish Algorithm , 2013 .

[49]  Howard M. Heys,et al.  A TUTORIAL ON LINEAR AND DIFFERENTIAL CRYPTANALYSIS , 2002, Cryptologia.

[50]  Pratap Chandra Mandal Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES ,AES and Blowfish , 2012 .

[51]  Teng Zhang,et al.  A study of DES and Blowfish encryption algorithm , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[52]  Liam Keliher,et al.  Substitution-Permutation Network Cryptosystems Using Key-Dependent S-Boxes , 1997 .

[53]  Lawrence E. Bassham,et al.  Randomness Testing of the Advanced Encryption Standard Finalist Candidates , 2000 .

[54]  Tariq Shah,et al.  Comparative Analysis of S-boxes Based on Graphical SAC , 2010 .

[55]  An Braeken,et al.  Cryptographic Properties of Boolean Functions and S-Boxes (Cryptografische eigenschappen van Booleaanse functies en S-Boxen) , 2006 .

[56]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[57]  Thomas Hardjono,et al.  Security in Wireless LANs and MANs , 2005 .

[58]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[59]  Ashwaq T. Hashim,et al.  Design and Implementation of an Improvement Of Blowfish Encryption Algorithm , 2009 .

[60]  Muhammad Reza Z'aba,et al.  Randomness analysis on LED block ciphers , 2012, SIN '12.

[61]  Kazys Kazlauskas,et al.  Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.

[62]  Eva Gustafsson,et al.  Stream Cipher Design , 2006 .

[63]  George W. Collins,et al.  The foundations of celestial mechanics , 1989 .

[64]  Yeong-Kang Lai,et al.  A novel VLSI architecture for a variable-length key, 64-bit Blowfish block cipher , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).

[65]  S.H. El-Ramly,et al.  Dynamic generation of s-boxes in block cipher systems , 2001, Proceedings of the Eighteenth National Radio Science Conference. NRSC'2001 (IEEE Cat. No.01EX462).

[66]  Jorge Nakahara,et al.  A Linear Analysis of Blowfish and Khufu , 2007, ISPEC.

[67]  Ali Ahmad Milad,et al.  Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack) , 2012 .

[68]  Khin Maung Latt,et al.  New Analysis Methods on Strict Avalanche Criterion of S-Boxes , 2008 .

[69]  Mark Stamp,et al.  Information security - principles and practice , 2005 .

[70]  Tanja Magoc,et al.  Symmetric Cryptosystems and Symmetric Key Management , 2007 .

[71]  Hongjun Wu A New Stream Cipher HC-256 , 2004, FSE.

[72]  Willis F. Kern,et al.  Solid mensuration : with proofs , 1938 .

[73]  Yas A. Alsultanny,et al.  Generating and Testing Random Key for Image Encryption using ECB and CBC Modes , 2006 .

[74]  Stafford E. Tavares,et al.  On the Design of S-Boxes , 1985, CRYPTO.

[75]  H.M. Elkamchouchi,et al.  Kamkar symmetric block cipher , 2004, Proceedings of the Twenty-First National Radio Science Conference, 2004. NRSC 2004..

[76]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[77]  Selçuk Kavut,et al.  On Some Cryptographic Properties of Rijndael , 2001, MMM-ACNS.

[78]  Monisha Sharma,et al.  Implementation and analysis of various symmetric cryptosystems , 2010 .

[79]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[80]  Mohammed M. Alani,et al.  Testing Randomness in Ciphertext of Block-Ciphers Using DieHard Tests , 2010 .

[81]  Faiz Yousif Mohammad,et al.  A Novel S-box of AES Algorithm Using Variable Mapping Technique , 2009 .

[82]  Onur Koçak,et al.  Evaluation of Randomness Test Results for Short Sequences , 2010, SETA.

[83]  Talaat A. Elgarf,et al.  Dynamic AES-128 with Key-Dependent S-box , 2013 .

[84]  Eli Biham,et al.  NESSIE security report y , 2002 .

[85]  Arash Habibi Lashkari,et al.  A survey on wireless security protocols (WEP, WPA and WPA2/802.11i) , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[86]  Dieter Schmidt Kaweichel, an Extension of Blowfish for 64-Bit Architectures , 2005, IACR Cryptol. ePrint Arch..

[87]  Daniel Zwillinger,et al.  CRC standard mathematical tables and formulae; 30th edition , 1995 .

[88]  Faudziah Ahmad,et al.  Randomness Analysis of 128 bits Blowfish Block Cipher on ECB and CBC Modes , 2013 .

[89]  Jorge Nakahara,et al.  3D: A Three-Dimensional Block Cipher , 2008, CANS.

[90]  Serge Vaudenay,et al.  On the Weak Keys of Blowfish , 1996, FSE.

[91]  P. Suresh Kumar,et al.  FPGA Implementation of Blowfish Cryptosystem Using VHDL , 2013 .

[92]  K. Baskaran,et al.  An ASIC implementation of low power and high throughput blowfish crypto algorithm , 2010, Microelectron. J..

[93]  F. Ayoub Probabilistic completeness of substitution-permutation encryption networks , 1982 .

[94]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[95]  Murray R. Spiegel,et al.  Theory and problems of advanced calculus , 2017 .

[96]  Ed Dawson,et al.  Strict key avalanche criterion , 1992, Australas. J Comb..

[97]  Martin Boesgaard,et al.  Rabbit: A New High-Performance Stream Cipher , 2003, FSE.

[98]  Thomas W. Cusick,et al.  Stream Cipher Design , 2009 .

[99]  R. Gunasekaran,et al.  A Novel Approach for Enciphering Data of Smaller Bytes , 2010 .

[100]  Sergey Doroshenko,et al.  Experimental Statistical Attacks on Block and Stream Ciphers , 2008 .

[101]  Nikolai Stoianov One Approach of Using Key-Dependent S-BOXes in AES , 2011, MCSS.

[102]  A. Rukhin,et al.  Statistical Testing of Random Number Generators , 1999 .

[103]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods for Key Wrapping , 2012 .

[104]  Zhu Wang,et al.  Design and Optimization of Hybrid MD5-Blowfish Encryption on GPUs , 2011 .

[105]  Pushpa R. Suri and Sukhvinder Singh Deora 3D Array Block Rotation Cipher: An Improvement using lateral shift , 2011 .

[106]  Melek D. Yücel,et al.  Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .

[107]  Vinod Patidar,et al.  A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.

[108]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[109]  Rehab F. Hassan,et al.  New Approach for Modifying Blowfish Algorithm by Using Multiple Keys , 2011 .

[110]  Aly A. Fahmy,et al.  A Proposal For A Key-Dependent AES , 2005 .

[111]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[112]  Onur Koçak,et al.  Cryptographic Randomness Testing of Block Ciphers and Hash Functions , 2010, IACR Cryptol. ePrint Arch..

[113]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[114]  Serge Vaudenay,et al.  Perfect Diffusion Primitives for Block Ciphers , 2004, Selected Areas in Cryptography.

[115]  Shai Halevi,et al.  MARS - a candidate cipher for AES , 1999 .

[116]  Serge Mister,et al.  Practical S-Box Design , 1996 .

[117]  Salasiah Sulaiman,et al.  A New ShiftColumn Transformation: An Enhancement of Rijndael Key Scheduling , 2012 .

[118]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[119]  Vasilios Katos A randomness test for block ciphers , 2005, Appl. Math. Comput..

[120]  Ramlan Mahmod,et al.  Security analysis of blowfish algorithm , 2013, 2013 Second International Conference on Informatics & Applications (ICIA).

[121]  Ya-Ping Zhang,et al.  A stream cipher algorithm based on conventional encryption techniques , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).

[122]  Anne Canteaut,et al.  Sosemanuk, a Fast Software-Oriented Stream Cipher , 2008, The eSTREAM Finalists.

[123]  Noohul Basheer Zain Ali,et al.  Optimal Datapath Design for a Cryptographic Processor: The Blowfish Algorithm , 2001 .

[124]  R.K. Meyers,et al.  An Implementation of the Blowfish Cryptosystem , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.

[125]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[126]  Runtong Zhang,et al.  A block cipher using key-dependent S-box and P-boxes , 2008, 2008 IEEE International Symposium on Industrial Electronics.

[127]  Ritu Agarwal,et al.  Peformance analysis of data encryption algorithms , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[128]  A. Moussa Data encryption performance based on Blowfish , 2005, 47th International Symposium ELMAR, 2005..

[129]  Ramlan Mahmod,et al.  A proposal for improving AES S-box with rotation and key-dependent , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[130]  José María Sierra,et al.  The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..

[131]  Tinku Acharya,et al.  Image Processing: Principles and Applications , 2005, J. Electronic Imaging.

[132]  Michael C.-J. Lin,et al.  A VLSI implementation of the blowfish encryption/decryption algorithm , 2000, ASP-DAC.