Abstract
Information security is a domain having extensive applications in the twenty-first century and beyond. Encryption is a technique used to prevent data from being accessed without authorization. Symmetric key encryption algorithms are extremely fast compared to asymmetric key algorithms and hence, are used widely. Blowfish is a symmetric key encryption algorithm that is unpatented, free-to-use, fast, compact, and efficient. It is also a very secure algorithm. But, its 64-bit block size prevents it from being widespread. The paper aims to propose a modified version of the Blowfish algorithm that performs high-speed encryption with high throughput and supports 128-bit block size, enhancing its applicability in various areas. The algorithm can be an alternative to the AES algorithm with limited power consumption. The proposed algorithm is compared with the original Blowfish algorithm based on execution speed, throughput, and the avalanche effect. The algorithm’s performance is also evaluated on images based on diffusion properties, image histogram, entropy, and correlation coefficient.
Similar content being viewed by others
Data availability
The data that support the findings of the study are available from the corresponding author upon reasonable request.
References
Alabaichi A, Ahmad F, Mahmod R (2013) Security analysis of blowfish algorithm. In: 2013 Second International Conference on Informatics & Applications (ICIA). IEEE, pp 12–18
Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58
At, N, Beuchat J-L, San I (2012) Compact implementation of Threefish and Skein on FPGA. In 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp 1–5. IEEE
Bahnasawi, MA, Ibrahim K, Mohamed A, Mohamed MK, Moustafa A, Abdelmonem K, Ismail Y, Mostafa H (2016) ASIC-oriented comparative review of hardware security algorithms for internet of things applications. In 2016 28th International Conference on Microelectronics (ICM), pp 285–288. IEEE
Christina L, Irudayaraj VSJ (2014) Optimized blowfish encryption technique. Int J Innov Res Comput Commun Eng 2(7):5009–5015
Dasgupta D, Roy A, Nag A (2016) Toward the design of adaptive selection strategies for multi-factor authentication. Elsevier J Comput Secur 63:85–116
Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Comput Electr Eng 70:647–658
Dixit P, Gupta AK, Trivedi MC, Yadav VK (2018) Traditional and hybrid encryption techniques: a survey. In: In Networking communication and data knowledge engineering, pp 239–248. Springer, Singapore
Harmouch Y, El Kouch R (2017) A fair comparison between several ciphers in characteristics, safety and speed test. In: In Europe and MENA cooperation advances in information and communication technologies, pp 535–547. Springer, Cham
Jang SW (2017) Comparative analysis of AES, Blowfish, Twofish and Threefish encryption algorithms. Anal Appl Math 10:5–24
Kumar S, Kumar D, Lamkuche HS (2021) TPA auditing to enhance the privacy and security in cloud systems. J Cyber Secur Mobil 10:537–568
Luo H, Ge B (2019) Image encryption based on Henon chaotic system with nonlinear term. Multimed Tools Appl 78:34323–34352
Mandal PC (2012) Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish. J Global Res Comput Sci 3(8):67–70
Oishi NJ, Mahamud A, et al. (2016) Short paper: enhancing wi-fi security using a hybrid algorithm of Blowfish and rc6. In 2016 International Conference on Networking Systems and Security (NSysS), pages 1–5. IEEE
Patil P, Narayankar P, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Proced Comput Sci 78:617–624
Pujari SK, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic algorithm and DNA sequence. Procedia Comput Sci 125:165-171
Pujari SK, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic 582 algorithm and DNA sequence. Proced Comput Sci 125:165–171
Quilala TFG, Quilala RL (2021) Modified Blowfish algorithm analysis using derivation cases. Bull Electr Eng Inf 10(4):2192–2200
Quilala TFG, Sison AM, Medina RP (2018) Modified blowfish algorithm Indones. J Electr Eng Comput Sci 11(3):1027–1034
Ramesh, A, Suruliandi, A (2013) Performance analysis of encryption algorithms for information security. In 2013 international conference on circuits, power and computing technologies (ICCPCT) (pp 840-844). IEEE
Reyes, ARL, Festijo ED, Medina RP (2018) Blowfish-128: a modified blowfish algorithm that supports 128-bit block size. In 8th International Workshop on Computer Science and Engineering, Bangkok, Thailand, pp 578–584
Ross BS, Josephraj V (2017) Performance enhancement of blowfish encryption using rk blowfish. Int J Appl Eng Res 12(20):9236–9244
Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (Blowfish). Fast Software Encryption: Cambridge Security Workshop Cambridge, UK, December 9–11, 1993 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005
Schneier B (1998) The Twofish encryption algorithm. Dr. Dobb’s J Softw Tools Prof Programmer 23(12):30–34
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Suresh M, Neema M (2016) Hardware implementation of blowfish algorithm for the secure data transmission in internet of things. Procedia Technol 25:248–255
Thakur J, Kumar N (2011) Des, aes and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int J Emerg Technol Adv Eng 1(2):6–12
Usha MA, Subramani A (2016) Performance study of key developer data encryption and decryption algorithm (KDDEDA) with AES, DES, and BLOWFISH. Int J Eng Comput Sci (IJECS) 5(12):19596–19611
Wang X, Wang S, Wei N, Zhang Y (2019) A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech Rev 36:39–48
Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Selected Areas Telecommun (JSAT) 1(2):31–38
Wu J, Liao X, Yang B (2018) Image encryption using 2D Hénon-sine map and DNA approach. Signal Process 153:11–23
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Kumar, S., Kumar, D. & Singh, N. Performance and security analysis using B-128 modified blowfish algorithm. Multimed Tools Appl 82, 26661–26678 (2023). https://doi.org/10.1007/s11042-023-15038-0
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15038-0