Skip to main content
Log in

Performance and security analysis using B-128 modified blowfish algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Information security is a domain having extensive applications in the twenty-first century and beyond. Encryption is a technique used to prevent data from being accessed without authorization. Symmetric key encryption algorithms are extremely fast compared to asymmetric key algorithms and hence, are used widely. Blowfish is a symmetric key encryption algorithm that is unpatented, free-to-use, fast, compact, and efficient. It is also a very secure algorithm. But, its 64-bit block size prevents it from being widespread. The paper aims to propose a modified version of the Blowfish algorithm that performs high-speed encryption with high throughput and supports 128-bit block size, enhancing its applicability in various areas. The algorithm can be an alternative to the AES algorithm with limited power consumption. The proposed algorithm is compared with the original Blowfish algorithm based on execution speed, throughput, and the avalanche effect. The algorithm’s performance is also evaluated on images based on diffusion properties, image histogram, entropy, and correlation coefficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

The data that support the findings of the study are available from the corresponding author upon reasonable request.

References

  1. Alabaichi A, Ahmad F, Mahmod R (2013) Security analysis of blowfish algorithm. In: 2013 Second International Conference on Informatics & Applications (ICIA). IEEE, pp 12–18

  2. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58

    Article  Google Scholar 

  3. At, N, Beuchat J-L, San I (2012) Compact implementation of Threefish and Skein on FPGA. In 2012 5th International Conference on New Technologies, Mobility and Security (NTMS), pp 1–5. IEEE

  4. Bahnasawi, MA, Ibrahim K, Mohamed A, Mohamed MK, Moustafa A, Abdelmonem K, Ismail Y, Mostafa H (2016) ASIC-oriented comparative review of hardware security algorithms for internet of things applications. In 2016 28th International Conference on Microelectronics (ICM), pp 285–288. IEEE

  5. Christina L, Irudayaraj VSJ (2014) Optimized blowfish encryption technique. Int J Innov Res Comput Commun Eng 2(7):5009–5015

    Google Scholar 

  6. Dasgupta D, Roy A, Nag A (2016) Toward the design of adaptive selection strategies for multi-factor authentication. Elsevier J Comput Secur 63:85–116

    Article  Google Scholar 

  7. Dhiman K, Kasana SS (2018) Extended visual cryptography techniques for true color images. Comput Electr Eng 70:647–658

  8. Dixit P, Gupta AK, Trivedi MC, Yadav VK (2018) Traditional and hybrid encryption techniques: a survey. In: In Networking communication and data knowledge engineering, pp 239–248. Springer, Singapore

    Google Scholar 

  9. Harmouch Y, El Kouch R (2017) A fair comparison between several ciphers in characteristics, safety and speed test. In: In Europe and MENA cooperation advances in information and communication technologies, pp 535–547. Springer, Cham

    Google Scholar 

  10. Jang SW (2017) Comparative analysis of AES, Blowfish, Twofish and Threefish encryption algorithms. Anal Appl Math 10:5–24

  11. Kumar S, Kumar D, Lamkuche HS (2021) TPA auditing to enhance the privacy and security in cloud systems. J Cyber Secur Mobil 10:537–568

  12. Luo H, Ge B (2019) Image encryption based on Henon chaotic system with nonlinear term. Multimed Tools Appl 78:34323–34352

  13. Mandal PC (2012) Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish. J Global Res Comput Sci 3(8):67–70

  14. Oishi NJ, Mahamud A, et al. (2016) Short paper: enhancing wi-fi security using a hybrid algorithm of Blowfish and rc6. In 2016 International Conference on Networking Systems and Security (NSysS), pages 1–5. IEEE

  15. Patil P, Narayankar P, Narayan DG, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish. Proced Comput Sci 78:617–624

    Article  Google Scholar 

  16. Pujari SK, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic algorithm and DNA sequence. Procedia Comput Sci 125:165-171

  17. Pujari SK, Bhattacharjee G, Bhoi S (2018) A hybridized model for image encryption through genetic 582 algorithm and DNA sequence. Proced Comput Sci 125:165–171

    Article  Google Scholar 

  18. Quilala TFG, Quilala RL (2021) Modified Blowfish algorithm analysis using derivation cases. Bull Electr Eng Inf 10(4):2192–2200

  19. Quilala TFG, Sison AM, Medina RP (2018) Modified blowfish algorithm Indones. J Electr Eng Comput Sci 11(3):1027–1034

    Google Scholar 

  20. Ramesh, A, Suruliandi, A (2013) Performance analysis of encryption algorithms for information security. In 2013 international conference on circuits, power and computing technologies (ICCPCT) (pp 840-844). IEEE

  21. Reyes, ARL, Festijo ED, Medina RP (2018) Blowfish-128: a modified blowfish algorithm that supports 128-bit block size. In 8th International Workshop on Computer Science and Engineering, Bangkok, Thailand, pp 578–584

  22. Ross BS, Josephraj V (2017) Performance enhancement of blowfish encryption using rk blowfish. Int J Appl Eng Res 12(20):9236–9244

    Google Scholar 

  23. Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (Blowfish). Fast Software Encryption: Cambridge Security Workshop Cambridge, UK, December 9–11, 1993 Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005

  24. Schneier B (1998) The Twofish encryption algorithm. Dr. Dobb’s J Softw Tools Prof Programmer 23(12):30–34

  25. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  26. Suresh M, Neema M (2016) Hardware implementation of blowfish algorithm for the secure data transmission in internet of things. Procedia Technol 25:248–255

    Article  Google Scholar 

  27. Thakur J, Kumar N (2011) Des, aes and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int J Emerg Technol Adv Eng 1(2):6–12

    Google Scholar 

  28. Usha MA, Subramani A (2016) Performance study of key developer data encryption and decryption algorithm (KDDEDA) with AES, DES, and BLOWFISH. Int J Eng Comput Sci (IJECS) 5(12):19596–19611

    Google Scholar 

  29. Wang X, Wang S, Wei N, Zhang Y (2019) A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech Rev 36:39–48

    Article  Google Scholar 

  30. Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Selected Areas Telecommun (JSAT) 1(2):31–38

    Google Scholar 

  31. Wu J, Liao X, Yang B (2018) Image encryption using 2D Hénon-sine map and DNA approach. Signal Process 153:11–23

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunil Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S., Kumar, D. & Singh, N. Performance and security analysis using B-128 modified blowfish algorithm. Multimed Tools Appl 82, 26661–26678 (2023). https://doi.org/10.1007/s11042-023-15038-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15038-0

Keywords

Navigation