Modified Blowfish algorithm analysis using derivation cases
نویسندگان
چکیده
This study analyzed and enhanced the modified Blowfish algorithm (MBA) encryption. The modification retained original structure, process use of two S-boxes in MBA but presented derivation processes f-function which was originally placed to prevent symmetry. case’s performance using avalanche effect time efficiency. After comparing first second MBA, further improved by 5.47%, thus improving security. also showed that is faster 39.48% encryption time, 38.34% decryption time. case slower because difference placement shift rotation. key generation found be independent input size while directly proportional file size. With this, considered better.
منابع مشابه
Defacement of Colluding Attack Using Blowfish Algorithm
Abstract In web environment, browser extension extends its functionality by retrieving, presenting and traversing the information through web browser. Browser extensions run with ‘high’ privileges which consequences, vulnerable web browser extensions to steal user’s credentials and trap users into leaking sensitive information to unauthorized parties. One of the attack known as Colluding browse...
متن کاملInformation Hiding using Least Significant Bit Steganography and Blowfish Algorithm
Security is the most challenging aspects in the World Wide Web. In present time information sharing and transfer has increased exponentially. So to find out best solution this is providing necessary protection of our data against malicious attacks from intruders. Cryptography and Steganography are the two major techniques for secret communication. Cryptography converts information from its orig...
متن کاملImage Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm
Steganography is one of the methods of secret communication that hides the existence of message so that a viewer cannot detect the transmission of message and hence cannot try to decrypt it. It is the process of embedding secret data in the cover image without significant changes to the cover image. A cryptography algorithm is used to convert the secret messages to an unreadable form before emb...
متن کاملA Wavelet Transform Based Secure Data Transfer Using Blowfish Algorithm
The modern era has seen ample number of cryptographic and stenographic techniques to transmit and receive data in a secure and confidential manner. In our paper we use a multi resolution wavelet domain by collaborating the concepts of steganography and cryptography. Initially we use a modified blowfish algorithm and will embed the encrypted message into an image. At the later part of the techni...
متن کاملNested Digital Image Watermarking Technique Using Blowfish Encryption Algorithm
Digital watermarking is referred to a method used for copyright protection and authentication. In this paper, we present a method of nested digital watermark embedding and extraction in which a nested watermark (a watermark inside another watermark) is embedded into the main image. This concept of nested watermarking is used to increase the watermark embedding capacity. In this method, a waterm...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of Electrical Engineering and Informatics
سال: 2021
ISSN: ['2302-9285']
DOI: https://doi.org/10.11591/eei.v10i4.2292