Analysis of Some Security Criteria for S - boxes in Blowfish Algorithm
نویسندگان
چکیده
S-box is keystone of modern symmetric such as block and stream ciphers. It is essential component in the layout of any block system. The properties of S-boxes in Blowfish algorithm (BA) namely; Avalanche Criterion (AVAL), Strict Avalanche Criterion (SAC) and Bit Independence Criterion (BIC) are used to measure the security of the S-boxes in BA. This paper attempts to analyze these properties (AVAL, SAC and BIC) in blowfish algorithm, after which the results are compared with S-boxes in Rijndael and Safer K-64. Twelve experiments have been conducted on the S-boxes in BA using three different types of encryption keys (Eks) with the purpose to examine the effect of entropy of the Eks on the security of the S-boxes in BA. The first ten experiments are conducted with ten different random Eks; the remaining two experiments are carried out with non-random Ek, one experiment with high entropy Ek and the last experiment with low entropy Ek. The analysis of this study proved that the S-boxes in BA satisfied the above properties with maximum error values of 0.0518, 0.3594 and 0.4725 for AVAL, SAC and BIC respectively. The security of Sboxes was not affected by the entropy of Eks in BA. C++ is used in the implementation of the BA while MATALAB programming (Mathworks R2012a) is used in the implementation of the properties (AVAL, SAC and BIC).
منابع مشابه
Ensemble of Blowfish with Chaos Based S Box Design for Text and Image Encryption
The rapid and extensive usage of Internet in the present decade has put forth information security as an utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety of data including text, images, audio and video. With the increasing use of digital techniques for transmitting and storing Multimedia data, the fundamental issue of protecting the conf...
متن کاملHardware Implementation of Dynamic S-BOX to Use in AES Cryptosystem
One of the major cipher symmetric algorithms is AES. Its main feature is to use S-BOX step, which is the only non-linear part of this standard possessing fixed structure. During the previous studies, it was shown that AES standard security was increased by changing the design concepts of S-BOX and production of dynamic S-BOX. In this paper, a change of AES standard security is studied by produc...
متن کاملType-3 Feistel Network of The 128-bits Block Size Improved Blowfish Cryptographic Encryption
In this paper, a new secret-key block cipher called 128-bits Blowfish is proposed which is an evolutionary improvement of 64-bits Blowfish designed to meet the requirements of the Advanced Encryption Standard (AES) to increase security and to improve performance. The proposed algorithm will be used a variable key size up to 192 bytes. It is a Type-3 Feistel network iterated simple function 16 t...
متن کاملComparison of Blowfish and Cast-128 Algorithms Using Encryption Quality, Key Sensitivity and Correlation Coefficient Analysis
This paper demonstrates the performance of well known block ciphers Blowfish and Cast-128, considering different aspects of security namely, Encryption quality, Key sensitivity test and Statistical analysis. Statistical analysis is conducted using images by test on the histogram of encrypted images and correlation of horizontally adjacent pixels in an encrypted image.
متن کاملRandomness analysis and generation of key-derived s-boxes
Although many ciphers use fixed, close to ideal, s-boxes (like AES e.g.), random s-boxes offer an interesting alternative since they have no underlying structure that can be exploited in cryptanalysis. For this reason, some cryptosystems generate pseudorandom s-boxes as a function of the key (key-derived). We analyse the randomness properties of key-derived s-boxes generated by some popular cry...
متن کامل