Security analysis of blowfish algorithm
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and c...
| Main Authors: | , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/44981/ http://psasir.upm.edu.my/id/eprint/44981/1/Security%20analysis%20of%20blowfish%20algorithm.pdf |
| _version_ | 1848850471690698752 |
|---|---|
| author | Alabaichi, Ashwak Mahmood Ahmad, Faudziah Mahmod, Ramlan |
| author_facet | Alabaichi, Ashwak Mahmood Ahmad, Faudziah Mahmod, Ramlan |
| author_sort | Alabaichi, Ashwak Mahmood |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient. We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good non-linear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round. C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient. |
| first_indexed | 2025-11-15T10:06:49Z |
| format | Conference or Workshop Item |
| id | upm-44981 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T10:06:49Z |
| publishDate | 2013 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-449812020-08-04T02:40:33Z http://psasir.upm.edu.my/id/eprint/44981/ Security analysis of blowfish algorithm Alabaichi, Ashwak Mahmood Ahmad, Faudziah Mahmod, Ramlan Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient. We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good non-linear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round. C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient. IEEE 2013 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/44981/1/Security%20analysis%20of%20blowfish%20algorithm.pdf Alabaichi, Ashwak Mahmood and Ahmad, Faudziah and Mahmod, Ramlan (2013) Security analysis of blowfish algorithm. In: Second International Conference on Informatics & Applications (ICIA2013), 23-25 Sept. 2013, Lodz, Poland. (pp. 12-18). 10.1109/ICoIA.2013.6650222 |
| spellingShingle | Alabaichi, Ashwak Mahmood Ahmad, Faudziah Mahmod, Ramlan Security analysis of blowfish algorithm |
| title | Security analysis of blowfish algorithm |
| title_full | Security analysis of blowfish algorithm |
| title_fullStr | Security analysis of blowfish algorithm |
| title_full_unstemmed | Security analysis of blowfish algorithm |
| title_short | Security analysis of blowfish algorithm |
| title_sort | security analysis of blowfish algorithm |
| url | http://psasir.upm.edu.my/id/eprint/44981/ http://psasir.upm.edu.my/id/eprint/44981/ http://psasir.upm.edu.my/id/eprint/44981/1/Security%20analysis%20of%20blowfish%20algorithm.pdf |