Security analysis of blowfish algorithm

Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and c...

Full description

Bibliographic Details
Main Authors: Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan
Format: Conference or Workshop Item
Language:English
Published: IEEE 2013
Online Access:http://psasir.upm.edu.my/id/eprint/44981/
http://psasir.upm.edu.my/id/eprint/44981/1/Security%20analysis%20of%20blowfish%20algorithm.pdf
_version_ 1848850471690698752
author Alabaichi, Ashwak Mahmood
Ahmad, Faudziah
Mahmod, Ramlan
author_facet Alabaichi, Ashwak Mahmood
Ahmad, Faudziah
Mahmod, Ramlan
author_sort Alabaichi, Ashwak Mahmood
building UPM Institutional Repository
collection Online Access
description Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient. We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good non-linear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round. C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.
first_indexed 2025-11-15T10:06:49Z
format Conference or Workshop Item
id upm-44981
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T10:06:49Z
publishDate 2013
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling upm-449812020-08-04T02:40:33Z http://psasir.upm.edu.my/id/eprint/44981/ Security analysis of blowfish algorithm Alabaichi, Ashwak Mahmood Ahmad, Faudziah Mahmod, Ramlan Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient. We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. The results obtained from the analysis of correlation coefficient showed that Blowfish algorithm gives a good non-linear relation between plaintext and ciphertext while the results of avalanche effect indicate that the algorithm presents good avalanche effect from the second round. C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient. IEEE 2013 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/44981/1/Security%20analysis%20of%20blowfish%20algorithm.pdf Alabaichi, Ashwak Mahmood and Ahmad, Faudziah and Mahmod, Ramlan (2013) Security analysis of blowfish algorithm. In: Second International Conference on Informatics & Applications (ICIA2013), 23-25 Sept. 2013, Lodz, Poland. (pp. 12-18). 10.1109/ICoIA.2013.6650222
spellingShingle Alabaichi, Ashwak Mahmood
Ahmad, Faudziah
Mahmod, Ramlan
Security analysis of blowfish algorithm
title Security analysis of blowfish algorithm
title_full Security analysis of blowfish algorithm
title_fullStr Security analysis of blowfish algorithm
title_full_unstemmed Security analysis of blowfish algorithm
title_short Security analysis of blowfish algorithm
title_sort security analysis of blowfish algorithm
url http://psasir.upm.edu.my/id/eprint/44981/
http://psasir.upm.edu.my/id/eprint/44981/
http://psasir.upm.edu.my/id/eprint/44981/1/Security%20analysis%20of%20blowfish%20algorithm.pdf