Security analysis of blowfish algorithm
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and c...
| Main Authors: | Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/44981/ http://psasir.upm.edu.my/id/eprint/44981/1/Security%20analysis%20of%20blowfish%20algorithm.pdf |
Similar Items
Security analysis of blowfish algorithm
by: Al-Abiachi, Ashwak M., et al.
Published: (2013)
by: Al-Abiachi, Ashwak M., et al.
Published: (2013)
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
by: Alabaichi, Ashwak Mahmood
Published: (2014)
by: Alabaichi, Ashwak Mahmood
Published: (2014)
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
by: Al-Abiachi, Ashwak M., et al.
Published: (2014)
by: Al-Abiachi, Ashwak M., et al.
Published: (2014)
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
by: Khor, Lay Hoong
Published: (2006)
by: Khor, Lay Hoong
Published: (2006)
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)
by: -, Salma, et al.
Published: (2019)
Randomness analysis on blowfish block cipher using ECB and CBC modes
by: Al-Abiachi, Ashwak M., et al.
Published: (2013)
by: Al-Abiachi, Ashwak M., et al.
Published: (2013)
Rekabentuk Dan Sintesis Suatu Cip Inkripsi
Menggunakan Algoritma Blowfish
by: Md. Nasiri, Siti Zarina
Published: (2001)
by: Md. Nasiri, Siti Zarina
Published: (2001)
Parallel-Pipelined-Memory (P2m) Of Blowfish Fpga-Based Radio System With Improved Power-Throughput For Secure Zigbee Transmission
by: Ahmad, Rafidah
Published: (2020)
by: Ahmad, Rafidah
Published: (2020)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
Key transformation approach for Rijndael security.
by: Muda, Zaiton, et al.
Published: (2010)
by: Muda, Zaiton, et al.
Published: (2010)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
On the security of golden cryptosystems
by: Tahghighi, Muhammad, et al.
Published: (2012)
by: Tahghighi, Muhammad, et al.
Published: (2012)
A competitive study of cryptography techniques over block cipher
by: Al-Abiachi, Ashwak M., et al.
Published: (2011)
by: Al-Abiachi, Ashwak M., et al.
Published: (2011)
A conceptual design of novel modern random key-stream generator for high immunity correlation attack
by: Al-Abiachi, Ashwak M., et al.
Published: (2011)
by: Al-Abiachi, Ashwak M., et al.
Published: (2011)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
A review of bring your own device on security issues
by: Olalere, Morufu, et al.
Published: (2015)
by: Olalere, Morufu, et al.
Published: (2015)
A shift column different offset for better Rijndael security
by: Mahmod, Ramlan, et al.
Published: (2009)
by: Mahmod, Ramlan, et al.
Published: (2009)
The block cipher algorithm–properties, encryption efficiency analysis and security evaluation
by: Rezaeipour, Davood, et al.
Published: (2010)
by: Rezaeipour, Davood, et al.
Published: (2010)
Performance analysis of signed digit {0,1,3}-NAF scalar multiplication algorithm in Lopez Dahab model
by: Md. Yasin, Sharifah, et al.
Published: (2015)
by: Md. Yasin, Sharifah, et al.
Published: (2015)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Filtering events using clustering in heterogeneous security logs
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
by: Hajamydeen, Asif Iqbal, et al.
Published: (2011)
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
by: Hani, Mohamed Khalil, et al.
Published: (2000)
by: Hani, Mohamed Khalil, et al.
Published: (2000)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
A proof-producing machine-code analyzer for secure information flow
by: Muthana, Abdulrahman Ahmad Abdu, et al.
Published: (2008)
by: Muthana, Abdulrahman Ahmad Abdu, et al.
Published: (2008)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
GSM car security system
by: Mohd Azwan, Ramlan
Published: (2012)
by: Mohd Azwan, Ramlan
Published: (2012)
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)
by: Hintaw, Ahmed Jameel
Published: (2023)
Achieving security by combining Huffman and SLSB algorithms
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
The suitability of the dendritic cell algorithm for robotic security applications
by: Oates, Robert Foster
Published: (2010)
by: Oates, Robert Foster
Published: (2010)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Similar Items
-
Security analysis of blowfish algorithm
by: Al-Abiachi, Ashwak M., et al.
Published: (2013) -
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
by: Alabaichi, Ashwak Mahmood
Published: (2014) -
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
by: Al-Abiachi, Ashwak M., et al.
Published: (2014) -
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
by: Khor, Lay Hoong
Published: (2006) -
Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms
by: -, Salma, et al.
Published: (2019)