Search Results - Blowfish (cipher)
-
1
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
-
2
Randomness analysis on blowfish block cipher using ECB and CBC modes
Published 2013“…Randomness of the output is one of the significant factors in measuring the security of any cryptographic algorithm.Non-random block cipher is vulnerable to any type of attack.This paper presents the National Institute of Standard and Technology (NIST) statistical tests of the Blowfish algorithm to investigate its randomness.Blowfish algorithm with Electronic Codebook (ECB) and Cipher Block Chaining (CBC) modes were conducted for these tests.In addition, comparisons between them were introduced.The analysis showed that Blowfish algorithm with ECB mode was inappropriate with data such as text and image files which have large strings of identical bytes.This inconsistency is due to the majority of the 188 statistical tests of NIST statistical tests failing in all rounds.…”
Get full text
-
3
Rekabentuk Dan Sintesis Suatu Cip Inkripsi Menggunakan Algoritma Blowfish
Published 2001“…Dalam kajian ini, satu cipher biok simetrik iaitu Blowfish, yang dikatakan di antara algoritma yang paling selamat digunakan setakat ini, telah diimplementasikan ke dalam bentuk perkakasan menggunakan· FPGA Xilinx, iaitu XC4052XLA HQ240. …”
Get full text
Get full text
-
4
A new 128-bit block cipher
Published 2009“…The evolvement of technology have resulted in a number of new proposals done on block ciphers such as KAMFEE, KAMKAR, ARIA, BLOWFISH256, DESL, REBC2, DSDP and etc. …”
Get full text
Get full text
-
5
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
-
6
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits.In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient.In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient.We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
Get full text
-
7
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that iterates simple encryption and decryption functions by using Feistel networks.BA keys vary from 32-448 bits to ensure a high level of security.However, the BA requires a high memory percentage and it has a problem regarding randomness of output with text and image files having large strings of identical bytes.One solution to the seissues is to design a new Cryptography algorithm based on the BA that incorporates an F-function into a Cylindrical Coordinate System (CCS).The resulting F-function is known as a CCS with a Dynamic Permutation Table (DPT) or CCSDPT whereas the new algorithm is called the New BA (NBA).The objectives of the CCSDPT are to reduce memory requirements, enhance the randomness of the output and increase resistance to attacks through byte relocation and transformation in the right cylinder.NBA is evaluated by investigates the output of the algorithm by using statistical tests from the National Institute of Standard and Technology (NIST) with five types of data and compared with the BA.The findings of the NIST tests show that the NBA is suitable for any data stream, even those with long strings of identical bytes. …”
Get full text
-
8
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The Blowfish Algorithm (BA) is a symmetric block cipher that uses Feistel network to iterate simple encryption and decryption functions. …”
Get full text
Get full text
-
9
Encryption selection for WLAN IEEE802.11G
Published 2013“…The encryption algorithms consist of AES, DES and Blowfish while the encryption protocols consist of WEP, TKIP and AES/CCMP. …”
Get full text
Get full text