SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
12
Performance Comparison and Enhancement of
Blowfish Algorithm
Vikaram Agraval
Assistant Professor (IT)
B.V.M.Engineering College
V V Nagar
Mital Darji
M.E.(C.E.), student
B.V.M.Engineering College
V V Nagar
_________________________________________________________________________________________________________
Abstract - Security of the information in any network application is very crucial. Cryptography provides the
same with the use of various encryption and decryption algorithm. This paper shows that blowfish is a better
choice when compared with DES, 3DES and AES. Also the paper provides the possible improvement in current
blowfish algorithm to enhance security.
Keywords - DES, 3DES, AES, Blowfish, Throughput.
_________________________________________________________________________________________________________
I. INTRODUCTION
Cryptographic algorithm encrypts the information called plain text into unreadable form called cipher text. This
cipher text is decrypted by the receiver to get back the plain text. Cryptographic algorithm used in this process should
provide Access Control, Authentication, Non repudiation, Confidentiality and Integrity. These algorithms are classified as
symmetric key (private key) and asymmetric key (public key) algorithms based on the keys used for encryption and
decryption. Based on the way of processing plain text it can be classified into stream cipher and block cipher. DES, 3DES,
AES and Blowfish symmetric key block cipher algorithms.
II. PERFORMANCE ANALYSIS
Prof. B.P.Podkar [2] implemented the algorithms in a way that they give maximum performance. He tested them for
performance matrix on Pentium 4 of 2.4 GHz CPU speed with the 4 GB RAM.
Performance matrices are analyzed in terms of throughput by the parameters
1. Encryption/decryption time
2. Power consumption
Throughput = Plain text (MB) / Encryption or Decryption time [2]
Higher throughput indicates higher speed of algorithm and hence less power is consumed. Results are graphed in
Figure 1, Figure 2, Figure 3 and Figure 4 which clearly shows that Blowfish is superior in terms of throughput, power
consumption and processing time.
Fig.1 Throughput of encryption algorithms
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
13
Fig.2 Throughput of decryption algorithm Fig.3 Power consumption (%Battery used)
III. WEAKNESS OF BLOWFISH
Comparison of these algorithms is shown in Table 1. From which we can say here also Blowfish has the superiority.
No attack is known to be successful against it, though it suffers from weak key problem (Bruce, 1996) [2]. It is mentioned
in Table 1 that second order differential attack is a possible crack of blowfish.
Weak keys produce bad S-boxes since Blowfish’s S-boxes are key dependent. There is a chosen plain text attack against
a reduced-round variation of Blowfish that is made easier by the use of weak keys [4].
Also there is some vulnerability in the steps of key generation process [4].
Table 1. Comparison of DES, 3DES, AES and Blowfish
Algorithm Key size
(bits)
Block
size
(bits)
Cracked? Existing Cracks
DES 56 64 Yes Brute force
attack,
differential
cryptanalysis,
liner
cryptanalysis
3DES 112 or
168
64 No Theoretically
possible
AES 128,192,
256
128 No Side channel
attack
Blowfish 32-448 64 No Second order
differential
attack
IV. PROPOSED ENHANCEMENTS
Two approaches are proposed here to improve the security of information and performance of Blowfish algorithm.
A. File splitting and merging
This is the proposed enhancements to increase the security of information.
This approach says that using cryptographic algorithms on slices of data improves the security rather than using a
single algorithm. As shown in Figure 4 file is sliced into parts and then each slice can be encrypted with different
algorithm. Encrypted parts are then merged and sent. At receiver end also cipher text is first spliced into part, decrypted
and then merges to form the plain text.
B. Modification of f-function in Blowfish
As f-function is an important part of the algorithm, improving this function improves the overall performance of the
algorithm. Original function f is defined as [6]
F(X) = ((S1 + S2 mode 232
) XOR S3) + S4 mode 232
The modified f-function is written as [6]
F(X) = ((S1 XOR S2 mode 232
) + (S3 XOR S4 mode 232
))
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
14
The original function is having serial operations of addition and XOR. While the new function has parallel execution of
2 XOR and then addition. It’s quite hard for the eavesdroppers to realize that the f-function is modified and hence
probability of attack is less on comparing with original Blowfish algorithm [6].
Fig.4 File splitting and merging
Fig.5 Original f-function
C. Merits of enhancements
File splitting and merging approach is easy to implement, simple design, infeasible to breach, modular, possible to
modify to work in parallel and hence faster.
Modification in f-function provides better performance and enhanced security. Since our proposed system brings
modification only to the order of execution and no changes is made to the actual functionality, performing cryptanalysis is
not necessary [7].
International Journal of Research in advance Engineering,
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
15
Fig.6 Modified f-function
V. CONCLUSION
It is varied that Blowfish is superior in terms of throughput, power consumption and processing time but it has a
possibility of attack due to weak key and S-box generation process. Blowfish can be enhanced to make it even better in
terms of performance and nearer to uncrack able through modifications.
REFERENCES
[1] G. Manikandan, p. Rajendiran, K. Chakarapani, G. Krishnan and G. Sundarganesh “A modified crypto scheme for enhancing data
security,” journal of theoretical and applied information technology, vol. 35, No. 2, January 2012.
[2] Pratap Chnadra Mandal, “Security of Blowfish algorithm”, ijarcsse, vol. 2, Issue 9. September 2012.
[3] Gurjeevan Singh, Ashwani Kr. Singla, K.S.Sandha, “Superiority of Blowfish algorithm in wireless networks,” International
journal of computer applications, Vol. 44, No. 11, April 2012.
[4] Dr. Hala Bahjat Abdul wahab, Dalia Nabeel Kamal, “Modify Blowfish algorithm by increase the randomness for S-boxes,”
unpublished.
[5] Afaf M. Ali Al-Neaimi, Rehab F. Hassan, “New approach for modifying Blowfish algorithm by using multiple keys” IJCSNS,
Vol. 11, No. 3, March 2011.
[6] Kishnamurthy G.N, Dr.V.Ramaswamy and Mrs.Leela.G.H ,“Performance Enhancement of Blowfish algorithm by modifying its
function” Proceedings of International Conference on Computers, Information, System Sciences and Engineering 2006,
University of Bridgeport, Bridgeport, CT, USA. Pp. 240-244.
[7] William Stallings, cryptography and network security, 3rd Ed, Wiley, 1995.

More Related Content

Viewers also liked

High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
nitin3940
 
LINDA HARRISON RESUME 9
LINDA HARRISON  RESUME   9LINDA HARRISON  RESUME   9
LINDA HARRISON RESUME 9
Linda Harrison
 
PURUSHOTHAMAN.M_-_RESUME.
PURUSHOTHAMAN.M_-_RESUME.PURUSHOTHAMAN.M_-_RESUME.
PURUSHOTHAMAN.M_-_RESUME.
Purushoth M
 
Senior administrative officer perfomance appraisal 2
Senior administrative officer perfomance appraisal 2Senior administrative officer perfomance appraisal 2
Senior administrative officer perfomance appraisal 2
tonychoper6104
 
Field marketing manager perfomance appraisal 2
Field marketing manager perfomance appraisal 2Field marketing manager perfomance appraisal 2
Field marketing manager perfomance appraisal 2
tonychoper3104
 
Technology consultant perfomance appraisal 2
Technology consultant perfomance appraisal 2Technology consultant perfomance appraisal 2
Technology consultant perfomance appraisal 2
tonychoper2204
 

Viewers also liked (15)

High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography  algorithms on GPU and FPGAHigh throughput implementations of cryptography  algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
 
Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
LINDA HARRISON RESUME 9
LINDA HARRISON  RESUME   9LINDA HARRISON  RESUME   9
LINDA HARRISON RESUME 9
 
PURUSHOTHAMAN.M_-_RESUME.
PURUSHOTHAMAN.M_-_RESUME.PURUSHOTHAMAN.M_-_RESUME.
PURUSHOTHAMAN.M_-_RESUME.
 
Moatasem Bellah Ben Sad new version
Moatasem Bellah Ben Sad new versionMoatasem Bellah Ben Sad new version
Moatasem Bellah Ben Sad new version
 
PRC EBOOK
PRC EBOOKPRC EBOOK
PRC EBOOK
 
Senior administrative officer perfomance appraisal 2
Senior administrative officer perfomance appraisal 2Senior administrative officer perfomance appraisal 2
Senior administrative officer perfomance appraisal 2
 
Field marketing manager perfomance appraisal 2
Field marketing manager perfomance appraisal 2Field marketing manager perfomance appraisal 2
Field marketing manager perfomance appraisal 2
 
Klik merja2
Klik merja2Klik merja2
Klik merja2
 
Nemo
NemoNemo
Nemo
 
Media Evaluation Question 5
Media Evaluation Question 5Media Evaluation Question 5
Media Evaluation Question 5
 
Technology consultant perfomance appraisal 2
Technology consultant perfomance appraisal 2Technology consultant perfomance appraisal 2
Technology consultant perfomance appraisal 2
 
Stb 1122 2010
Stb 1122 2010Stb 1122 2010
Stb 1122 2010
 
20 Stunning Stats Defining The Future Of Customer Experience - 2015 - #CXsup...
20 Stunning Stats Defining The Future Of Customer Experience -  2015 - #CXsup...20 Stunning Stats Defining The Future Of Customer Experience -  2015 - #CXsup...
20 Stunning Stats Defining The Future Of Customer Experience - 2015 - #CXsup...
 

Similar to Performance Comparison and Enhancement of Blowfish Algorithm

Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
eSAT Publishing House
 
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of OperationKey Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
1crore projects
 

Similar to Performance Comparison and Enhancement of Blowfish Algorithm (20)

A Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical NetworksA Review on Network Survivability in Optical Networks
A Review on Network Survivability in Optical Networks
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
Review on security techniques for field programmable gate array
Review on security techniques for field programmable gate arrayReview on security techniques for field programmable gate array
Review on security techniques for field programmable gate array
 
Side channel power analysis resistance evaluation of masked adders on FPGA
Side channel power analysis resistance evaluation of masked  adders on FPGASide channel power analysis resistance evaluation of masked  adders on FPGA
Side channel power analysis resistance evaluation of masked adders on FPGA
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Security analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digitalSecurity analysis of fbdk block cipher for digital
Security analysis of fbdk block cipher for digital
 
A review paper on memory fault models and test algorithms
A review paper on memory fault models and test algorithmsA review paper on memory fault models and test algorithms
A review paper on memory fault models and test algorithms
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
A FUZZY MATHEMATICAL MODEL FOR PEFORMANCE TESTING IN CLOUD COMPUTING USING US...
 
W4301117121
W4301117121W4301117121
W4301117121
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
 
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of OperationKey Updating for Leakage Resiliency with Application to AES Modes of Operation
Key Updating for Leakage Resiliency with Application to AES Modes of Operation
 
IRJET- Implementation and Simulation of Failsafe Network Architecture
IRJET-  	  Implementation and Simulation of Failsafe Network ArchitectureIRJET-  	  Implementation and Simulation of Failsafe Network Architecture
IRJET- Implementation and Simulation of Failsafe Network Architecture
 
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
A Novel Algorithm on Wavelet Based Robust Invisible Digital Image Watermarkin...
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud StorageIRJET-2 	  Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
 

Recently uploaded

VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 

Performance Comparison and Enhancement of Blowfish Algorithm

  • 1. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 12 Performance Comparison and Enhancement of Blowfish Algorithm Vikaram Agraval Assistant Professor (IT) B.V.M.Engineering College V V Nagar Mital Darji M.E.(C.E.), student B.V.M.Engineering College V V Nagar _________________________________________________________________________________________________________ Abstract - Security of the information in any network application is very crucial. Cryptography provides the same with the use of various encryption and decryption algorithm. This paper shows that blowfish is a better choice when compared with DES, 3DES and AES. Also the paper provides the possible improvement in current blowfish algorithm to enhance security. Keywords - DES, 3DES, AES, Blowfish, Throughput. _________________________________________________________________________________________________________ I. INTRODUCTION Cryptographic algorithm encrypts the information called plain text into unreadable form called cipher text. This cipher text is decrypted by the receiver to get back the plain text. Cryptographic algorithm used in this process should provide Access Control, Authentication, Non repudiation, Confidentiality and Integrity. These algorithms are classified as symmetric key (private key) and asymmetric key (public key) algorithms based on the keys used for encryption and decryption. Based on the way of processing plain text it can be classified into stream cipher and block cipher. DES, 3DES, AES and Blowfish symmetric key block cipher algorithms. II. PERFORMANCE ANALYSIS Prof. B.P.Podkar [2] implemented the algorithms in a way that they give maximum performance. He tested them for performance matrix on Pentium 4 of 2.4 GHz CPU speed with the 4 GB RAM. Performance matrices are analyzed in terms of throughput by the parameters 1. Encryption/decryption time 2. Power consumption Throughput = Plain text (MB) / Encryption or Decryption time [2] Higher throughput indicates higher speed of algorithm and hence less power is consumed. Results are graphed in Figure 1, Figure 2, Figure 3 and Figure 4 which clearly shows that Blowfish is superior in terms of throughput, power consumption and processing time. Fig.1 Throughput of encryption algorithms
  • 2. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 13 Fig.2 Throughput of decryption algorithm Fig.3 Power consumption (%Battery used) III. WEAKNESS OF BLOWFISH Comparison of these algorithms is shown in Table 1. From which we can say here also Blowfish has the superiority. No attack is known to be successful against it, though it suffers from weak key problem (Bruce, 1996) [2]. It is mentioned in Table 1 that second order differential attack is a possible crack of blowfish. Weak keys produce bad S-boxes since Blowfish’s S-boxes are key dependent. There is a chosen plain text attack against a reduced-round variation of Blowfish that is made easier by the use of weak keys [4]. Also there is some vulnerability in the steps of key generation process [4]. Table 1. Comparison of DES, 3DES, AES and Blowfish Algorithm Key size (bits) Block size (bits) Cracked? Existing Cracks DES 56 64 Yes Brute force attack, differential cryptanalysis, liner cryptanalysis 3DES 112 or 168 64 No Theoretically possible AES 128,192, 256 128 No Side channel attack Blowfish 32-448 64 No Second order differential attack IV. PROPOSED ENHANCEMENTS Two approaches are proposed here to improve the security of information and performance of Blowfish algorithm. A. File splitting and merging This is the proposed enhancements to increase the security of information. This approach says that using cryptographic algorithms on slices of data improves the security rather than using a single algorithm. As shown in Figure 4 file is sliced into parts and then each slice can be encrypted with different algorithm. Encrypted parts are then merged and sent. At receiver end also cipher text is first spliced into part, decrypted and then merges to form the plain text. B. Modification of f-function in Blowfish As f-function is an important part of the algorithm, improving this function improves the overall performance of the algorithm. Original function f is defined as [6] F(X) = ((S1 + S2 mode 232 ) XOR S3) + S4 mode 232 The modified f-function is written as [6] F(X) = ((S1 XOR S2 mode 232 ) + (S3 XOR S4 mode 232 ))
  • 3. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 14 The original function is having serial operations of addition and XOR. While the new function has parallel execution of 2 XOR and then addition. It’s quite hard for the eavesdroppers to realize that the f-function is modified and hence probability of attack is less on comparing with original Blowfish algorithm [6]. Fig.4 File splitting and merging Fig.5 Original f-function C. Merits of enhancements File splitting and merging approach is easy to implement, simple design, infeasible to breach, modular, possible to modify to work in parallel and hence faster. Modification in f-function provides better performance and enhanced security. Since our proposed system brings modification only to the order of execution and no changes is made to the actual functionality, performing cryptanalysis is not necessary [7].
  • 4. International Journal of Research in advance Engineering, Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 15 Fig.6 Modified f-function V. CONCLUSION It is varied that Blowfish is superior in terms of throughput, power consumption and processing time but it has a possibility of attack due to weak key and S-box generation process. Blowfish can be enhanced to make it even better in terms of performance and nearer to uncrack able through modifications. REFERENCES [1] G. Manikandan, p. Rajendiran, K. Chakarapani, G. Krishnan and G. Sundarganesh “A modified crypto scheme for enhancing data security,” journal of theoretical and applied information technology, vol. 35, No. 2, January 2012. [2] Pratap Chnadra Mandal, “Security of Blowfish algorithm”, ijarcsse, vol. 2, Issue 9. September 2012. [3] Gurjeevan Singh, Ashwani Kr. Singla, K.S.Sandha, “Superiority of Blowfish algorithm in wireless networks,” International journal of computer applications, Vol. 44, No. 11, April 2012. [4] Dr. Hala Bahjat Abdul wahab, Dalia Nabeel Kamal, “Modify Blowfish algorithm by increase the randomness for S-boxes,” unpublished. [5] Afaf M. Ali Al-Neaimi, Rehab F. Hassan, “New approach for modifying Blowfish algorithm by using multiple keys” IJCSNS, Vol. 11, No. 3, March 2011. [6] Kishnamurthy G.N, Dr.V.Ramaswamy and Mrs.Leela.G.H ,“Performance Enhancement of Blowfish algorithm by modifying its function” Proceedings of International Conference on Computers, Information, System Sciences and Engineering 2006, University of Bridgeport, Bridgeport, CT, USA. Pp. 240-244. [7] William Stallings, cryptography and network security, 3rd Ed, Wiley, 1995.