Explore chapters and articles related to this topic
Symmetric Algorithms II
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Blowfish algorithm is a symmetric key block code, developed in 1993. It is used in a huge way in encryption and decryption services. Blowfish is a symmetric key algorithm that can be used as an exchange for DES or International Data Encryption Algorithm. Blowfish was premeditated by Bruce Schneier as a speedy, open alternate to handy symmetric key encryption. It uses an uneven span key, ranging from 32 to 448 bits which is ideal for light and heavy encryption depending upon its use. As then it has been look at by a long way, and it is slowly but surely gaining improvement as a strong encryption symmetric key algorithm. Blowfish is not patented and licensed without charge, and is at no cost for all consumers and all types of exercise. While no effectual cryptanalysis of Blowfish has been set up so far, supplementary interest is now approved to block ciphers with a bigger block size, such as Advance Encryption Standard or Twofish Algorithm. Schneier affirmed that “Blowfish is not patented, and will be available free of charge to the users. This symmetric key algorithm is positioned in the community realm, and can be used by anyone free of cost.”
Key Generation
Published in Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhry, Blockchain for 6G-Enabled Network-Based Applications, 2023
Surendra Kumar, Narander Kumar
RC2 was introduced in the year 1987 by Rivest. The full form of RC is “Ron’s code,” which is a symmetric key algorithm as well as 64-bit block cipher. Rivest also designs RC6, with a block size of 128 bits and a structure the same as that of RC2. In RC6, multiplication operation is carried out for rotation operation, which is not included in RC2. Bruce Schneier introduced the blowfish algorithm in 1993, which uses a symmetric key block cipher in nature and provides an efficient encryption scheme [11]. The size of the block cipher is 64 bit, and key length ranges from 32 to 448.
Security in Internet of Drones: A Comprehensive Review
Published in Cogent Engineering, 2022
Snehal Samanth, Prema K V, Mamatha Balachandra
Raja et al. have proposed a secured and efficient swarm-pattern UAV communication. The system model consists of a geographical area with a group of UAVs with a coverage area of about 200 km, a Base station (BS), and a controller. The proposed method uses the DY threat model for security analysis. Encryptions and Decryptions are done using two strong cryptography algorithms: AES and Blowfish. The proposed method’s security analysis shows that it is more secure when compared to some previous related security methods. The proposed method is resistant to attacks like GPS spoofing. De-Authentication attack, Intercept data feed attack, Video Replay attack, and Impersonation attack. Performance analysis of AES and Blowfish for the proposed UAV model has been done using text, image, and video of sizes 11KB, 425KB, and 3055KB, respectively. Performance analysis has shown that the AES algorithm takes lesser encryption time, decryption time, and has lesser battery consumption (for performing authorization, communication, and computation) when compared to those of the Blowfish algorithm (Raja etal., 2021).
Practical overview of security issues in wireless sensor network applications
Published in International Journal of Computers and Applications, 2018
Harish Radhappa, Lei Pan, James Xi Zheng, Sheng Wen
Blowfish is also a symmetric key block cipher. It also contains 64-bits block of data and size varies with 448 bits. The blowfish algorithm is considered to be Feistel Network which is also having the 16 iterations of encryption function. The major feature of this technique is that a complex key schedule actually makes the algorithm much stronger. The encryption in blowfish technique is such that data blocks of 64-bit is subdivided into two halves of 32- bits each. The sub- parts consists of an 18-bit entry, a p-array and a 256-bit entry S-box. These S-boxes maps the inputs of 8 bits into a 32-bit output. At least one single entry of p-array is mandatory for every round. And remaining p-array may be used after final iteration in XOR outputs in each half. Unlike DES, the blow fish decryption is the same reversal procedure. Blow fish algorithm with cipher block chaining is applicable for small-scale and medium-scale applications. Given the comparison, this technique is more feasible and can provide better security for small-scale applications than the DES. And similar to DES, even this technique would fail to reach the standards for large-scale applications and considered to be a moderate solution in case of medium-scale applications.
Efficiency Analysis of Cryptographic Algorithms for Image Data Security at Cloud Environment
Published in IETE Journal of Research, 2021
Blowfish was developed in the year 1993 by Bruce Schneier as an alternative to both DES and IDEA [27]. This algorithm is much faster, compact, and very simple because it works on fundamental principles of XOR and modular addition. Blowfish is more secure because it has a variable key length. The key length can be varying from 32 bits to 448 bits. Therefore it becomes difficult for an attacker to identify what could be the key length. Since the key is kept secure, the algorithm's security depends on the key, and the S box is also dependent on the key; therefore, the algorithm is more secure. The Blowfish algorithm is a symmetric cipher having a plaintext length of 64 bits and a variable key length of 32–448 bits. The blowfish algorithm uses the Feistel cipher structure. So it uses 16 rounds of operation for encryption. The algorithm uses 18 subkeys P1 to P18, referred to as a P array with a length of 32 bits. There are four S boxes S0, S1, S2, S3, each of 32 bits. Each S box is of input 8 bits with an output of 32 bits. To generate 18 subkeys referred to as P array, the 448-bit key is divided by 32 because each subkey is of length 32 bit and then gets intermediate subkeys K1, K2, … , K14 [28]. Then P array, as well as S boxes, is initialized. Then to get the P values, initialized P array value is XORed with Ki and gets 18 subkeys P1 to P18 on the P array, and they are used in the encryption algorithm. The 64-bit plaintext is divided into the left half and right half with 32 bits each. The left 32 bit is XORed with the first subkey P1, and these 32 bits are given to function F. The output of F again is 32 bits, and then that is XORed with the right half 32 bits and finally gets the result. Like this, there are 16 rounds of operation. Finally, gets the final 64 bits ciphertext. This is the encryption process of the Blowfish algorithm. As Blowfish is a robust encryption algorithm and has good performance aspects [29], it used in manyapplications.