Call for Paper - October 2019 Edition
IJCA solicits original research papers for the October 2019 Edition. Last date of manuscript submission is September 20, 2019. Read More

An Alternate Key Scheduling Algorithm for Blowfish and its Performance Analysis

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2018
Authors:
Rekha C., Krishnamurthy G. N., Dilip Kumar S. M.
10.5120/ijca2018918065

Rekha C., Krishnamurthy G N. and Dilip Kumar S M.. An Alternate Key Scheduling Algorithm for Blowfish and its Performance Analysis. International Journal of Computer Applications 181(25):7-14, November 2018. BibTeX

@article{10.5120/ijca2018918065,
	author = {Rekha C. and Krishnamurthy G. N. and Dilip Kumar S. M.},
	title = {An Alternate Key Scheduling Algorithm for Blowfish and its Performance Analysis},
	journal = {International Journal of Computer Applications},
	issue_date = {November 2018},
	volume = {181},
	number = {25},
	month = {Nov},
	year = {2018},
	issn = {0975-8887},
	pages = {7-14},
	numpages = {8},
	url = {http://www.ijcaonline.org/archives/volume181/number25/30090-2018918065},
	doi = {10.5120/ijca2018918065},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Information security depends on the strength of cryptographic algorithm and key. The generated keys must be so secure that there is no better way to break it. Design of such good key scheduling algorithm is crucial part in symmetric cryptosystem, which is used to create a number of subkeys, used in encryption/decryption process in block cipher. In this paper a methodology is proposed for generating keys using an alternate key scheduling algorithm of blowfish. However, Blowfish has some demerits including complex key scheduling algorithm, high computational cost and static substitution of S-box. Therefore such demerits are taken care to improve the performance of key generation algorithm of blowfish algorithm. This alternating key scheduling algorithm decreases the computational cost and uses the dynamic substitution of S-box. The effectiveness of the proposed scheme is verified by performing security analysis and also metrics evaluation.

References

  1. Jawad Ahmad and Fawad Ahmed. Efficiency analysis and security evaluation of image encryption schemes. International Journal of Video and Image Processing and Network Security IJVIPNS-IJENS, 12(4):8, 2007.
  2. D Whiting B. Schneier. Fast software encryption: Designing encryption algorithms for optimal software speed on the intel pentium processor. Lecter notes in Computer Science, 1997.
  3. B.Schneier. The blowfish encryption algorithm. In Dr Dobbs Journal, pages 38–40, 1994.
  4. Hamdy M. Kalash Hossam El din H. Ahmed and Osama S. Farag Allah. Encryption quality analysis of rc5 block cipher algorithm for digital images. Journal of Optical Engineering, 45, 2006.
  5. Dr. V Ramaswamy Krishnamurthy G N. Encryption quality analysis and security evaluation of blow-castfish using digital images. Communicated to International Journal of Computational Science, 2008.
  6. Yeong-Kang Lai and Yu-Chuan Shu. A novel vlsi architecture for a variable-length key, 64-bit blowfish block cipher. IEEE workshop on signal processing systems. SiPS 99. design and implementation, 1999. doi:10.1109/sips.
  7. K. Baskaran P. Karthigakumar. Partially pipelined vlsi implementation of blowfish encryption/decryption algorithm. International Journal of Image and Graphics, 10(3):327–341, 2010.
  8. K. Baskaran P. Karthigakumar. Partially pipelined vlsi implementation of blowfish encryption/decryption algorithm. International Journal of Image and Graphics, 10, 2010.
  9. B. Schneier. Description o f a new variable-length key,64-bit block cipher (blowfish). Fast Software Encryption,Cambridge Security Workshop proceedings (December 1993), December 4 1994. Springer-Verlag.
  10. B. Schneier. Applied cryptography: Protocols, algorithms, and source code in c. John Wiley and Sons, 1995.
  11. W. Stallings. Cryptography and Network Security: Principles and Practices. 2nd ed., Prentice Hall, 1999.
  12. Rahil Abbas; Vijayalakshmi S Sudarshan, TSB; Mir. Dril a flexible architecture for blowfish encryption using dynamic reconfiguration replication inner-loop pipelining loop folding techniques. Springer, page 625 639, 2005. Advances in Computer Systems Architecture.

Keywords

Blowfish, Key Scheduling Algorithm, S-box