2015
DOI: 10.17485/ijst/2015/v8i30/86800
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…As well as a study by researcher Ashwak alabaichi, the study includes three phases: Design, implementation and verification In the first phase, 3D Dynamic S-Box, Dynamic P-box and F-Function were designed. The second stage is to implement a key to expand, encrypt and decrypt the data, as for verification, it includes evaluating the output of the new design using a random statistical test and coding analysis [16]. The aim of this research by researchers Vaibhav Poonia and Dr. Narendra Singh Yadav aims to improve and evaluate the Blowfish algorithm based on various parameters such as encryption quality, correlation coefficients, key sensitivity testing, and output file size.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…As well as a study by researcher Ashwak alabaichi, the study includes three phases: Design, implementation and verification In the first phase, 3D Dynamic S-Box, Dynamic P-box and F-Function were designed. The second stage is to implement a key to expand, encrypt and decrypt the data, as for verification, it includes evaluating the output of the new design using a random statistical test and coding analysis [16]. The aim of this research by researchers Vaibhav Poonia and Dr. Narendra Singh Yadav aims to improve and evaluate the Blowfish algorithm based on various parameters such as encryption quality, correlation coefficients, key sensitivity testing, and output file size.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As a result, blowfish-MD5 has shown to be more efficient than the previous approach. 16 The statistical test of randomness on the Blowfish Block Cipher is presented in this study. The results also revealed that the ECB mode of the Blowfish method is ineffective for images and text files with long sequences of identical bytes.…”
Section: Srinivas Mudepalli…e Tc 2017mentioning
confidence: 99%
“…Other studies improved key generation of Blowfish to minimize the time required to produce subkeys [23]- [26]. For all studies involving the production of subkeys, the generation of elements achieved reduced time complexity though approaches used was entirely different from that of the original algorithm.…”
Section: Introductionmentioning
confidence: 99%