2020
DOI: 10.12928/telkomnika.v18i2.13556
|View full text |Cite
|
Sign up to set email alerts
|

A new multi-level key block cypher based on the Blowfish algorithm

Abstract: Blowfish is a block cypher algorithm used in many applications to enhance security, but it includes several drawbacks. For example, the mix between the key and data is limited. This paper presents a new modification to the Blowfish algorithm to overcome such problems realised through a multi-state operation instead of an XOR. Our proposed algorithm uses three keys in the encryption and decryption processes instead of one for controlling the variable block bits sizes (1, 2, 4, and 8) bits and for determining th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 2 publications
(2 reference statements)
0
6
0
Order By: Relevance
“…When the MLP algorithm was applied, an accuracy of 99.96% was achieved in representing the malware dataset. Conversely, when the same dataset was subjected to the RBFN [25] algorithm, an accuracy of 99.82% was obtained. An accuracy of 98.62% was achieved when the RBFN algorithm was utilized to represent the dynamic API dataset.…”
Section: Resultsmentioning
confidence: 99%
“…When the MLP algorithm was applied, an accuracy of 99.96% was achieved in representing the malware dataset. Conversely, when the same dataset was subjected to the RBFN [25] algorithm, an accuracy of 99.82% was obtained. An accuracy of 98.62% was achieved when the RBFN algorithm was utilized to represent the dynamic API dataset.…”
Section: Resultsmentioning
confidence: 99%
“…Step2.1: Apply multiplication between mask encryption and Magic Square over Galois Field. Step2.2: Apply summation of Magic Square using the equations (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)…”
Section: Algorithm 1 Encryption Algorithm Based On Ms6mentioning
confidence: 99%
“…For the public key, it is employed for encryption, whereas the private key is employed for decryption (e.g. Rivest Shamir Adleman (RSA)) [3]- [5]. A public key encryption is based on mathematical operations, which is computationally strong.…”
Section: Introductionmentioning
confidence: 99%
“…Before retrieving the original text, the work will be changed to a linear equation system and noting that the number of equations is equal to the number of unknowns to be solved. before solving the work by Gaussian elimination or anyway is chosen requires arranging the equations in such a way that the main diagonal does not contain the value zero, and the final result of the Gaussian elimination method will restore the plain text [15,18]. Cryptography is a science that uses mainly mathematics to encode and decode data by using algorithms with the help of a key [14].…”
Section: Previously Technologies and Advantagesmentioning
confidence: 99%
“…Multi-level keys is a system that consists of more than one layer of keys, in such a way that the information is stored in a small database and the required key sequence is chosen from it [15]. In this proposed paper, we will use magic square, GF with both types, Additional message length, Multi-level keys, and Extra Key, in order, as will be seen later.…”
Section: Previously Technologies and Advantagesmentioning
confidence: 99%