2013 Second International Conference on Informatics &Amp; Applications (ICIA) 2013
DOI: 10.1109/icoia.2013.6650222
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of blowfish algorithm

Abstract: Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient. In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient. We analyzed the randomness of the Blowfish output in an earlier paper titled… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 60 publications
(21 citation statements)
references
References 6 publications
0
21
0
Order By: Relevance
“…Blowfish uses a large number of subkeys that can be precomputed before any data encryption or decryption. Blowfish consists of an array also called as P-array which comprises of 18 sub-keys [28]. This prevents attackers from figuring out how the sub-keys were generated, and then gaining access to all the other known keys.…”
Section: ) Encryptionmentioning
confidence: 99%
“…Blowfish uses a large number of subkeys that can be precomputed before any data encryption or decryption. Blowfish consists of an array also called as P-array which comprises of 18 sub-keys [28]. This prevents attackers from figuring out how the sub-keys were generated, and then gaining access to all the other known keys.…”
Section: ) Encryptionmentioning
confidence: 99%
“…Blowfish may be a quick, compact, and straightforward block encoding algorithm with variable length key permitting a trade-off between speed and security. The block size is sixty four bit and uses 16-round Feistel Cipher and enormous key-dependent S boxes [11,12]. The algorithm keeps 2 subkey arrays; 18entry P-array and 4 256-entry S-boxes.…”
Section: Blowfish Algorithmmentioning
confidence: 99%
“…It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use (Alabaichi, Ahmad, & Mahmod, 2013). It is a freely available symmetric block cipher designed in 1993 by Bruce Schneier.…”
Section: Blowfishmentioning
confidence: 99%