Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes

In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of...

Full description

Bibliographic Details
Main Authors: Bushra Jaber M.Jawad, Saif Al-alak
Format: Article
Language:English
Published: College of Computer and Information Technology – University of Wasit, Iraq 2023-12-01
Series:Wasit Journal of Computer and Mathematics Science
Subjects:
Online Access:https://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/203
_version_ 1797198928557375488
author Bushra Jaber M.Jawad
Saif Al-alak
author_facet Bushra Jaber M.Jawad
Saif Al-alak
author_sort Bushra Jaber M.Jawad
collection DOAJ
description In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of easy guessable or compromised keys can lead to unauthorized access, data breaches, and identity theft. Additionally, the distribution and management of secret keys present challenges such as key generation, key distribution, key revocation, and key renewal, which can be complex and costly. Therefore, finding secure and efficient methods to manage secret keys is crucial for ensuring the confidentiality, integrity, and availability of sensitive information in today's digital age. Therefore, to improve the security of the symmetric encryption algorithms, The new method to encrypt and decrypt the difference size files using multiple keys is proposed. In addition to investigate the impact of using multiple keys on the security and performance of symmetric algorithms. However, the multiple keys are generated previously using MD5 and SHA2. The chosen algorithms in this study are Blowfish and CAST, with chosen three modes of operation: CBC, CFB and CTR. The results presented in the paper demonstrated that the Blowfish algorithm with generated multiple keys outperforms in the CBC mode despite has the most encryption and decryption time-consuming and memory usage. Where the randomness of Blowfish with mode CBC and CTR is the best throughput then it follows Blowfish with mode CFB.
first_indexed 2024-03-07T19:03:25Z
format Article
id doaj.art-74cda9ccb3834a199e5552ba698eb806
institution Directory Open Access Journal
issn 2788-5879
2788-5887
language English
last_indexed 2024-04-24T07:07:39Z
publishDate 2023-12-01
publisher College of Computer and Information Technology – University of Wasit, Iraq
record_format Article
series Wasit Journal of Computer and Mathematics Science
spelling doaj.art-74cda9ccb3834a199e5552ba698eb8062024-04-21T17:26:52ZengCollege of Computer and Information Technology – University of Wasit, IraqWasit Journal of Computer and Mathematics Science2788-58792788-58872023-12-012410.31185/wjcms.203Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR ModesBushra Jaber M.Jawad0Saif Al-alak1Department of Information Networks, College of Information Technology, University of Babylon, Iraq, Department of Accounting, College of Administration and Economics, University of Kerbala, IraqDepartment of Computer Science, College of science for women, University of Babylon, Babel, Iraq In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of easy guessable or compromised keys can lead to unauthorized access, data breaches, and identity theft. Additionally, the distribution and management of secret keys present challenges such as key generation, key distribution, key revocation, and key renewal, which can be complex and costly. Therefore, finding secure and efficient methods to manage secret keys is crucial for ensuring the confidentiality, integrity, and availability of sensitive information in today's digital age. Therefore, to improve the security of the symmetric encryption algorithms, The new method to encrypt and decrypt the difference size files using multiple keys is proposed. In addition to investigate the impact of using multiple keys on the security and performance of symmetric algorithms. However, the multiple keys are generated previously using MD5 and SHA2. The chosen algorithms in this study are Blowfish and CAST, with chosen three modes of operation: CBC, CFB and CTR. The results presented in the paper demonstrated that the Blowfish algorithm with generated multiple keys outperforms in the CBC mode despite has the most encryption and decryption time-consuming and memory usage. Where the randomness of Blowfish with mode CBC and CTR is the best throughput then it follows Blowfish with mode CFB. https://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/203Cryptography, symmetric algorithms, Secret keys, Blowfish algorithm, CAST algorithm, Mode operation CBC, CTR,CFB.
spellingShingle Bushra Jaber M.Jawad
Saif Al-alak
Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
Wasit Journal of Computer and Mathematics Science
Cryptography, symmetric algorithms, Secret keys, Blowfish algorithm, CAST algorithm, Mode operation CBC, CTR,CFB.
title Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
title_full Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
title_fullStr Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
title_full_unstemmed Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
title_short Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
title_sort design and implementation of multi key blowfish and cast algorithm comparative study with cbc cfb and ctr modes
topic Cryptography, symmetric algorithms, Secret keys, Blowfish algorithm, CAST algorithm, Mode operation CBC, CTR,CFB.
url https://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/203
work_keys_str_mv AT bushrajabermjawad designandimplementationofmultikeyblowfishandcastalgorithmcomparativestudywithcbccfbandctrmodes
AT saifalalak designandimplementationofmultikeyblowfishandcastalgorithmcomparativestudywithcbccfbandctrmodes