Proposed Method to Enhance the Security of Blowfish Algorithm
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Unviversity of Technology- Iraq
2011-09-01
|
Series: | Engineering and Technology Journal |
Subjects: | |
Online Access: | https://etj.uotechnology.edu.iq/article_32967_a95a46a89a486587dee390b62feea09c.pdf |
_version_ | 1827358370080751616 |
---|---|
author | Shaimaa H. Shaker |
author_facet | Shaimaa H. Shaker |
author_sort | Shaimaa H. Shaker |
collection | DOAJ |
description | The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This paper introduces a proposed method to enhance the complexity of the Blowfish algorithm. This is done by using an operation depends on using eighteen multiple keys, each key consists of a combination of 4 states (0, 1, 2, 3) instead of the ordinary 2 state key (0, 1) applied during the 16 round of Blowfish algorithm, according the analysis of results found the new approach provide more secure and more robustness to cryptanlaysis methods. |
first_indexed | 2024-03-08T06:09:48Z |
format | Article |
id | doaj.art-b479760f6f434fcfa36fee10346669c5 |
institution | Directory Open Access Journal |
issn | 1681-6900 2412-0758 |
language | English |
last_indexed | 2024-03-08T06:09:48Z |
publishDate | 2011-09-01 |
publisher | Unviversity of Technology- Iraq |
record_format | Article |
series | Engineering and Technology Journal |
spelling | doaj.art-b479760f6f434fcfa36fee10346669c52024-02-04T17:42:24ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582011-09-0129132648266110.30684/etj.29.13.632967Proposed Method to Enhance the Security of Blowfish AlgorithmShaimaa H. ShakerThe selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This paper introduces a proposed method to enhance the complexity of the Blowfish algorithm. This is done by using an operation depends on using eighteen multiple keys, each key consists of a combination of 4 states (0, 1, 2, 3) instead of the ordinary 2 state key (0, 1) applied during the 16 round of Blowfish algorithm, according the analysis of results found the new approach provide more secure and more robustness to cryptanlaysis methods.https://etj.uotechnology.edu.iq/article_32967_a95a46a89a486587dee390b62feea09c.pdfcomputer securityblowfish algorithmtriple encryption |
spellingShingle | Shaimaa H. Shaker Proposed Method to Enhance the Security of Blowfish Algorithm Engineering and Technology Journal computer security blowfish algorithm triple encryption |
title | Proposed Method to Enhance the Security of Blowfish Algorithm |
title_full | Proposed Method to Enhance the Security of Blowfish Algorithm |
title_fullStr | Proposed Method to Enhance the Security of Blowfish Algorithm |
title_full_unstemmed | Proposed Method to Enhance the Security of Blowfish Algorithm |
title_short | Proposed Method to Enhance the Security of Blowfish Algorithm |
title_sort | proposed method to enhance the security of blowfish algorithm |
topic | computer security blowfish algorithm triple encryption |
url | https://etj.uotechnology.edu.iq/article_32967_a95a46a89a486587dee390b62feea09c.pdf |
work_keys_str_mv | AT shaimaahshaker proposedmethodtoenhancethesecurityofblowfishalgorithm |