Proposed Method to Enhance the Security of Blowfish Algorithm

The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality...

Full description

Bibliographic Details
Main Author: Shaimaa H. Shaker
Format: Article
Language:English
Published: Unviversity of Technology- Iraq 2011-09-01
Series:Engineering and Technology Journal
Subjects:
Online Access:https://etj.uotechnology.edu.iq/article_32967_a95a46a89a486587dee390b62feea09c.pdf
_version_ 1827358370080751616
author Shaimaa H. Shaker
author_facet Shaimaa H. Shaker
author_sort Shaimaa H. Shaker
collection DOAJ
description The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This paper introduces a proposed method to enhance the complexity of the Blowfish algorithm. This is done by using an operation depends on using eighteen multiple keys, each key consists of a combination of 4 states (0, 1, 2, 3) instead of the ordinary 2 state key (0, 1) applied during the 16 round of Blowfish algorithm, according the analysis of results found the new approach provide more secure and more robustness to cryptanlaysis methods.
first_indexed 2024-03-08T06:09:48Z
format Article
id doaj.art-b479760f6f434fcfa36fee10346669c5
institution Directory Open Access Journal
issn 1681-6900
2412-0758
language English
last_indexed 2024-03-08T06:09:48Z
publishDate 2011-09-01
publisher Unviversity of Technology- Iraq
record_format Article
series Engineering and Technology Journal
spelling doaj.art-b479760f6f434fcfa36fee10346669c52024-02-04T17:42:24ZengUnviversity of Technology- IraqEngineering and Technology Journal1681-69002412-07582011-09-0129132648266110.30684/etj.29.13.632967Proposed Method to Enhance the Security of Blowfish AlgorithmShaimaa H. ShakerThe selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. This paper introduces a proposed method to enhance the complexity of the Blowfish algorithm. This is done by using an operation depends on using eighteen multiple keys, each key consists of a combination of 4 states (0, 1, 2, 3) instead of the ordinary 2 state key (0, 1) applied during the 16 round of Blowfish algorithm, according the analysis of results found the new approach provide more secure and more robustness to cryptanlaysis methods.https://etj.uotechnology.edu.iq/article_32967_a95a46a89a486587dee390b62feea09c.pdfcomputer securityblowfish algorithmtriple encryption
spellingShingle Shaimaa H. Shaker
Proposed Method to Enhance the Security of Blowfish Algorithm
Engineering and Technology Journal
computer security
blowfish algorithm
triple encryption
title Proposed Method to Enhance the Security of Blowfish Algorithm
title_full Proposed Method to Enhance the Security of Blowfish Algorithm
title_fullStr Proposed Method to Enhance the Security of Blowfish Algorithm
title_full_unstemmed Proposed Method to Enhance the Security of Blowfish Algorithm
title_short Proposed Method to Enhance the Security of Blowfish Algorithm
title_sort proposed method to enhance the security of blowfish algorithm
topic computer security
blowfish algorithm
triple encryption
url https://etj.uotechnology.edu.iq/article_32967_a95a46a89a486587dee390b62feea09c.pdf
work_keys_str_mv AT shaimaahshaker proposedmethodtoenhancethesecurityofblowfishalgorithm