Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data

Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authoriz...

Full description

Bibliographic Details
Main Authors: Abidemi Emmanuel Adeniyi, Sanjay Misra, Eniola Daniel, Anthony Bokolo
Format: Article
Language:English
Published: MDPI AG 2022-10-01
Series:Algorithms
Subjects:
Online Access:https://www.mdpi.com/1999-4893/15/10/373
_version_ 1797476018109284352
author Abidemi Emmanuel Adeniyi
Sanjay Misra
Eniola Daniel
Anthony Bokolo
author_facet Abidemi Emmanuel Adeniyi
Sanjay Misra
Eniola Daniel
Anthony Bokolo
author_sort Abidemi Emmanuel Adeniyi
collection DOAJ
description Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques. Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance. Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data. After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect. Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish. Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better. Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.7176% for normal Blowfish and 43.3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish. Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.0 ms for normal Blowfish and 248.4 ms for the modified Blowfish algorithm. Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.
first_indexed 2024-03-09T20:52:57Z
format Article
id doaj.art-cbaea58da3b24814bc28c4cd87df560c
institution Directory Open Access Journal
issn 1999-4893
language English
last_indexed 2024-03-09T20:52:57Z
publishDate 2022-10-01
publisher MDPI AG
record_format Article
series Algorithms
spelling doaj.art-cbaea58da3b24814bc28c4cd87df560c2023-11-23T22:30:29ZengMDPI AGAlgorithms1999-48932022-10-01151037310.3390/a15100373Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video DataAbidemi Emmanuel Adeniyi0Sanjay Misra1Eniola Daniel2Anthony Bokolo3Department of Computer Sciences, Precious Cornerstone University, Ibadan 200223, NigeriaDepartment of Computer Science and Communication, Østfold University College, 1757 Halden, NorwayDepartment of Computer Science, Landmark University, Omu-Aran 251103, NigeriaDepartment of Applied Data Sciences, Institute for Energy Technology, 1777 Halden, NorwayBackground: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques. Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance. Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data. After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect. Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish. Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better. Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.7176% for normal Blowfish and 43.3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish. Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.0 ms for normal Blowfish and 248.4 ms for the modified Blowfish algorithm. Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.https://www.mdpi.com/1999-4893/15/10/373time complexitycryptographic algorithmsmodified blowfish algorithmblowfish algorithmsecurity
spellingShingle Abidemi Emmanuel Adeniyi
Sanjay Misra
Eniola Daniel
Anthony Bokolo
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
Algorithms
time complexity
cryptographic algorithms
modified blowfish algorithm
blowfish algorithm
security
title Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
title_full Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
title_fullStr Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
title_full_unstemmed Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
title_short Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
title_sort computational complexity of modified blowfish cryptographic algorithm on video data
topic time complexity
cryptographic algorithms
modified blowfish algorithm
blowfish algorithm
security
url https://www.mdpi.com/1999-4893/15/10/373
work_keys_str_mv AT abidemiemmanueladeniyi computationalcomplexityofmodifiedblowfishcryptographicalgorithmonvideodata
AT sanjaymisra computationalcomplexityofmodifiedblowfishcryptographicalgorithmonvideodata
AT enioladaniel computationalcomplexityofmodifiedblowfishcryptographicalgorithmonvideodata
AT anthonybokolo computationalcomplexityofmodifiedblowfishcryptographicalgorithmonvideodata