Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
Abstract
:1. Introduction
2. Materials and Methods
2.1. Blowfish Encryption
Algorithm 1. Blowfish F function. |
Divide x into two 32-bit halves: xL, xR For i = 1 to 16: xL = XL XOR Pi xR = F(XL) XOR xR Swap XL and xR Swap XL and xR (Undo the last swap.) xR = xR XOR P17 xL = xL XOR P18 Recombine xL and xR |
2.2. Modified Blowfish Encryption
Pseudo-Code |
A. Pseudo-code for F-Function with four S-Boxes (S0, S1, S2, and S3) |
1: Divide xL into four eight-bit quarters: a, b, c, and d 2: F(xL) = ((S0,a + S1,b mod 232)^S2,c) + S3,d mod 232 |
B. Pseudo-code for optimized F function with two S-boxes |
1: Divide xL into two sixteen-bit quarters: a, and b. 2: F(xR) = (S0,a^ S1,b) |
C. Pseudo-code for Encryption |
1: Divide the 64-bit input data into two 32-bit halves (left and right): xL and xR 2: for i = 0 to16 xL is XORed with P[i]. Find F(xL) F(xL) is XORed with xR. Interchange xL and xR. 3: Interchange xL and xR. 4: xR is XORed with P [16]. 5: xL is XORed with P [17]. 6: Combine xL and xR. |
D. Pseudo-code for Decryption |
1: Divide the 64-bit input data into two 32-bit halves (left and right): xL and xR 2: for i = 17 to1 xL is XORed with P[i]. Find F(xL); F(xL) is XORed with xR. Interchange xL and xR. 3: Interchange xL and xR. 4: xR is XORed with P [1]. 5: xL is XORed with P [0]. 6: Combine xL and xR |
3. Results
Application Terminal
4. Discussion
4.1. Performance Evaluation
4.1.1. Performance Comparison Based on Execution Time
4.1.2. Performance Comparison Based on Throughput
4.1.3. Avalanche Effect
4.1.4. Threats to Validity
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Lyon, D. Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data Soc. 2014, 1, 2053951714541861. [Google Scholar] [CrossRef]
- Ryan, M. Ransomware Revolution: The Rise of a Prodigious Cyber Threat; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Ma, N. Distributed video coding scheme of multimedia data compression algorithm for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2019, 2019, 254. [Google Scholar] [CrossRef]
- Kandris, D.; Nakas, C.; Vomvas, D.; Koulouras, G. Applications of wireless sensor networks: An up-to-date survey. Appl. Syst. Innov. 2020, 3, 14. [Google Scholar] [CrossRef] [Green Version]
- Ogundokun, R.O.; Awotunde, J.B.; Adeniyi, E.A.; Ayo, F.E. Crypto-Stegno based model for securing medical information on IOMT platform. Multimed. Tools Appl. 2021, 80, 31705–31727. [Google Scholar] [CrossRef]
- Mat Kiah, M.L.; Al-Bakri, S.H.; Zaidan, A.A.; Zaidan, B.B.; Hussain, M. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture. J. Med. Syst. 2014, 38, 133. [Google Scholar] [CrossRef] [PubMed]
- Adeniyi, E.A.; Falola, P.B.; Maashi, M.S.; Aljebreen, M.; Bharany, S. Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions. Information 2022, 13, 442. [Google Scholar] [CrossRef]
- Barona, R.; Anita, E.M. A survey on data breach challenges in cloud computing security: Issues and threats. In Proceedings of the 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Kollam, India, 20–21 April 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–8. [Google Scholar]
- Sudha, M.; Monica, M. Enhanced security framework to ensure data security in cloud computing using cryptography. Adv. Comput. Sci. Its Appl. 2012, 1, 32–37. [Google Scholar]
- Dilsha; Unni, S.; Jothi, L.M.; Nair, L.S.; Kumar, N.M. Visual Pathognomy; Visvesvaraya Technological University: Belgaum, India, 2016. [Google Scholar]
- Aumasson, J.P. Serious Cryptography: A Practical Introduction to Modern Encryption; No Starch Press: San Francisco, CA, USA, 2017. [Google Scholar]
- Bertino, E.; Khan, L.R.; Sandhu, R.; Thuraisingham, B. Secure knowledge management: Confidentiality, trust, and privacy. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2006, 36, 429–438. [Google Scholar] [CrossRef]
- Alanazi, H.; Zaidan, B.B.; Zaidan, A.A.; Jalab, H.A.; Shabbir, M.; Al-Nabhani, Y. New comparative study between DES, 3DES and AES within nine factors. arXiv 2010, arXiv:1003.4085. [Google Scholar]
- Fitwi, A.; Chen, Y.; Zhu, S.; Blasch, E.; Chen, G. Privacy-preserving surveillance as an edge service based on lightweight video protection schemes using face de-identification and window masking. Electronics 2021, 10, 236. [Google Scholar] [CrossRef]
- Emmanuel, A.A.; Okeyinka, A.E.; Adebiyi, M.O.; Asani, E.O. A Note on Time and Space Complexity of RSA and ElGamal Cryptographic Algorithms. Int. J. Adv. Comput. Sci. Appl. 2021, 12. [Google Scholar] [CrossRef]
- Nie, T.; Song, C.; Zhi, X. Performance evaluation of DES and Blowfish algorithms. In Proceedings of the 2010 International Conference on Biomedical Engineering and Computer Science, Wuhan, China, 23–25 April 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 1–4. [Google Scholar]
- Tahseen, I.; Habeeb, S. Proposal new approach for blowfish algorithm by using random key generator. J. Madenat Alelem Univ. Coll. 2012, 4, 5–13. [Google Scholar]
- Agrawal, M.; Mishra, P. A modified approach for symmetric key cryptography based on blowfish algorithm. Int. J. Eng. Adv. Technol. IJEAT 2012, 1, 79–83. [Google Scholar]
- Geethavani, B.; Prasad, E.V.; Roopa, R. A new approach for secure data transfer in audio signals using DWT. In Proceedings of the 2013 15th International Conference on Advanced Computing Technologies (ICACT), Rajampet, India, 21–22 September 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1–6. [Google Scholar]
- Dulla, G.L.; Gerardo, B.D.; Medina, R.P. An Enhanced BlowFish (eBf) Algorithm for Securing x64FileMessage Content. In Proceedings of the 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Baguio City, Philippines, 29 November–2 December 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Christina, L.; Joe Irudayaraj, V.S. Optimized Blowfish encryption technique. Int. J. Innov. Res. Comput. Commun. Eng. 2014, 2, 5009–5015. [Google Scholar]
- Prasetyo, K.N.; Purwanto, Y.; Darlis, D. An implementation of data encryption for Internet of Things using blowfish algorithm on FPGA. In Proceedings of the 2014 2nd International Conference on Information and Communication Technology (ICoICT), Bandung, Indonesia, 28–30 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 75–79. [Google Scholar]
- Prasad, K.L.; Anusha, P.; Jyothi, G.; Dileepkumar, K. Design and Analysis of Secure and Efficient Image with Embedded Sensitive Information Transferring Technique using Blowfish Algorithm. I-Manag. J. Inf. Technol. 2016, 5, 1. [Google Scholar]
- Abiodun, M.K.; Awotunde, J.B.; Ogundokun, R.O.; Adeniyi, E.A.; Arowolo, M.O. Security and information assurance for IoT-based big data. In Artificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities; Springer: Cham, Switzerland, 2021; pp. 189–211. [Google Scholar]
- Ali NH, M.; Abead, S.A. Modified Blowfish Algorithm for Image Encryption using Multi Keys based on five Sboxes. Iraqi J. Sci. 2016, 57, 2968–2978. [Google Scholar]
- Reyes AR, L.; Festijo, E.D.; Medina, R.P. Blowfish-128: A modified blowfish algorithm that supports 128-bit block size. In Proceedings of the 8th International Workshop on Computer Science and Engineering, Bangkok, Thailand, 28–30 June 2018; pp. 578–584. [Google Scholar]
- Corpuz, R.R.; Gerardo, B.D.; Medina, R.P. Using a modified approach of blowfish algorithm for data security in cloud computing. In Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, Hong Kong, China, 29–30 December 2018; pp. 157–162. [Google Scholar]
- Shetty, V.S.; Anusha, R.; MJ, D.K.; Hegde, P. A survey on performance analysis of block cipher algorithms. In Proceedings of the 2020 International Conference on Inventive Computation Technologies (ICICT), Lalitpur, Nepal, 20–22 July 2022; IEEE: Piscataway, NJ, USA, 2020; pp. 167–174. [Google Scholar]
- Kumar, M.A.; Karthikeyan, S. Investigating the efficiency of Blowfish and Rejindael (AES) algorithms. Int. J. Comput. Netw. Inf. Secur. 2012, 4, 22. [Google Scholar]
S/N | Authors | Algorithms | Parameter | Outcome | Gap |
---|---|---|---|---|---|
1 | Nie, Song, and Zhi [16] | DES and Blowfish | Wireless Sensor Network Application (WSN) | Blowfish outperforms DES in terms of speed | The algorithms were tested on small WSN data. |
2 | Tahseen and Habeeb [17] | Blowfish using Random Key Generator | Image data | The Random Key Generator was used to generate Blowfish algorithm encryption key | The study only tests the enhanced Blowfish on image data |
3 | Agrawal and Mishra [18] | Modified Blowfish | Text Data | The study captures the runtime of encrypting the plaintext. | The study did not specify how the algorithm was modified |
4 | Geethavani, Prasad, and Roopa [19] | Blowfish and Steganography | Text Data and Audio File | The study encrypts text data using Blowfish and embeds the cipher text in an audio file using discrete wavelet transform | The method used is secure; however, it is not time efficient. |
5 | Manju and Neema [20] | Blowfish Algorithm | Text Data on IoT devices | The algorithm seems to be better for IoT devices in terms of execution time, memory usage, throughput, power consumption, and security | The algorithm block size and key length were reduced because it was used on devices with limited resources. |
6 | Ali and Abead [21] | Modified Blowfish | Image Data | The five S-Boxes were modified with multi keys applied to encrypt the image. | The complexity of the modified algorithm was greatly increased. |
7 | Dulla, Gerardo, and Medina [22] | Blowfish-128 Modified | Text Data | The modifications improved performance and execution time | The complexity and diffusion of the algorithm were increased. |
8 | Shetty, Anusha, and Hegde [23] | Improved Blowfish | Encryption quality, correlation coefficients, key sensitivity testing, and output file size | The study used XOR to update the F function so as to improve the algorithm. | The study did not specify the type of parameter used for either text, image, or audio data. |
9 | Kumar and Karthikeyan [29] | Blowfish and AES | Text and Image | Blowfish is better for text data while AES is better for image data. | The experiment was simulated on a system with limited memory space. |
Video Size (Kilobytes) | Key Size (Bytes) | Blowfish Algorithm | Modified Blowfish Algorithm | Blowfish Algorithm | Modified Blowfish Algorithm | ||
---|---|---|---|---|---|---|---|
Encryption Time (ms) | Decryption Time (ms) | Encryption Time (ms) | Decryption Time (ms) | ||||
187.0 | 12 | 25.8 | 26.1 | 23.9 | 24.5 | 51.9 | 49.5 |
342.0 | 12 | 27.3 | 27.8 | 26.6 | 27.0 | 55.1 | 53.6 |
575.0 | 16 | 30.5 | 31.2 | 29.7 | 30.1 | 61.7 | 59.8 |
762.0 | 16 | 41.8 | 41.9 | 39.9 | 40.8 | 83.7 | 80.7 |
970.0 | 20 | 42.5 | 42.8 | 42.0 | 42.1 | 85.3 | 84.1 |
1045.0 | 24 | 49.8 | 49.8 | 49.2 | 49.4 | 99.6 | 98.6 |
1234.0 | 24 | 51.6 | 51.9 | 51.1 | 51.1 | 103.5 | 102.0 |
1445.0 | 28 | 67.6 | 66.9 | 66.8 | 67.1 | 134.5 | 133.9 |
1760.0 | 36 | 89.2 | 89.7 | 88.9 | 88.9 | 178.9 | 177.8 |
2500.0 | 40 | 124.7 | 125.3 | 124.1 | 124.3 | 250.0 | 248.4 |
Average Execution Time | 110.4 | 108.9 |
Video Size (kb) | Variance in Key (%) | Blowfish Algorithm Avalanche Effect (%) | Modified Blowfish Algorithm Avalanche Effect (%) |
---|---|---|---|
187 | 30 | 50.7176 | 43.3398 |
342 | 30 | 50.5176 | 43.1653 |
575 | 30 | 50.4782 | 42.9867 |
762 | 30 | 50.4486 | 42.8815 |
970 | 30 | 50.4597 | 42.6710 |
1045 | 30 | 50.3176 | 41.8910 |
1234 | 30 | 49.9974 | 41.7910 |
1445 | 30 | 49.9931 | 41.8910 |
1760 | 30 | 49.9813 | 41.4501 |
2500 | 30 | 49.8972 | 41.1252 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Adeniyi, A.E.; Misra, S.; Daniel, E.; Bokolo, A., Jr. Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data. Algorithms 2022, 15, 373. https://doi.org/10.3390/a15100373
Adeniyi AE, Misra S, Daniel E, Bokolo A Jr. Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data. Algorithms. 2022; 15(10):373. https://doi.org/10.3390/a15100373
Chicago/Turabian StyleAdeniyi, Abidemi Emmanuel, Sanjay Misra, Eniola Daniel, and Anthony Bokolo, Jr. 2022. "Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data" Algorithms 15, no. 10: 373. https://doi.org/10.3390/a15100373
APA StyleAdeniyi, A. E., Misra, S., Daniel, E., & Bokolo, A., Jr. (2022). Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data. Algorithms, 15(10), 373. https://doi.org/10.3390/a15100373