Javascript must be enabled to continue!
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
View through CrossRef
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques. Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance. Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data. After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect. Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish. Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better. Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.7176% for normal Blowfish and 43.3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish. Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.0 ms for normal Blowfish and 248.4 ms for the modified Blowfish algorithm. Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.
Title: Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
Description:
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies.
However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques.
Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance.
Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data.
After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect.
Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish.
Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better.
Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.
7176% for normal Blowfish and 43.
3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish.
Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.
0 ms for normal Blowfish and 248.
4 ms for the modified Blowfish algorithm.
Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.
Related Results
Complexity Theory
Complexity Theory
The workshop
Complexity Theory
was organised by Joachim von zur Gathen (Bonn), Oded Goldreich (Rehovot), Claus-Peter Schnorr (Frankfurt), an...
ANALISIS PERBANDINGAN RUANG DAN WAKTU ALGORITMA ENKRIPSI BLOWFISH DAN TWOFISH PADA ENKRIPSI DAN DESKRIPSI BERKAS MENGGUNAKAN MODUL PYTHON
ANALISIS PERBANDINGAN RUANG DAN WAKTU ALGORITMA ENKRIPSI BLOWFISH DAN TWOFISH PADA ENKRIPSI DAN DESKRIPSI BERKAS MENGGUNAKAN MODUL PYTHON
The rapid development of information technology is accompanied by an increase in cyber incidents such as data breaches. One of the security methods that can be implemented to enhan...
Audio and video editing system design based on OpenCV
Audio and video editing system design based on OpenCV
With the rapid development of the Internet, a new carrier for people to perceive the world and communicate with each other - audio and video - is gradually being favoured by the pu...
Secretary Bird-Inspired Optimization of Advanced Encryption Standard (AES) and Blowfish Encryption Algorithms for Robust Data Protection
Secretary Bird-Inspired Optimization of Advanced Encryption Standard (AES) and Blowfish Encryption Algorithms for Robust Data Protection
This study explores the hybridization of AES and Blowfish encryption algorithms to enhance data security, particularly for medical datasets. While combining these ciphers offers im...
Evaluasi Kinerja Algoritma Kriptografi dalam Pengamanan Video: Studi Perbandingan AES, DES dan Blowfish
Evaluasi Kinerja Algoritma Kriptografi dalam Pengamanan Video: Studi Perbandingan AES, DES dan Blowfish
Keamanan data digital semakin menjadi perhatian utama di era modern, terutama dalam pengamanan file video yang berisi informasi penting. Salah satu metode yang umum digunakan untuk...
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
A Proposed Adaptive Bitrate Scheme Based on Bandwidth Prediction Algorithm for Smoothly Video Streaming
A robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amoun...
Video tracking for marketing applications
Video tracking for marketing applications
Traçage du contenu marketing vidéo
Au cours des dernières décennies, la production et la consommation de vidéos ont considérablement augmenté et il est communément ...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...

