Javascript must be enabled to continue!
Secretary Bird-Inspired Optimization of Advanced Encryption Standard (AES) and Blowfish Encryption Algorithms for Robust Data Protection
View through CrossRef
This study explores the hybridization of AES and Blowfish encryption algorithms to enhance data security, particularly for medical datasets. While combining these ciphers offers improved robustness, it also introduces challenges such as increased computational overhead, latency, and reduced throughput due to dual encryption processes. To address these issues, the Secretary Bird Optimization Algorithm (SBOA) was integrated to intelligently optimize key sizes, S-box configurations, and round parameters, improving both security and performance. Using twenty CT chest X-ray images from Kaggle.com, the model was implemented in MATLAB R2023a and evaluated based on encryption time, execution time, and throughput. Results showed that AES alone had an encryption time of 24.9954 seconds, execution time of 49.9260 seconds, and throughput of 0.9705 MB/s. Blowfish performed slower, with 53.2667 seconds encryption time, 79.7522 seconds execution time, and 0.6656 MB/s throughput. The hybrid AES–Blowfish model improved performance with 7.8765 seconds encryption time, 15.6502 seconds execution time, and 3.2550 MB/s throughput. However, the optimized SBOA–AES–Blowfish model outperformed all others, achieving 3.1791 seconds encryption time, 6.3386 seconds execution time, and 6.4905 MB/s throughput. In conclusion, the SBOA-enhanced hybrid encryption model demonstrated superior performance, offering the fastest processing and highest throughput while maintaining strong security. These findings confirm that SBOA optimization significantly improves computational efficiency, making the model highly suitable for real-time and large-scale applications such as healthcare and secure communications.
Mediterranean Publications and Research International
Title: Secretary Bird-Inspired Optimization of Advanced Encryption Standard (AES) and Blowfish Encryption Algorithms for Robust Data Protection
Description:
This study explores the hybridization of AES and Blowfish encryption algorithms to enhance data security, particularly for medical datasets.
While combining these ciphers offers improved robustness, it also introduces challenges such as increased computational overhead, latency, and reduced throughput due to dual encryption processes.
To address these issues, the Secretary Bird Optimization Algorithm (SBOA) was integrated to intelligently optimize key sizes, S-box configurations, and round parameters, improving both security and performance.
Using twenty CT chest X-ray images from Kaggle.
com, the model was implemented in MATLAB R2023a and evaluated based on encryption time, execution time, and throughput.
Results showed that AES alone had an encryption time of 24.
9954 seconds, execution time of 49.
9260 seconds, and throughput of 0.
9705 MB/s.
Blowfish performed slower, with 53.
2667 seconds encryption time, 79.
7522 seconds execution time, and 0.
6656 MB/s throughput.
The hybrid AES–Blowfish model improved performance with 7.
8765 seconds encryption time, 15.
6502 seconds execution time, and 3.
2550 MB/s throughput.
However, the optimized SBOA–AES–Blowfish model outperformed all others, achieving 3.
1791 seconds encryption time, 6.
3386 seconds execution time, and 6.
4905 MB/s throughput.
In conclusion, the SBOA-enhanced hybrid encryption model demonstrated superior performance, offering the fastest processing and highest throughput while maintaining strong security.
These findings confirm that SBOA optimization significantly improves computational efficiency, making the model highly suitable for real-time and large-scale applications such as healthcare and secure communications.
Related Results
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. ...
Traditional ecological knowledge of the bird traders on bird species bird naming, and bird market chain: A case study in bird market Pasty Yogyakarta, Indonesia
Traditional ecological knowledge of the bird traders on bird species bird naming, and bird market chain: A case study in bird market Pasty Yogyakarta, Indonesia
Abstract. Iskandar J, Iskandar BS, Mulyanto D, Alfian RL, Partasasmita R. 2020. Traditional ecological knowledge of the bird traders on bird species bird naming, and bird market ch...
ANALISIS PERBANDINGAN RUANG DAN WAKTU ALGORITMA ENKRIPSI BLOWFISH DAN TWOFISH PADA ENKRIPSI DAN DESKRIPSI BERKAS MENGGUNAKAN MODUL PYTHON
ANALISIS PERBANDINGAN RUANG DAN WAKTU ALGORITMA ENKRIPSI BLOWFISH DAN TWOFISH PADA ENKRIPSI DAN DESKRIPSI BERKAS MENGGUNAKAN MODUL PYTHON
The rapid development of information technology is accompanied by an increase in cyber incidents such as data breaches. One of the security methods that can be implemented to enhan...
Modified AES-128 with Boundary-Based Splitting and Dynamic Output Encryption
Modified AES-128 with Boundary-Based Splitting and Dynamic Output Encryption
Encryption is essential for maintaining the confidentiality, integrity, and authenticity of data in today’s digital landscape. As cyber threats continue to escalate, the implementa...
A SECURE FILE ENCRYPTION AND DECRYPTION SYSTEM USING AES FOR TEXT AND IMAGES
A SECURE FILE ENCRYPTION AND DECRYPTION SYSTEM USING AES FOR TEXT AND IMAGES
In today’s digital era, where vast amounts of sensitive data are transmitted over the internet, securing this information from unauthorized access has become a major concern. The r...
Evaluasi Kinerja Algoritma Kriptografi dalam Pengamanan Video: Studi Perbandingan AES, DES dan Blowfish
Evaluasi Kinerja Algoritma Kriptografi dalam Pengamanan Video: Studi Perbandingan AES, DES dan Blowfish
Keamanan data digital semakin menjadi perhatian utama di era modern, terutama dalam pengamanan file video yang berisi informasi penting. Salah satu metode yang umum digunakan untuk...
Modified Advanced Encryption Standard Algorithm for Information Security
Modified Advanced Encryption Standard Algorithm for Information Security
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of the symmetric cryptographic techniques has further opened it up to more attacks. Effort...
End to end encryption of chat using advanced encryption standard-256
End to end encryption of chat using advanced encryption standard-256
In an era marked by rampant digitalization and ubiquitous connectivity, ensuring the security and privacy of communications has become paramount. This paper introduces a novel appl...

