International Journal of Soft Computing

Year: 2014
Volume: 9
Issue: 5
Page No. 318 - 332

A Cylindrical Coordinate System with Dynamic Permutation Table for Blowfish Algorithm

Authors : Ashwak Alabaichi, Ramlan Mahmod and Faudziah Ahmad

References

Al-Neaimi, A.M.A. and R.F. Hassan, 2011. New approach for modified blowfish algorithm using 4-states keys. Int. J. Comput. Sci. Network Secur., 11: 21-26.
Direct Link  |  

Alabaichi, A., R. Mahmod and F. Ahmad, 2013. Randomness analysis of 128 bits blowfish block cipher on ECB mode. Int. J. Comput. Sci. Inform. Secur., 11: 8-21.

Alabaichi, A.M., R. Mahmod, M.S. Mechee and F. Ahmad, 2013. Randomness analysis on blowfish block cipher using ECB and CBC Modes. Applied Sci. J., 13: 768-789.
Direct Link  |  

Ariffin, S., 2012. A human immune system inspired byte permutation of block cipher. Ph.D. Thesis, Universiti Putara Malaysia, Malaysia.

Bassham, III L.E., A. Rukhin, J. Soto, J. Nechvatal and M. Smid et al., 2010. A statistical test suite for random and pseudorandom number generators for cryptographic applications. National Institute of Standards and Technology Special Publication 800-22 Revision 1a, Gaithersburg, MD., USA., April 2010.

Chandrasekaran, J., B. Subramanyan and G.S. Raman, 2011. Ensemble of blowfish with chaos based s box design for text and image encryption. Int. J. Network Secu. Appl., 3: 165-173.
Direct Link  |  

Cornwell, J.W., 2012. Blowfish survey. https://cs.columbusstate.edu/cae-ia/StudentPapers/cornwell.jason.pdf.

El-Ramly, S. H., T. El-Garf and A.H. Soliman, 2001. Dynamic generation of S-boxes in block cipher systems. Proceedings of the IEEE Eighteenth National Radio Science Conference, March 27-29, 2001, Mansoura, pp: 389-397.

Elminaam, D.S.A., H.M. Abdual-Kader and M.M. Hadhoud, 2010. Evaluating the performance of symmetric encryption algorithms. Int. J. Network Sec., 10: 216-222.
Direct Link  |  

Hashim, A.T., S.M. Al-Qarrawy and J.A. Mahdi, 2009. Design and Implementation of an Improvement of Blowfish Encryption Algorithm. IJCCCE, 9: 1-15.
Direct Link  |  

Hubbard, J.H. and B.B. Hubbard, 2002. Vector Calculus, Linear Algebra, and Differential Forms: A Unified Approach. 2nd Edn., Prentice Hall, USA., ISBN: 9780130414083, Pages: 800.

Mahdi, J.A., 2009. Design and implementation of proposed B-R encryption algorithm. IJCCCSE, 9: 1-17.
Direct Link  |  

Mandal, P.C., 2012. Evaluation of performance of the symmetric key algorithms: DES, 3DES, AES and blowfish. J. Global Res. Comput. Sci., 3: 67-70.

Manikandan, G., N. Sairam and M. Kamarasan, 2012. A new approach for improving data security using iterative blowfish algorithm. Res. J. Applied Sci., 4: 603-607.
Direct Link  |  

Manikandan, G., P. Rajendiran, K. Chakarapani, G. Krishnan and G. Sundarganesh, 2012. A modified crypto scheme for enhancing data security. J. Theor. Applied Inform. Technol., 35: 149-154.
Direct Link  |  

Menezes, A.J., P.C. van Oorschot and S.A. Vanstone, 1997. Handbook of Applied Cryptography. CRC Press, New York, USA.

Meyers, R.K. and A.H. Desoky, 2008. An implementation of the blowfish cryptosystem. Proceedings of the IEEE International Symposium, Signal Processing and Information Technology, December 16-19, 2008, Sarajevo, Bosnia and Herzegovina, pp: 346-351.

Mousa, A., 2005. Data encryption performance based on Blowfish. Proceedings of the 47th International Symposium ELMAR, June 8-10, 2005, Zadar, Croatia, pp: 131-134.

Naganathan, E. R., V. Nandakumar and S.S. Dhenakaran, 2011. Identity based encryption using feistel cipher. Eur. J. Sci. Res., 54: 532-537.

Nechvatal, J., E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti and E. Roback, 2000. Report on the Development of the Advanced Encryption Standard (AES). National Institute of Standard and Technology, USA.

Nie, T. and T. Zhang, 2009. A study of DES and Blowfish encryption algorithm. Proceedings of the IEEE Region 10 Conference TENCON, January 23-26, 2009, Singapore, pp: 1 4-.

Salas, S.L., J. Garret and E.E. Hille, 2002. Calculus: One and Several Variables. 9th Edn., John Wiley and Sons, New York.

Schneier, B., 1994. Description of a new variable-length key, 64-bit block cipher (Blowfish). Proceedings of the Cambridge Security Workshop, December 9-11, 1994, Cambridge, UK., pp: 191-204.

Shannon, C.E., 1949. Communication theory of secrecy systems. Bell Syst. Tech. J., 28: 656-715.
CrossRef  |  Direct Link  |  

Soto, J. and L. Bassham, 2000. Randomness testing of the advanced encryption standard finalist candidates. NIST IR 6483, National Institute of Standards and Technology, U.S. Department of Commerce, Gaithersburg, MD., USA., March 2000.

Soto, J., 1999. Randomness testing of the advanced encryption standard candidate algorithms. U.S. Department Of Commerce, NISTIR 6390, September 1999.http://csrc.nist.gov/publications/nistir/ir6390.pdf.

Suri, P.R. and S.S. Deora, 2010. A cipher based on 3D array block rotation. Int. J. Comput. Sci. Network Secur., 10: 186-191.
Direct Link  |  

Wang, Z., J. Graham, N. Ajam and H. Jiang, 2011. Design and optimization of hybrid MD5-blowfish encryption on GPUs. Proceedings of the International Conference on Parallel and Distribute Processing Techniques and Applications, July 18-21, 2011, Las Vegas, Nevada, USA. -.

Zhang, R. and L. Chen, 2008. A block cipher using key-dependent S-box and P-boxes. Proceedings of the IEEE International Symposium on Industrial Electronics, June 30 -July-2, 2008, Cambridge, pp: 1463-1468.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved