A Novel Approach for Enhancement of Blowfish Algorithm by using DES, DCT Methods for Providing, Strong Encryption and Decryption Capabilities

Main Article Content

Vikas Singhal
Devendra Singh
S. K. Gupta

Abstract

Data safety has evolved into a critical requirement and a duty in modern life. Most of our systems are designed in such a way that it can get hacked, putting our private information at danger. As a result, for numerous safety motives, we utilize various approaches to save as much as possible on this data, regardless of its varied formats, words, photographs, videos, and so on. The data storage capacity of mobile devices is restricted owing to insufficient data storage and processing. In order to develop a safe MCC environment, security concerns must be studied and analysed. This study compares the most widely used symmetric key encryption algorithms, including DES (Data Encryption Standard), Blowfish, TDES (Triple Data Encryption Standard), PRESENT, and KLEIN. The assessment of algorithms is based on attacks, key size, and block size, with the best outcomes in their field.

Article Details

How to Cite
Singhal, V. ., Singh, D. ., & Gupta, S. K. . (2023). A Novel Approach for Enhancement of Blowfish Algorithm by using DES, DCT Methods for Providing, Strong Encryption and Decryption Capabilities. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7s), 339–346. https://doi.org/10.17762/ijritcc.v11i7s.7008
Section
Articles

References

Solichin, A., & Ramadhan, E. W. (2017, October). Enhancing data security using DES-based cryptography and DCT-based steganography. In 2017 3rd International Conference on Science in Information Technology (ICSITech) (pp. 618-621). IEEE.

Prakash, V. S., Bharathiraja, N., Nayagam, R. D., Thiagarajan, R., Krishnamoorthy, R., & Omana, J. (2022, April). EB Algorithm for Effective Privacy and Security of Data Processing in MCC. In 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC) (pp. 241-246). IEEE.

Reddy, A. ., & Waheeb , M. Q. . (2022). Enhanced Pre-Processing Based Cardiac Valve Block Detection Using Deep Learning Architectures. Research Journal of Computer Systems and Engineering, 3(1), 84–89. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/47

Singhal, V., Singh, D., & Gupta, S. K. (2022). Crypto STEGO Techniques to Secure Data Storage Using DES, DCT, Blowfish and LSB Encryption Algorithms. JOURNAL OF ALGEBRAIC STATISTICS, 13(3), 1162-1171.

Chetan, M. D., & Anitadevi, M. D. Enhanced Audio Steganography using Triple DES and DWT Transformation.

Shetty, V. S., Anusha, R., MJ, D. K., & Hegde, P. (2020, February). A survey on performance analysis of block cipher algorithms. In 2020 International Conference on Inventive Computation Technologies (ICICT) (pp. 167-174). IEEE.

Kamil, S., Ayob, M., Sheikhabdullah, S. N. H., & Ahmad, Z. (2018). Challenges in multi-layer data security for video steganography. Asia-Pacific Journal of Information Technology and Multimedia, 7(2–2), 53-62.

Anitadevi, M. D. Enhanced Colour Image Security and Data Hiding Using ECC Encryption and DWT-SVD Transforms.

Gowda, S. N. (2016, October). Using Blowfish encryption to enhance security feature of an image. In 2016 6th International Conference on Information Communication and Management (ICICM) (pp. 126-129). IEEE.

Vaidya, A., More, P. N., Fegade, R. K., Bhavsar, M. A., & Raut, P. V. (2013). Image Steganography Using DWT and Blowfish Algorithms. IOSR Journal of Computer Engineering, 8(6), 15-19.

Mr. Rahul Sharma. (2018). Monitoring of Drainage System in Urban Using Device Free Localization Neural Networks and Cloud computing. International Journal of New Practices in Management and Engineering, 7(04), 08 - 14. https://doi.org/10.17762/ijnpme.v7i04.69

Setyaningsih, E., & Wardoyo, R. (2017). Review of image compression and encryption techniques. International journal of advanced computer science and applications, 8(2).

Dhir, A. (2000). Data Encryption using DES/Triple-DES Functionality in Spartan-II FPGAs. White Paper: Spartan-II FPGAs, WP115 (v1. 0) March, 9.

Prasad, K. L., Anusha, P., Jyothi, G., & Dileepkumar, K. (2016). Design and Analysis of Secure and Efficient Image with Embedded Sensitive Information Transferring Technique using Blowfish Algorithm. i-Manager's Journal on Information Technology, 5(3), 1.

ALRikabi, H. T., & Hazim, H. T. (2021). Enhanced data security of communication system using combined encryption and steganography. International Journal of Interactive Mobile Technologies, 15(16), 145.

Mahmood, M. A., & Tabassum, T. (2021, December). A Hybrid Cryptographic Data Security System Utilizing Fuzzy Vault Key. In 2021 IEEE International Conference on Robotics, Automation, Artificial-Intelligence and Internet-of-Things (RAAICON) (pp. 89-93). IEEE.

Kamau, J., Goldberg, R., Oliveira, A., Seo-joon, C., & Nakamura, E. Improving Recommendation Systems with Collaborative Filtering Algorithms. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/134

Asaju, B., Popoola, D. D., & Gbolagade, K. A. (2022). Enhancing Image Security Using Data Encryption Standard, Discrete Wavelet Tranfrom Watermarking, Residue Number System and Gaussian Filtering.

A. Pandey, and P. Bonde, "Performance evaluation of various cryptography algorithms along with LSB substitution technique", International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 6, 2013, pp. 866-871.

S. Nagpal, and R. Nagpal, "Collaboration of cryptography and steganography for enhanced security: a review", International Journal of Innovative Knowledge Concepts, vol. 6, no. 8, 2018, pp. 124-128.

The USC-SIPI Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 6 July 2019).