Vis enkel innførsel

dc.contributor.authorAdeniyi, Abidemi Emmanuel
dc.contributor.authorMisra, Sanjay
dc.contributor.authorEniola, Daniel
dc.contributor.authorBokolo, Anthony Junior
dc.date.accessioned2022-10-20T08:53:10Z
dc.date.available2022-10-20T08:53:10Z
dc.date.created2022-10-10T19:09:05Z
dc.date.issued2022
dc.identifier.citationAlgorithms. 2022, 15 (10), Artikkel 373.en_US
dc.identifier.issn1999-4893
dc.identifier.urihttps://hdl.handle.net/11250/3027233
dc.description.abstractBackground: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques. Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance. Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data. After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect. Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish. Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better. Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.7176% for normal Blowfish and 43.3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish. Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.0 ms for normal Blowfish and 248.4 ms for the modified Blowfish algorithm. Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.en_US
dc.language.isoengen_US
dc.publisherMDPIen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.subjecttime complexityen_US
dc.subjectcryptographic algorithmsen_US
dc.subjectmodified blowfish algorithmen_US
dc.subjectblowfish algorithmen_US
dc.subjectsecurityen_US
dc.titleComputational Complexity of Modified Blowfish Cryptographic Algorithm on Video Dataen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.rights.holder© 2022 by the authors.en_US
dc.subject.nsiVDP::Teknologi: 500en_US
dc.source.volume15en_US
dc.source.journalAlgorithmsen_US
dc.source.issue10en_US
dc.identifier.doi10.3390/a15100373
dc.identifier.cristin2060211
dc.source.articlenumber373en_US
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal