{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T21:02:45Z","timestamp":1694120565568},"reference-count":26,"publisher":"Wiley","issue":"5","license":[{"start":{"date-parts":[[2023,4,23]],"date-time":"2023-04-23T00:00:00Z","timestamp":1682208000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2023,9]]},"abstract":"Abstract<\/jats:title>The field of information security has many uses in the modern day and beyond. Encryption is a method used to secure information from unauthorized access. Since symmetric key algorithms can decrypt data much more quickly than asymmetric key algorithms, the former are more popular. Blowfish is an unpatented, freely useable, compact, quick, and efficient symmetric key encryption technique. Additionally, this method has a high level of security. The size of its blocks (64\u2009bits) is limiting its use, though. The paper aims to propose a modified version of the Blowfish algorithm that performs high\u2010speed encryption with high throughput and supports 128\u2010bit block size, enhancing its applicability in various areas. The algorithm can be an alternative to the AES algorithm with limited power consumption. The proposed algorithm is compared with the original Blowfish algorithm based on execution speed, throughput, and the avalanche effect. The algorithm's performance is also evaluated on images based on diffusion properties, image histogram, entropy, and correlation coefficient.<\/jats:p>","DOI":"10.1002\/spy2.307","type":"journal-article","created":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T05:39:06Z","timestamp":1682314746000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance evaluation and design of B\u2010128 modified Blowfish algorithm"],"prefix":"10.1002","volume":"6","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1953-6273","authenticated-orcid":false,"given":"Sunil","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Technology Jamshedpur India"},{"name":"Department of Computer and Communication Engineering Manipal University Jaipur Jaipur India"}]},{"given":"Dilip","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering National Institute of Technology Jamshedpur India"}]}],"member":"311","published-online":{"date-parts":[[2023,4,23]]},"reference":[{"key":"e_1_2_7_2_1","first-page":"191","volume-title":"International Workshop on Fast Software Encryption","author":"Schneier B","year":"1993"},{"key":"e_1_2_7_3_1","first-page":"537","article-title":"TPA auditing to enhance the privacy and security in cloud systems","author":"Kumar S","year":"2021","journal-title":"J Cyber Secur Mobility"},{"key":"e_1_2_7_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.09.004"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.023"},{"key":"e_1_2_7_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.09.017"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.02.108"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPCT.2013.6528957"},{"issue":"12","key":"e_1_2_7_9_1","first-page":"19596","article-title":"Performance study of key developer data encryption and decryption algorithm (KDDEDA) with AES, DES, and BLOWFISH","volume":"5","author":"Usha A","year":"2016","journal-title":"Int J Eng Comput Sci"},{"key":"e_1_2_7_10_1","first-page":"578","volume-title":"8th International Workshop on Computer Science and Engineering","author":"Reyes AR","year":"2018"},{"key":"e_1_2_7_11_1","unstructured":"KothandanA.Modified Blowfish Algorithm to Enhance its Performance and Security. National College of Ireland;2020Doctoral dissertation."},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1818\/1\/012085"},{"issue":"8","key":"e_1_2_7_13_1","first-page":"67","article-title":"Evaluation of performance of the symmetric key algorithms: DES, 3DES, AES and Blowfish","volume":"3","author":"Mandal PC","year":"2012","journal-title":"J Global Res Comput Sci"},{"issue":"12","key":"e_1_2_7_14_1","first-page":"30","article-title":"The twofish encryption algorithm","volume":"23","author":"Schneier B","year":"1998","journal-title":"Dr Dobb's J: Softw Tools Prof Program"},{"issue":"3","key":"e_1_2_7_15_1","first-page":"1027","article-title":"Modified blowfish algorithm Indones","volume":"11","author":"Quilala TFG","year":"2018","journal-title":"J Electr Eng Comput Sci"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSysS.2016.7400706"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICoIA.2013.6650222"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2016.08.104"},{"issue":"7","key":"e_1_2_7_19_1","first-page":"5009","article-title":"Optimized blowfish encryption technique. International journal of innovative research in computer and communication","volume":"2","author":"Christina L","year":"2014","journal-title":"Engineering"},{"issue":"20","key":"e_1_2_7_20_1","first-page":"9236","article-title":"Performance enhancement of blowfish encryption using rk blowfish","volume":"12","author":"Shamina Ross B","year":"2017","journal-title":"Int J Appl Eng Res"},{"issue":"2","key":"e_1_2_7_21_1","first-page":"31","article-title":"Npcr and uaci randomness tests for image encryption","volume":"1","author":"Wu Y","year":"2011","journal-title":"Cyber J"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/02564602.2017.1393352"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.06.008"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08072-4"},{"key":"e_1_2_7_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.02.016"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.12.023"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T05:51:35Z","timestamp":1693979495000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,23]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10.1002\/spy2.307"],"URL":"https:\/\/doi.org\/10.1002\/spy2.307","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"value":"2475-6725","type":"print"},{"value":"2475-6725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,23]]},"assertion":[{"value":"2022-05-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}