Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
by
Misra, Sanjay
, Adeniyi, Abidemi Emmanuel
, Bokolo, Anthony
, Daniel, Eniola
in
Algorithms
/ Avalanches
/ blowfish algorithm
/ Complexity
/ cryptographic algorithms
/ Cryptography
/ Data encryption
/ Data exchange
/ Data integrity
/ Encryption
/ modified blowfish algorithm
/ Security
/ Software
/ time complexity
/ Video data
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
by
Misra, Sanjay
, Adeniyi, Abidemi Emmanuel
, Bokolo, Anthony
, Daniel, Eniola
in
Algorithms
/ Avalanches
/ blowfish algorithm
/ Complexity
/ cryptographic algorithms
/ Cryptography
/ Data encryption
/ Data exchange
/ Data integrity
/ Encryption
/ modified blowfish algorithm
/ Security
/ Software
/ time complexity
/ Video data
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
by
Misra, Sanjay
, Adeniyi, Abidemi Emmanuel
, Bokolo, Anthony
, Daniel, Eniola
in
Algorithms
/ Avalanches
/ blowfish algorithm
/ Complexity
/ cryptographic algorithms
/ Cryptography
/ Data encryption
/ Data exchange
/ Data integrity
/ Encryption
/ modified blowfish algorithm
/ Security
/ Software
/ time complexity
/ Video data
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
Journal Article
Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data
2022
Request Book From Autostore
and Choose the Collection Method
Overview
Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer technologies. However, in a world where third parties are capable of collecting, stealing, and destroying information without authorization, cryptography remains the primary tool that assists users in keeping their information secure using various techniques. Blowfish is an encryption process that is modest, protected, and proficient, with the size of the message and the key size affecting its performance. Aim: the goal of this study is to design a modified Blowfish algorithm by changing the structure of the F function to encrypt and decrypt video data. After which, the performance of the normal and modified Blowfish algorithm will be obtained in terms of time complexity and the avalanche effect. Methods: To compare the encryption time and security, the modified Blowfish algorithm will use only two S-boxes in the F function instead of the four used in Blowfish. Encryption and decryption times were calculated to compare Blowfish to the modified Blowfish algorithm, with the findings indicating that the modified Blowfish algorithm performs better. Results: The Avalanche Effect results reveal that normal Blowfish has a higher security level for all categories of video file size than the modified Blowfish algorithm, with 50.7176% for normal Blowfish and 43.3398% for the modified Blowfish algorithm of 187 kb; hence, it is preferable to secure data and programs that demand a high level of security with Blowfish. Conclusions: From the experimental results, the modified Blowfish algorithm performs faster than normal Blowfish in terms of time complexity with an average execution time of 250.0 ms for normal Blowfish and 248.4 ms for the modified Blowfish algorithm. Therefore, it can be concluded that the modified Blowfish algorithm using the F-structure is time-efficient while normal Blowfish is better in terms of security.
Publisher
MDPI AG
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.