Randomness Analysis of 128 bits Blowfish Block Cipher on ECB and CBC Modes
نویسنده
چکیده
Randomness of output is a significant factor in measuring the security of any cryptographic algorithm. A non-random block cipher is vulnerable to any type of attack. This paper presents the National Institute of Standard and Technology (NIST) statistical tests of the 128-bit BA to investigate its randomness. The structure of this algorithm resembles that of the 64-bit Blowfish algorithm, except for the block size is 128 bits in the extended version. Moreover, all operations in the 64-bit Blowfish are based on 64 bits instead of 32 bits. The 128-bit BA is a symmetric block cipher with variable key lengths from 64 bits up to a maximum of 896 bits, which enhances the security of the algorithm. The 128-bit BA with the electronic codebook (ECB) and cipher block chaining (CBC) modes is employed for these tests. In addition, comparisons are conducted. The analysis shows that the 128-bit BA with ECB mode is inappropriate for text and image files that contain large strings of identical bytes. This inconsistency in the results of the text and image files is attributed to the fact that the majority of the 188 NIST statistical tests failed in all rounds. Keywords— Block Cipher, Blowfish 128 bits , ECB mode, CBC mode, Randomness Test.
منابع مشابه
A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems
Evidence of signatures associated with cryptographic modes of operation is established. Motivated by some analogies between cryptographic and dynamical systems, in particular with chaos theory, we propose an algorithm based on Lyapunov exponents of discrete dynamical systems to estimate the divergence among ciphertexts as the encryption algorithm is applied iteratively. The results allow to dis...
متن کاملPerformance Analysis of RC5, Blowfish and DES Block Cipher Algorithms
In this paper, Performance analysis of RC5, Blowfish and DES block cipher algorithms have been done on the basis of execution time and resource utilization. CPU utilization and memory utilization both are considered for determining resource utilization. These three algorithms are parameterized algorithm and encrypt two w-bits at a time. Allowable choices for w are 16 bits, 32 bits, and 64 bits....
متن کاملTweakable Enciphering Modes for Sector-Level Encryption
We describe block-cipher modes of operation that turn an n-bit block cipher into a tweakable enciphering scheme that acts on sectors of mn bits, where m ≥ 2. When the underlying block cipher is secure in the sense of a strong pseudorandom permutation (PRP) our schemes are secure in the sense of variableinput-length, tweakable, strong PRP. Such an object can be used to encipher the sectors of a ...
متن کاملImplementation of Multi Mode AES Algorithm Using Verilog
Increasing need of high security in communication led to the development of several cryptographic algorithms hence sending data securely over a transmission link is critically important in many applications. NIST in the beginning selected Rijndael within October 2000 and formal adoption as being the AES standard started in December 2001. FIPS PUB 197 explains a 128-bit block cipher making Ause ...
متن کاملPerformance Evaluation of RC6, Blowfish, DES, IDEA, CAST-128 Block Ciphers
Rapid growth of internet applications fueled the need for securing information and computers. Encryption algorithms play vital role to secure information. This paper provides comparison of most common encryption algorithms namely: DES, Blowfish, CAST-128, RC6, IDEA. Performance evaluation is carried out on the basis of execution time and throughput. These algorithms has different key and block ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013