Modified Blowfish Algorithm

Theda Flare Ginoy Quilala, Ariel M Sison, Ruji P Medina


Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry.  The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower with key, encryption, and decryption average of 26.99ms, 1651.83ms, and 2765.04ms compared to blowfish with 21.65ms, 1297.76ms and 2176.59ms due to block size difference. Applying 128-bit block size increases security by decreasing the chances of having duplicate blocks that may leak information. The modified Blowfish is faster compared to Twofish with an encryption and decryption average time of 2418.08ms and 4002.70ms. The added derivation improved the avalanche of the modified blowfish.  Blowfish achieved 47.14% while modified Blowfish attained 52.86%. 


Blowfish;Twofish; cryptography; encryption; security; cipher


N. Kar, A. Majumder, A. Saha, A. Jamatia, K. Chakma, and M. C. Pal, “An improved data security using DNA sequencing,” 3rd ACM MobiHoc Work. Pervasive Wirel. Heal. MobileHealth 2013, pp. 13–18, 2013.

G. Jacob and A. Murugan, “DNA based cryptography: An overview and analysis,” Int. J. Emerg. Sci., vol. 3, no. 1, pp. 36–42, 2013.

A. Kaundal and A. Verma, “DNA Based Cryptography: A Review,” Ripublication.Com, vol. 4, no. 7, pp. 693–698, 2014.

N. Srividhya and T. Vino, “Genome based highly secured image using DNA cryptography and trellis algorithm,” in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016, pp. 1658–1662.

M. Bhattacharya, K. Pal, G. Ghosh, and S. S. Mandal, “Generation of novel encrypted code using cryptography for multiple level data security for Electronic Patient Record,” Proc. - 2015 IEEE Int. Conf. Bioinforma. Biomed. BIBM 2015, pp. 916–921, 2015.

M. A. Sadikin and R. W. Wardhani, “Implementation of RSA 2048-bit and AES 256-bit with digital signature for secure electronic health record application,” in 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), 2016, pp. 387–392.

J. E. Camargo, D. F. Sierra, and Y. F. Torres, “Study of cryptographic algorithms to protect electronic medical records in mobile platforms,” Indian J. Sci. Technol., vol. 8, no. 21, pp. 1–7, 2015.

H. Abdulrahman, N. Poh, and J. Burnett, “Privacy preservation, sharing and collection of patient records using cryptographic techniques for cross-clinical secondary analytics,” IEEE SSCI 2014 - 2014 IEEE Symp. Ser. Comput. Intell. - CICARE 2014 2014 IEEE Symp. Comput. Intell. Healthc. e-Health, Proc., pp. 148–153, 2015.

S. Fong-In, S. Kiattisin, A. Leelasantitham, and W. San-Um, “A partial encryption scheme using absolute-value chaotic map for secure electronic health records,” in The 4th Joint International Conference on Information and Communication Technology, Electronic and Electrical Engineering (JICTEE), 2014, pp. 1–5.

M. Ebrahim, S. Khan, and U. Bin Khalid, “Symmetric Algorithm Survey: A Comparative Analysis,” Int. J. Comput. Appl., vol. 61, no. 20, pp. 975–8887, 2013.

B. Schneier, “Description of a new variable-length key, 64-bit block cipher (Blowfish),” in Fast Software Encryption: Cambridge Security Workshop Cambridge, U. K., December 9--11,1993 Proceedings, R. Anderson, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 1994, pp. 191–204.

V. Kumar and A. Sharma, “A Survey on Various Cryptography Techniques,” Int. J. Emerg. Trends Technol. Comput. Sci., vol. 3, no. 4, pp. 307–312, 2014.

A. Ramesh and A. Suruliandi, “Performance analysis of encryption algorithms for Information Security,” in 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT), 2013, pp. 840–844.

G. Singh, A. Kr. Singla, and K. S. Sandha, “Superiority of Blowfish Algorithm in Wireless Networks,” Int. J. Comput. Appl., vol. 44, no. 11, pp. 23–26, Apr. 2012.

P. Nema and M. A. Rizvi, “Critical Analysis of Various Symmetric Key Cryptographic Algorithms,” Int. J. Recent Innov. Trends Comput. Commun., vol. 3, no. 6, pp. 4301–4306, 2015.

J. A. Mahdi, “Design and implementation of proposed BR encryption algorithm,” IJCCCSE, vol. 9, no. 1, pp. 1–17, 2009.

National Institute of Standards and Technology, “Announcing Request for Candidate Algorithm Nominations for the Advanced Encryption Standard,” Fed. Regist., vol. 62, no. 177, pp. 48051–48058, Oct. 1997.

R. Bhanot and R. Hans, “A review and comparative analysis of various encryption algorithms,” Int. J. Secur. its Appl., vol. 9, no. 4, pp. 289–306, 2015.

N. J. Oishi, A. Mahamud, and Asaduzzaman, “Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6,” in 2016 International Conference on Networking Systems and Security (NSysS), 2016, pp. 1–5.

A. M. Alabaichi, R. Mahmood, F. Ahmad, and M. S. Mechee, “Randomness Analysis on Blowfish Block Cipher Using ECB and CBC Modes,” J. Appl. Sci., vol. 13, no. 6, pp. 768–789, Jun. 2013.

T. S. Atia, “Development of a new algorithm for key and S-box generation in blowfish algorithm,” J. Eng. Sci. Technol., vol. 9, no. 4, pp. 432–442, 2014.

S. Vaudenay, “On the weak keys of blowfish,” 1996, pp. 27–32.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, and C. Hall, “Twofish : A 128-Bit Block Cipher,” NIST AES Propos., vol. 15, no. 1, pp. 1–27, 1998.

G. Muthukumar and E. G. Dharma, “A Comparative Analysis on Symmetric Key Encryption Algorithms,” Int. J. Adv. Res. Comput. Eng. Technol., vol. 3, no. 2, pp. 379–383, 2014.

J. C. S. B and G. S. Raman, “Ensemble of Blowfish with Chaos Based SBox Design for Text and Image Encryption,” Int. J. Netw. Secur. Its Appl., vol. 3, no. 4, pp. 165–173, 2011.

A. A. Abd El-Sadek, T. A. El-Garf, and M. M. Fouad, “Speech encryption applying a modified Blowfish algorithm,” in 2014 International Conference on Engineering and Technology (ICET), 2014, pp. 1–6.

A. M. Alabaichi, “A Dynamic 3D S-Box based on Cylindrical Coordinate System for Blowfish Algorithm,” Indian J. Sci. Technol., vol. 8, no. 30, pp. 1–17, Nov. 2015.

M. Patil and R. Kolhe, “A New Algorithm for Key and Improved Feistel Rounds in Blowfish Algorithm,” in International Journal of Computer Applications (0975-8887) National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015), 2015, no. Nckite, pp. 5–8.

J. Raj and S. Ross, “Enhancement of Blowfish Encryption in Terms of Security Using Mixed Strategy Technique,” IIOAB J., vol. 7, no. 9, pp. 69–76, 2016.

V. Poonia and N. S. Yadav, “Analysis of modified Blowfish algorithm in different cases with various parameters,” in 2015 International Conference on Advanced Computing and Communication Systems, 2015, pp. 1–5.

S. Manku and K. Vasanth, “Blowfish encryption algorithm for information security,” ARPN J. Eng. Appl. Sci., vol. 10, no. 10, pp. 4717–4719, 2015.

P. Patel, R. Patel, and N. Patel, “Integrated ECC and Blowfish for Smartphone Security,” Procedia Comput. Sci., vol. 78, no. December 2015, pp. 210–216, 2016.

R. Patel and P. Kamboj, “Security Enhancement of Blowfish Block Cipher,” 2016, pp. 231–238.

L. Christina and J. I. V S, “Optimized Blowfish Encryption Technique,” Int. J. Innov. Res. Comput. Commun. Eng. (An ISO 3297 2007 Certif. Organ., vol. 2, no. 7, pp. 5009–5015, 2014.

B. S. Ross and V. Josephraj, “Performance Enhancement of Blowfish Encryption Using RK-Blowfish Technique,” Int. J. Appl. Eng. Res., vol. 12, no. 20, pp. 9236–9244, 2017.

Bernhard Esslinger, “Cryptool Portal - Cryptography for everybody,” 1998. [Online]. Available:

Total views : 19 times


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

shopify stats IJEECS visitor statistics