Optimization Delay of Blowfish Symmetric-Key Block Cipher using Modified Carry Select Adder

Main Article Content

Sanjeet Kumar, Dr. Shalini Sahay

Abstract

The Blowfish symmetric-key block cipher is a widely used encryption algorithm known for its simplicity, flexibility, and strong security. However, in hardware-based cryptographic systems, speed and efficiency are critical factors, especially for real-time applications. This paper presents an optimized hardware implementation of the Blowfish cipher using a Modified Carry Select Adder (MCSA) to reduce computational delay during encryption and decryption processes. The Carry Select Adder, known for its high-speed performance, is further enhanced by integrating Binary to Excess-1 Converter (BEC) logic to minimize area and power consumption while maximizing speed. The Blowfish algorithm’s key scheduling and data processing modules, which involve intensive arithmetic operations, are redesigned using MCSA architecture. The proposed design is modeled in Verilog and synthesized using Xilinx FPGA tools. Comparative analysis is performed against traditional adder implementations in terms of delay, area utilization, and power efficiency. Simulation results demonstrate a significant reduction in propagation delay and improved throughput without compromising the security strength of the cipher. This optimization makes the Blowfish cipher more suitable for applications requiring high-speed and low-power encryption, such as embedded systems, wireless networks, and IoT devices. The proposed approach contributes to the development of efficient and secure hardware-based cryptographic solutions.

Article Details

How to Cite
Sanjeet Kumar, Dr. Shalini Sahay. (2025). Optimization Delay of Blowfish Symmetric-Key Block Cipher using Modified Carry Select Adder. International Journal of Advanced Research and Multidisciplinary Trends (IJARMT), 2(2), 519–526. Retrieved from https://www.ijarmt.com/index.php/j/article/view/249
Section
Articles

References

R. K. Meyers and A. H. Desoky, "An Implementation of the Blowfish Cryptosystem," IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 346–351, 2008.

M. C.-J. Lin and Y.-L. Lin, "A VLSI Implementation of Blowfish Encryption/Decryption Algorithm," IEEE Design Automation Conference (ASP-DAC), pp. 1–2, 2000.

B. Cody and J. Madigan, "High Speed SOC Design for Blowfish Cryptographic Algorithm," IEEE International Conference on VLSI (IFIP), pp. 284–287, 2007.

H. S. Zied, A. G. Abdellatif, and A. A. Elmahallawy, "An Optimized Implementation of the Blowfish Encryption Algorithm," IEEE Access, vol. 11, pp. 1–10, 2023.

L. K. Kiran, J. E. N. Abhilash, and P. S. Kumar, "FPGA Implementation of Blowfish Cryptosystem Using VHDL," International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 1, pp. 1–5, 2013.

A. S., "An Implementation of Blowfish Algorithm Using FPGA," International Journal of Engineering Research & Technology (IJERT), vol. 2, no. 8, pp. 1–4, 2013.

S. Chatterjee and S. Majumder, "FPGA Implementation of Pipelined Blowfish Algorithm," IEEE International Symposium on Electronic System Design (ISED), pp. 208–213, 2014.

D. Darlis, "An Implementation of Data Encryption for Internet of Things Using Blowfish Algorithm on FPGA," International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5, pp. 1–6, 2017.

L. Christina and V. J. Irudayaraj, "Optimized Blowfish Encryption Technique," International Journal of Innovative Research in Computer and Communication Engineering, vol. 2, no. 7, pp. 5009–5015, 2014.

A. Mousa, "Data Encryption Performance Based on Blowfish," 47th International Symposium ELMAR, pp. 131–134, 2005.

M. Agrawal and P. Mishra, "A Modified Approach for Symmetric Key Cryptography Based on Blowfish Algorithm," International Journal of Engineering and Advanced Technology (IJEAT), vol. 1, no. 6, pp. 79–83, 2012.

A. E. Adeniyi, S. Misra, E. Daniel, and A. Bokolo Jr, "Computational Complexity of Modified Blowfish Cryptographic Algorithm on Video Data," Algorithms, vol. 15, no. 10, p. 373, 2022.

R. R. Corpuz, B. D. Gerardo, and R. P. Medina, "Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud Computing," Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, pp. 157–162, 2018.

R. O. Ogundokun, J. B. Awotunde, E. A. Adeniyi, and F. E. Ayo, "Crypto-Stego Based Model for Securing Medical Information on IoMT Platform," Multimedia Tools and Applications, vol. 80, pp. 31705–31727, 2021.

M. Tayel, A. Gamal, and H. Shawky, "A Proposed Implementation Method of an Audio Steganography Technique," 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 180–184, 2016.

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.