Theda Flare Ginoy Quilala
Tarlac State University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Modified Blowfish algorithm analysis using derivation cases Theda Flare Ginoy Quilala; Rogel L. Quilala
Bulletin of Electrical Engineering and Informatics Vol 10, No 4: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v10i4.2292

Abstract

This study analyzed and enhanced the modified Blowfish algorithm (MBA) encryption. The modification retained the original structure, process and the use of two S-boxes in the MBA but presented two derivation processes in the f-function which was originally placed to prevent symmetry. The derivation case’s performance was analyzed using avalanche effect and time efficiency. After comparing the first and second derivation process presented in the MBA, the second derivation further improved the avalanche effect by 5.47%, thus improving security. The performance also showed that the second modification is faster by 39.48% in encryption time, and 38.34% faster in decryption time. The first derivation case in the modified Blowfish was slower in time because of the difference in the placement of the shift rotation. The key generation time was found to be independent of the input size while the encryption and decryption time was found to be directly proportional to file size. With this, the second modification is considered to be better.
Document verification using quick response code with modified secure hash algorithm-1 and modified blowfish algorithm Rogel Ladia Quilala; Theda Flare Ginoy Quilala
Indonesian Journal of Electrical Engineering and Computer Science Vol 28, No 1: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v28.i1.pp470-479

Abstract

A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to document integrity verification of printed documents using quick response (QR) codes. However, encryption is warranted as data is transmitted in plaintext directly to the server to prevent hacking and ensuring not only data integrity but data security as well. A more secured document integrity verification using QR code was designed and developed by successfully incorporating a better hashing algorithm– modified SHA-1 and integrating a modern encryption algorithm–modified blowfish algorithm. By integrating both, data integrity and data confidentiality is assured as compared to previous research. The developed software was checked against user requirements to check the acceptability of the software. Error rate and accuracy were also checked to see how the software performed. Based on the testing conducted, it has been found that the document integrity verification software using QR code with the integration of modified SHA-1 hash and Modified Blowfish encryption was acceptable, accurate, and more secure.