A Hybrid Security Algorithm AES and Blowfish for Authentication in Mobile Applications

Aji Purwinarko(1), Wahyu Hardyanto(2),


(1) Universitas Negeri Semarang
(2) 

Abstract

Nowadays, everything is within our grasp and with the mobile phones become easier. Its use is not limited to calls and SMS but has become a tool that can be used to serve business transactions, banking, academic of data through mobile applications. Tus, the security of authentication in the mobile application needs to be improved to avoid a hacker attack. This article presents an authentication in the mobile application to the server using a hybrid of cryptographic algorithm Advanced Encryption Standard (AES) and Blowfish. AES and Blowfish is a symmetric key algorithm is very fast and powerful. With the utilization of a large block size of AES and Blowfish to encrypt keys, AES security will be much more robust and complicated to attacked. So, it will be difficult for hackers to perform Man in the Middle (MitM) attacks.

Keywords

AES, Blowfish, Man in the Middle attacks.

Full Text:

PDF

References

Aleisa, N. (2015). A Comparison of the 3DES and AES Encryption Standards. International Journal of Security and Its Applications, 9(7), 241-246.

Bansal, V. P., & Singh, S. (2015, December). A hybrid data encryption technique using rsa and blowfish for cloud computing on fpgas. In Recent Advances in Engineering & Computational Sciences (RAECS), 2015 2nd International Conference on (pp. 1-5). IEEE.

Verma, A., Guha, P., & Mishra, S. (2016). Comparative Study of Different Cryptographic Algorithms. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 5(2), 58-63.

Yadav, R. K. (2013). Cryptography on Android Message Applications-A Review. International Journal on Computer Science and Engineering, 5(5), 362.

Uskov, A., Byerly, A., & Heinemann, C. (2016). Advanced Encryption Standard Analysis with Multimedia Data on Intel® AES-NI Architecture. IJCSA, 13(2), 89-105.

Bhanot, R., & Hans, R. (2015). A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications, 9(4), 289-306.

Cai, X., Sun, R., & Liu, J. (2013, September). An ultrahigh speed AES processor method based on FPGA. In Intelligent Networking and Collaborative Systems (INCoS), 2013 5th International Conference on (pp. 633-636). IEEE.

Cui, J., Chen, L., Zhang, Y., Xie, Z., & Zhong, H. (2014). A Secret Sharing Scheme Based on AES. International Journal of Security and Its Applications, 8(6), 295-302.

Mandal, P. C. (2012). Superiority of Blowfish algorithm. International Journal of Advanced Research in Computer Science and Software Engineering, 2(9), 196-201.

Patel, P., Patel, R., & Patel, N. (2016). Integrated ECC and Blowfish for smartphone security. Procedia Computer Science, 78, 210-216.

Nie, T., & Zhang, T. (2009, January). A study of DES and Blowfish encryption algorithm. In Tencon 2009-2009 IEEE Region 10 Conference (pp. 1-4). IEEE.

Refbacks

  • There are currently no refbacks.




Scientific Journal of Informatics (SJI)
p-ISSN 2407-7658 | e-ISSN 2460-0040
Published By Department of Computer Science Universitas Negeri Semarang
Website: https://journal.unnes.ac.id/nju/index.php/sji
Email: [email protected]

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.