Short Paper: Enhancing Wi-Fi Security Using a
Hybrid Algorithm of Blowfish and RC6
Nusrat Jahan Oishi, Md.Arafin Mahamud,Asaduzzaman
Computer Science & Engineering
Chittagong University of Engineering & Technology
Chittagong, Bangladesh
cse_oishi@yahoo.com, arefin.cuet@gmail.com, asadcuet@gmail.com
Abstract— Nowadays, Wi-Fi is a very popular Technology.
Faster data transfer and Security both are very important for
Wi-Fi. At present, Advanced Encryption Standard (AES) is used
for Wi-Fi that is more secured than other encryption algorithms
but it is not so fast because of it’s complex functions. On the
other hand, Blowfish is a very faster encryption algorithm but it
cannot apply on Wi-Fi because of it’s security problems. In this
paper, a hybrid algorithm of Blowfish and Rivest Cipher 6 (RC6)
is proposed that solves the security problems of Blowfish and also
maintains the fastness of Blowfish and makes it able to use it in
place of AES. It uses two innovative criteria. One is ingenious
confusion process using two random numbers “a” and “w” that
removes reflectively weak key attack and Known plaintext attack
of Blowfish. The other is usage of one S-Box by overlapping
process that eliminates the collision key attack of Blowfish. Sub
key generation process of this algorithm also removes the Brute
Force attack of AES. This paper tries to give an efficient
algorithm that enhances the performance of Blowfish algorithm
by adding a function of RC6 with it. The adding process is
trickily handed here that makes the proposed algorithm as fast as
Blowfish and also secured like existing AES. The proposed
algorithm takes less encryption –decryption time like Blowfish
and also secured like AES. Throughput, Average time for
different data lengths and attack removal process are used to
measure the efficiency of this proposed algorithm.
Keywords—Blowfish;RC6;Collision key attack;Known plaintext
attack;reflectively weak key attack (key words)
I. INTRODUCTION
Wi-Fi is a very popular technology but security is a matter
of great concern for the field of Wi-Fi. Among many security
processes, Cryptography is very popular network security
process where the message of any formats is converted into a
encrypted version that is unreadable by a human or computer.
There are two types of cryptography Algorithms are found:
one is Symmetric key cryptography where same key is used
for both encryption and decryption(e.g.
AES,Blowfish,RC6)and the another is Asymmetric key
cryptography where different keys are used for encryption and
decryption(e.g. RSA).
At present, AES [2] Symmetric key encryption algorithm is
used for Wi-Fi network security but it is not so fast. On the
other hand Blowfish algorithm is so fast but it has some
security problems. In this paper, a 128 bit hybrid algorithm of
Blowfish and RC6 is proposed that removes the security
problems of Blowfish and also take less Encryption decryption
time than AES.
A. Blowfish
In [1], Blowfish is 64 bit symmetric key algorithm which
contains eighteen 32 bit sub keys and four 32bit S-boxes with
256 entries each. The main function of it is given below:
The Encryption process of Blowfish is , The input is a 64-bit
data element, x. Divide x into two 32-bit halves: xL, xR.
Then, for i= 1 to 16.
XL = XL XOR Pi
XR = F(XL) XOR XR
Swap XL and XR
After the sixteenth round, swap XL and XR again to undo the
last swap. Then, XR = XR XOR P17 and XL = XL XOR P18.
Finally, recombine XL and XR to get the cipher text.
The F function is: F(XL) = ((S1,A + S2,B mod 2^32) XOR
S3,C) + S4,D mod 2^32. Here 64 bit is divided among
A,B,C,D registers where each of the register contains 8 bit.
B. RC6
In [3], RC6 is a 128 bit symmetric key encryption
algorithm. The procedure is given below:
• Input: Plaintext is stored in four w-bit input registers
A,B,C,D .Number r of rounds. w-bit round keys
S[0,…….,2r+3].
• Output: cipher text is stored in A,B,C,D.
• Procedure: B=B+S[0]
D=D+S[1]
For i=1 to r do
{
t=(B+(2B+1)) <<< lgw
u=(D+(2D+1))<<< lgw
A=((A XOR t) <<< u)+S[2i]
C=((C XOR u) <<< t)+S[2i+1]
(A,B,C,D) = (B,C,D,A)
}
A = A+S[2r+2]
C = C+S[2r+3]
978-1-5090-0203-0/16/$31.00 ©2016 IEEE