The graph above shows that the larger the Blowfish ciphertext is
generated and the smaller string produced by the LZW compression
process, it proves that the length of a string affects the large
compression ratio generated during the compression process.
The gray line is the result of compression text from the combination
process of blowfish encryption and LZW compression, and the result of
the test is that the compression result is smaller than using only LZW
algorithm or encryption only, and security also has different ciphertext
because the first ciphertext (LZW) is already in compression with LZW.
CONLUSION
The combination of Blowfish and LZW algorithms can be done well, in
terms of compression security with LZW algorithm to ciphertext generate
new form of strings with different patterns from the initial ciphertext
obtained from Blowfish encryption process causing cryptanalyst to
process the decryption takes a longer time due to having Different
patterns, then when viewed from the size and speed of data transmission
certainly faster due to smaller size and does not take a tremendous
resource, so it can be concluded that the combination of these two
algorithms can be done well.
REFERENCES
R. Rahim, ”128 Bit Hash of Variable Length in Short Message Service Security,” International Journal of Security and Its Applications, vol. 11, no. 1, pp. 45-58, 2017.
2 R. Rahim and A. Ikhwan, ”Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher,” IJSRST, vol. II, no. 6, pp. 71-78, 2016.
3 R. Rahim and A. Ikhwan, ”Study of Three-Pass Protocol on Data Security,” International Journal of Science and Research (IJSR), vol. 5, no. 11, pp. 102-104, 2016.
4 B. Maulana and R. Rahim, ”Go-Back-N ARQ Approach for Identification and Repairing Frame in Transmission Data,” International Journal of Research In Science & Engineering, vol. 2, no. 6, pp. 208-212, 2016.
5 A. P. U. Siahaan and R. Rahim, ”Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” International Journal of Security and its Applications, vol. 10, no. 8, pp. 173-180, 2016.
6 Legito and R. Rahim, ”SMS Encryption Using Word Auto Key Encryption,” International Journal of Recent Trends in Engineering & Research (IJRTER), vol. 3, no. 1, pp. 251-256, 2017.
7 I. Saputra, Mesran, N. A. Hasibuan and R. Rahim, ”Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File,” International Journal of Engineering Research & Technology (IJERT), vol. 6, no. 1, pp. 266-269, 2017.
8 E. Hariyanto and R. Rahim, ”Arnold’s Cat Map Algorithm in Digital Image Encryption,” International Journal of Science and Research (IJSR), vol. 5, no. 10, pp. 1363-1365, 2016.
9 S. D. Nasution, G. L. Ginting, M. Syahrizal and R. Rahim, ”Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” International Journal of Engineering Research & Technology (IJERT), vol. 6, no. 1, pp. 360-363, 2017.
10 Dheemanth H N, ”LZW Data Compression,” American Journal of Engineering Research (AJER), vol. 3, no. 2, pp. 22-26, 2014.
11 S. Manku and K. Vasanth, ”BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY,” ARPN Journal of Engineering and Applied Sciences, vol. 10, no. 10, pp. 4717-4719, 2015.
12 P. Patil, P. Narayanka, N. D G and Meena S M, ”A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” in International Conference on Information Security & Privacy, Nagpur, India, 2016.
13 S. A. A. Taleb, H. M. Musafa, A. M. Khtoom and I. K. Gharaybih, ”Improving LZW Image Compression,” European Journal of Scientific Research, vol. 44, no. 3, pp. 502-509, 2010.
14 Shyni K and Manoj Kumar KV, ”Lossless LZW Data Compression Algorithm on CUDA,” IOSR Journal of Computer, vol. 13, no. 1, pp. 122-127, 2013.
15 T. Cormen, C. Leiserson, R. Rivest and C. Stein, Introduction to Algorithms Third Edition, Massachusetts: MITPress, 2010.