The graph above shows that the larger the Blowfish ciphertext is generated and the smaller string produced by the LZW compression process, it proves that the length of a string affects the large compression ratio generated during the compression process.
The gray line is the result of compression text from the combination process of blowfish encryption and LZW compression, and the result of the test is that the compression result is smaller than using only LZW algorithm or encryption only, and security also has different ciphertext because the first ciphertext (LZW) is already in compression with LZW.

CONLUSION

The combination of Blowfish and LZW algorithms can be done well, in terms of compression security with LZW algorithm to ciphertext generate new form of strings with different patterns from the initial ciphertext obtained from Blowfish encryption process causing cryptanalyst to process the decryption takes a longer time due to having Different patterns, then when viewed from the size and speed of data transmission certainly faster due to smaller size and does not take a tremendous resource, so it can be concluded that the combination of these two algorithms can be done well.

REFERENCES

R. Rahim, ”128 Bit Hash of Variable Length in Short Message Service Security,” International Journal of Security and Its Applications, vol. 11, no. 1, pp. 45-58, 2017.
2 R. Rahim and A. Ikhwan, ”Cryptography Technique with Modular Multiplication Block Cipher and Playfair Cipher,” IJSRST, vol. II, no. 6, pp. 71-78, 2016.
3 R. Rahim and A. Ikhwan, ”Study of Three-Pass Protocol on Data Security,” International Journal of Science and Research (IJSR), vol. 5, no. 11, pp. 102-104, 2016.
4 B. Maulana and R. Rahim, ”Go-Back-N ARQ Approach for Identification and Repairing Frame in Transmission Data,” International Journal of Research In Science & Engineering, vol. 2, no. 6, pp. 208-212, 2016.
5 A. P. U. Siahaan and R. Rahim, ”Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm,” International Journal of Security and its Applications, vol. 10, no. 8, pp. 173-180, 2016.
6 Legito and R. Rahim, ”SMS Encryption Using Word Auto Key Encryption,” International Journal of Recent Trends in Engineering & Research (IJRTER), vol. 3, no. 1, pp. 251-256, 2017.
7 I. Saputra, Mesran, N. A. Hasibuan and R. Rahim, ”Vigenere Cipher Algorithm with Grayscale Image Key Generator for Secure Text File,” International Journal of Engineering Research & Technology (IJERT), vol. 6, no. 1, pp. 266-269, 2017.
8 E. Hariyanto and R. Rahim, ”Arnold’s Cat Map Algorithm in Digital Image Encryption,” International Journal of Science and Research (IJSR), vol. 5, no. 10, pp. 1363-1365, 2016.
9 S. D. Nasution, G. L. Ginting, M. Syahrizal and R. Rahim, ”Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,” International Journal of Engineering Research & Technology (IJERT), vol. 6, no. 1, pp. 360-363, 2017.
10 Dheemanth H N, ”LZW Data Compression,” American Journal of Engineering Research (AJER), vol. 3, no. 2, pp. 22-26, 2014.
11 S. Manku and K. Vasanth, ”BLOWFISH ENCRYPTION ALGORITHM FOR INFORMATION SECURITY,” ARPN Journal of Engineering and Applied Sciences, vol. 10, no. 10, pp. 4717-4719, 2015.
12 P. Patil, P. Narayanka, N. D G and Meena S M, ”A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish,” in International Conference on Information Security & Privacy, Nagpur, India, 2016.
13 S. A. A. Taleb, H. M. Musafa, A. M. Khtoom and I. K. Gharaybih, ”Improving LZW Image Compression,” European Journal of Scientific Research, vol. 44, no. 3, pp. 502-509, 2010.
14 Shyni K and Manoj Kumar KV, ”Lossless LZW Data Compression Algorithm on CUDA,” IOSR Journal of Computer, vol. 13, no. 1, pp. 122-127, 2013.
15 T. Cormen, C. Leiserson, R. Rivest and C. Stein, Introduction to Algorithms Third Edition, Massachusetts: MITPress, 2010.