Blowfish
251 Followers
Recent papers in Blowfish
Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more
In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more
— Computer information has taken over many aspects of everyday life. One of those aspects has been smart grids which have evolved into a more complex system. However, with the advantages that smart grids come with, disadvantages... more
In recent days, voice recognition system is used in various impending segments like banking, communication, industrial and government sectors. Most applications are used in real time which are vulnerable to various security threats. It... more
In recent days, voice recognition system is used in various impending segments like banking, communication, industrial and government sectors. Most applications are used in real time which are vulnerable to various security threats. It... more
This paper aims to analyse the dysfunctional family relations explored in Kazuo Ishiguro's "A Family Supper". The symbolism and lines spoken by the characters are going to be analyzed in correlation with the elements of Japanese... more
Security is the most challenging aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are... more
This thesis paper tries to present a fair compare between the most common and used algorithms in the data encryption field. The two main features that identify and differentiate one encryption algorithm from another are its power to... more
Cloud computing has grown very quickly to become a promising business idea in the IT industry due to its characteristics such as cost reduction, flexibility, convenience, and scalability. The wide spread of Cloud Computing was accompanied... more
In today’s era, secure transmission of confidential data is of biggest concern. The encryption plays an important role in transmission of secure data. The encryption means converting the original data to cipher text. The main issue is... more
To create secure information transmission over the network cryptography is used. The algorithm particular for cryptography should complete the integrity protection condition, conventional information authentication and digital signatures.... more
This paper presents the statistical test of randomness on the Blowfish Block Cipher 128-bit is continuation with our eaelier papers title" Randomness Analysis on Blowfish Block Cipher using ECB mode" and "Randomness Analysis on Blowfish... more
Steganography is the branch of the cryptography in which the data has to be transmitted securely to the receiver end. In the process of steganography different types of steganography approaches has been used so that these can transmit... more
The different computer networks whether wired or wireless are becoming more popular with its high security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks. One of these technique is a... more
Security is the most crucial aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet is increasing. Hence the... more
Tingginya kebutuhan informasi saat ini mendorong tumbuhnya metode pengamanan informasi. Seni penyandian dan pengamanan pesan yang disebut kriptografi ini berkembang sangat cepat saat ini. Penggunaan komputer dijital saat ini mendorong... more
Nowadays multimedia system knowledge protection is changing into important. The coding technique is employed to safeguard multimedia system knowledge. There are completely different techniques wont to defend confidential image knowledge... more
The security of Cloud computing has been a quickly developing administration which has numerous highlighted services over internet which reduces the cost and operating expenses. The greatest favorable position of cloud administrations is... more
Abstract:- Security is the most challenging aspects in the internet and network applications. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form. The... more
Security is the most crucial aspects in the internet and network applications. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet is increasing. Hence the... more
The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding... more
Smartphone has become the most typical and popular mobile device in recent years. It combines the functionality of mobile phone and PDA. Besides, it provides many computers' functionality, Middleware as processing, communication, data... more
Ciphering algorithms play a main role in information security systems. Those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This research tries to demonstrate a fair comparison... more