Cryptography Using Blowfish Algorithm

Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide vari...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) s. 1375 - 1377
Hlavní autoři: Sharma, Sugandha, Patel, Krishna Nand, Siddhath Jha, Aashish
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 17.12.2021
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide variety of algorithms that are used for data encryption, this review paper explains the Blow-fish algorithm for data encryption which is a symmetric encryption algorithm and uses the matching key for encryption and decryption. The data is converted into encrypted data (ciphertext) and can be accessible to only those who have the same key to decrypt the data. Therefore, the analysis will be done for an application that implements the blow-fish algorithm for data encryption.
DOI:10.1109/ICAC3N53548.2021.9725661