Cryptography Using Blowfish Algorithm
Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide vari...
Uloženo v:
| Vydáno v: | 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) s. 1375 - 1377 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
17.12.2021
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide variety of algorithms that are used for data encryption, this review paper explains the Blow-fish algorithm for data encryption which is a symmetric encryption algorithm and uses the matching key for encryption and decryption. The data is converted into encrypted data (ciphertext) and can be accessible to only those who have the same key to decrypt the data. Therefore, the analysis will be done for an application that implements the blow-fish algorithm for data encryption. |
|---|---|
| DOI: | 10.1109/ICAC3N53548.2021.9725661 |