Cryptography Using Blowfish Algorithm
Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide vari...
Uložené v:
| Vydané v: | 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) s. 1375 - 1377 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
IEEE
17.12.2021
|
| Predmet: | |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Shrnutí: | Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide variety of algorithms that are used for data encryption, this review paper explains the Blow-fish algorithm for data encryption which is a symmetric encryption algorithm and uses the matching key for encryption and decryption. The data is converted into encrypted data (ciphertext) and can be accessible to only those who have the same key to decrypt the data. Therefore, the analysis will be done for an application that implements the blow-fish algorithm for data encryption. |
|---|---|
| DOI: | 10.1109/ICAC3N53548.2021.9725661 |