Cryptography Using Blowfish Algorithm

Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide vari...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) s. 1375 - 1377
Hlavní autori: Sharma, Sugandha, Patel, Krishna Nand, Siddhath Jha, Aashish
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 17.12.2021
Predmet:
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:Security of data whether it is personal, professional or organizational from various attackers in today's world has become a very tough task. One of the easiest ways to protect the data is to use the technique of cryptography to convert the data into some non-readable form. There is a wide variety of algorithms that are used for data encryption, this review paper explains the Blow-fish algorithm for data encryption which is a symmetric encryption algorithm and uses the matching key for encryption and decryption. The data is converted into encrypted data (ciphertext) and can be accessible to only those who have the same key to decrypt the data. Therefore, the analysis will be done for an application that implements the blow-fish algorithm for data encryption.
DOI:10.1109/ICAC3N53548.2021.9725661