Symmetric key algorithm in computer security: a review

R Anusha, MJD Kumar, VS Shetty… - 2020 4th International …, 2020 - ieeexplore.ieee.org
The primary objective of any computer security algorithm is that the untrusted third party
should not be able to read or gain knowledge about the data being communicated or stored …

A Review of the Blowfish Algorithm Modifications in Terms of Execution Time and Security

RAHA Qader, AHS AL-Wattar - 2022 - techniumscience.com
Data has become increasingly popular for advanced digital content transmission.
Researchers are concerned about the protection of data. The transmission of digital data …

[PDF][PDF] Modified blowfish algorithm

TFG Quilala, AM Sison, RP Medina - Indonesian Journal of …, 2018 - researchgate.net
Cryptography guarantees security in communication through encryption. This paper
proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to …

Secret Key Generation using Genetic Algorithm for the Hybrid Blowfish Encryption and Substitution Ciphers

SRP Rao, K Jyothi - 2022 Second International Conference on …, 2022 - ieeexplore.ieee.org
Today security and privacy of user from unauthorized access, corruption, or theft is
becoming more crucial requirement due to increased use of internet and communication …

[PDF][PDF] Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

A Sayed, M Mahrous, E Elgeldawi - CMC-COMPUTERS MATERIALS …, 2023 - academia.edu
Securing digital data from unauthorized access throughout its entire lifecycle has been
always a critical concern. A robust data security system should protect the information assets …

[PDF][PDF] A text encryption algorithm based on self-synchronizing stream cipher and chaotic maps

EA Albahrani, TK Alshekly - vol, 2017 - researchgate.net
ABSTRACT A new text encryption algorithm which is based upon a combination between
Self-Synchronizing Stream Cipher and chaotic map has been proposed in this paper. The …

Aplikasi Enkripsi Kriptografi Dengan Algoritma Blowfish Dan Kompresi Huffman Dalam Security Dokumen

S Muryanah, S Syam - Syntax: Jurnal Informatika, 2021 - journal.unsika.ac.id
Pada umumnya di dalam kampus, perusahaan atau organisasi, suatu dokumen digital
disimpan di dalam komputer begitu saja tanpa adanya pengamanan sama sekali, sehingga …

[PDF][PDF] Stegocrypt3d: 3d image slicing and blowfish

AS Amin - BS Comms, IET Faculty, GUC, Cairo, Egypt, 2019 - researchgate.net
Today's information world is a digital world where Data transmission over an insecure
channel is becoming a major issue of concern. So to protect the secret data from theft …

[PDF][PDF] A new encryption scheme for performance improvement in big data environment using mapreduce

TS Algaradi, B Rama - Journal of Engineering Science and …, 2021 - jestec.taylors.edu.my
There are diverse methods and technologies adopted by authors studied to Keep up with
the rapid progress of big data technology in securing big data in the field of cryptography …

Multi-tier security for cloud environment by HECDSA with IBEM

SS Susilabai, DS Mahendran… - 2021 5th International …, 2021 - ieeexplore.ieee.org
Security has become the main issue in the current data transmission, whereas it is
considered as a significant goal for vendors and providers of cloud services. Hyper elliptic …