Security analysis of blowfish algorithm
A Alabaichi, F Ahmad… - 2013 Second International …, 2013 - ieeexplore.ieee.org
Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …
lengths from 32 bits up to a maximum of 448 bits. In order to measure the degree of security …
Chaos based cryptography for voice encryption in wireless communication
SB Sadkhan, A Al-Sherbaz… - … , Computer, Power, and …, 2013 - ieeexplore.ieee.org
The vast growths in mobile and wireless applications would contain lacks of using suitable
security concepts during the development process which worries the information security …
security concepts during the development process which worries the information security …
[PDF][PDF] Proposed A permutation and substitution methods of serpent block cipher
IA Yousif - Ibn AL-Haitham Journal For Pure and Applied Science, 2019 - iasj.net
Block cipher technique is one of cryptography techniques to encrypt data block by block. The
Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar …
Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar …
Chaos-based cryptography for voice secure wireless communication
SBS Al Maliky, R Saad - Multidisciplinary perspectives in cryptology …, 2014 - igi-global.com
Chaos theory was originally developed by mathematicians and physicists. The theory deals
with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such …
with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such …