Explore chapters and articles related to this topic
Symmetric Algorithms II
Published in Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh, Emerging Security Algorithms and Techniques, 2019
Figure 7.6 demonstrates a general idea of the Twofish block cipher. Twofish employs a 16-round Feistel-like structure with additional whitening of the putin and putout. The solitary non-Feistel elements are the 1-bit rotates. The regular change can be moved into the F function to generate a pure Feistel arrangement, but this demands an extra turning round of the words just previous to the putin whitening pace. Input plain text block is cut into four 32-bit words. In the input whitening pace, these are XORed with four keywords. It is then put into a loop of 16 rounds.
Operational Security Agitations in Cloud Computing
Published in T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy, Privacy and Security Challenges in Cloud Computing, 2022
N. Nithiyanandam, S.P. Priyadharshini, G. Fathima, S. Jeyapriyanga
Twofish: The Twofish algorithm [7] is a successor to the Blowfish algorithm, and it uses a key of 256 bit length and follows a symmetric method of encryption process. Similar to the Blowfish algorithm, the Twofish algorithm is well known for its computation speed and is freeware similar to the Blowfish algorithm.
Cyber Defence and Countermeasures
Published in Stanislav Abaimov, Maurizio Martellini, Cyber Arms, 2020
Stanislav Abaimov, Maurizio Martellini
Selected symmetric systems are presented by the Data Encryption Standard (DES), Triple DES, Advanced Encryption Standard (AES), International Data Encryption Algorithm (IDEA), Blowfish, Twofish, RC4, Skipjack, etc.
Security in Internet of Drones: A Comprehensive Review
Published in Cogent Engineering, 2022
Snehal Samanth, Prema K V, Mamatha Balachandra
Atoev et al. have implemented OTP technique for secure communication link in the UAV network. The experimental setup consists of a UAV, a GCS, and an attacker, and the communication happens through the MAVLink protocol. The experiment uses two 3-DR 915 MHz telemetry radios for communication over the data link. The implementation of encryption and decryption of data communicated between GCS and UAV is done by using C++. Result analysis shows that the OTP encryption technique provides an accuracy of 95% which is better than that of AES-128, Twofish, and Triple Data Encryption Standard (DES) algorithms. Result analysis also shows that the execution time of OTP for a 10MB file is around 2 seconds, and in general the execution time of OTP is lesser than that of AES-128, Twofish, and Triple DES algorithms (Atoev etal., 2019).
A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing
Published in Cybernetics and Systems, 2023
Ozgu Can, Fursan Thabit, Asia Othman Aljahdali, Sharaf Al-Homdy, Hoda A. Alkhzaimi
The authors (Elgeldawi, Mahrous, and Sayed 2019) Studied the performance of the most prevalent symmetric cryptographic techniques in a cloud computing environment, including DES, 3DES, Blowfish, Twofish, RC2, RC5, RC6, and AES Comparison research was conducted based on the method structure, encryption and decryption timings, throughput, and memory usage. They also developed a hybrid encryption model to capitalize on each system’s ability to safeguard cloud data. A comparison of IDAs, SHA-512, 3DES, and AES-256 was performed by (Keer, Ali, and Sharma 2016).
Secured Model for Internet of Things (IoT) to Monitor Smart Field Data with Integrated Real-Time Cloud Using Lightweight Cryptography
Published in IETE Journal of Research, 2021
Symmetrical cryptography is designed with the encryption and decryption of message confidentiality, original text to cipher text and cipher text to original text using a secret key. Both the sender and receivers use the same key for encryption and decryption. DES, RC5, Twofish, Blowfish, IDEA and AES are the traditional symmetric encryption algorithms. Two separate modes of operations in symmetric algorithms, CBC (Cipher-Block-Chaining) Mode and ECB (Electronic-Code-Book) Mode.