학술논문

Symmetric Key Algorithm in Computer security: A Review
Document Type
Conference
Source
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA) Electronics, Communication and Aerospace Technology (ICECA), 2020 4th International Conference on. :765-769 Nov, 2020
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Robotics and Control Systems
Cryptography
Ciphers
Encryption
Security
Watermarking
Throughput
Software algorithms
Blowfish algorithm
symmetric key cryptography
block cipher
encryption
decryption
Language
Abstract
The primary objective of any computer security algorithm is that the untrusted third party should not be able to read or gain knowledge about the data being communicated or stored in different internet applications or storage platforms. One of the most prevalent fiestel network block cipher is Blowfish, which is capable to safeguard the protected data against attacks. Blowfish algorithm is a form of symmetric key cipher that can be defined as a drop in alternative for the existing standard block ciphers. It yields alterable length key from 32-448 bits. This paper presents a brief survey on Blowfish algorithm.