A Novel Approach for Enhancement of Blowfish Algorithm by using DES, DCT Methods for Providing, Strong Encryption and Decryption Capabilities
نویسندگان
چکیده
Data safety has evolved into a critical requirement and duty in modern life. Most of our systems are designed such way that it can get hacked, putting private information at danger. As result, for numerous motives, we utilize various approaches to save as much possible on this data, regardless its varied formats, words, photographs, videos, so on. The data storage capacity mobile devices is restricted owing insufficient processing. In order develop safe MCC environment, security concerns must be studied analysed. This study compares the most widely used symmetric key encryption algorithms, including DES (Data Encryption Standard), Blowfish, TDES (Triple PRESENT, KLEIN. assessment algorithms based attacks, size, block with best outcomes their field.
منابع مشابه
Image Encryption and Decryption Using Blowfish Algorithm in Matlab
With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia application, security becomes an important issue of communication and storage of images. This paper is about encryption and decryption of images using a secret-key block cipher called 64-bits Blowfish designed to increase security and to improve performan...
متن کاملPerformance Enhancement of Blowfish Encryption Using RK-Blowfish Technique
Security is one of the biggest concerns in communications and electronic applications. In this paper, we have modified the Blowfish algorithm by enhancing its performance in terms of speed, Throughput, Power consumption and Avalanche effect. We have proposed a way to enhance the performance of the Blowfish cryptography algorithm by introducing parallel processing technique and making modificati...
متن کاملDual Image Encryption and Decryption Using Cellular Automata and Blowfish Algorithm
-This research article focuses on image processing and encryption techniques. Image encryption is very vast field and currently over World Wide Web and security is main issue. It presents the technique of image encryption by using cellular automata. The image is splitted in number of pixels, block of pixels are created to be encrypted using blowfish algorithm, and these encrypted blocks are con...
متن کاملdevelopment of different optical methods for determination of glucose using cadmium telluride quantum dots and silver nanoparticles
a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...
the use of appropriate madm model for ranking the vendors of mci equipments using fuzzy approach
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Recent and Innovation Trends in Computing and Communication
سال: 2023
ISSN: ['2321-8169']
DOI: https://doi.org/10.17762/ijritcc.v11i7s.7008