Essays about: "Blowfish"

Found 5 essays containing the word Blowfish.

  1. 1. A Comparison Between Implementations of Cryptographic Algorithms and Their Efficiency in Smartphone Computing Environments : Exploring the Performance Trade-offs of Performing Cryptographic Work in Different Smartphone Development Frameworks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ossian Dillner; [2023]
    Keywords : Cryptography; Security; Privacy; Smartphones; Kryptografi; Säkerhet; Integritet; Smartphones;

    Abstract : In the recent decade concern for privacy has massively increased in the public consciousness. As a result of this development, demand for end-to-end secure communications in all manner of applications has also seen a rapid increase. This development can however often be at odds with other consumer demands. READ MORE

  2. 2. Security in Cloud Storage : A Suitable Security Algorithm for Data Protection

    University essay from Mittuniversitetet/Avdelningen för informationssystem och -teknologi

    Author : Adeshola Oyesanya Oduyiga; [2018]
    Keywords : Security-in-cloud-storage; DES; 3DES; Blowfish; RC5; AES; Attacks-on-cloud-facilities; Data-Encryption-Standard; Data-protection.;

    Abstract : The purpose of this thesis work was to conduct a general research on existing security techniques and come up with a considerable algorithm for data security in cloud storage. Cloud storage is an infrastructure or is a model of computer data storage in which the digital data is stored in logical pools. READ MORE

  3. 3. Data Encryption on a Network

    University essay from Institutionen för datavetenskap, fysik och matematik, DFM

    Author : Jorge Luque González; Ignacio Arenchaga Fernandez; [2010]
    Keywords : encryption; decryption; DES; Triple-DES; security; serpent; blowfish; Diffie-Hellman; RSA; AES; private key; public key; security; attack; brute force; man-in-the-middle.; encriptacion; decriptacion; DES; Triple-DES; seguridad; serpent; blowfish; Diffie-Hellman; RSA; AES; clave privada; clave pública; ataque; fuerza bruta; man-in-the-middle;

    Abstract : In this project you can find a study about different encryption algorithms, which are use to safeguard the information on messages over the network. We have developed a client-server application which will send information through the network which has to be secured. READ MORE

  4. 4. Achieving Security in Messaging and Personal Content in Symbian Phones

    University essay from Blekinge Tekniska Högskola/Avdelningen för för interaktion och systemdesign

    Author : Ahmed Enany; [2007]
    Keywords : Security; Symbian; J2ME; authentication; confidentiality; non-repudiation; integrity; IBE; IBS; IBC; SMS; MMS;

    Abstract : This thesis describes two proposed schemes that could be used to secure mobile messaging (SMS/MMS) as well as one scheme that could be used to secure mobile content. The security services we considered in securing the mobile messages are confidentiality, authentication, non-repudiation and integrity. READ MORE

  5. 5. Security versus Power Consumption in Wireless Sensor Networks

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Christine Fötschl; Stefan Rainer; [2006]
    Keywords : Wireless Sensor Networks; Security Algorithm Benchmarking; Security;

    Abstract : X3 C is a Swedish company which develops a world wide good tracking system by using ARFID tags placed on every item which has to be delivered and base stations as gateway in a wireless sensor network. The requirement of a long lifespan of their ARFID tags made it difficult to implement security. READ MORE