Ginni has Published 1580 Articles

What is IDEA in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 10:49:56

1K+ Views

IDEA stands for International Data Encryption Algorithm. IDEA is a block cipher invented by James Massey and Xuejia Lai and was first defined in 1991. It uses 128 bit key length which works on 64 bit blocks.It includes a series of eight identical transformations depend upon bitwise exclusiveor, addition and ... Read More

What is Data Encryption and Decryption in Blowfish Algorithm?

Ginni

Ginni

Updated on 15-Mar-2022 10:39:13

1K+ Views

Blowfish is a symmetric block cipher algorithm invented by Brute Schneier in December 1993. The Blowfish algorithm has several advantages. It is applicable and efficient for hardware implementation and no license is needed. The elementary operators of Blowfish algorithm contains table lookup, addition and XOR. The table contains four S-boxes ... Read More

How are subkeys generated in Blowfish algorithm?

Ginni

Ginni

Updated on 15-Mar-2022 10:34:50

1K+ Views

Blowfish is a symmetric block cipher algorithm invented by Brute Schneier in December 1993. Blowfish is a substitute of DES or IDEA. One of the most popular feistel network ciphers is Blowfish. Blowfish algorithm has 64-bit block size and variable key length from 42 bits to 448 bits. The algorithm ... Read More

What are the operations of Blowfish Algorithm?

Ginni

Ginni

Updated on 15-Mar-2022 10:33:02

5K+ Views

Blowfish is the symmetric block cipher algorithm and it encrypts the block information of 64-bits at a time. It follows the Feistel network and the working procedure of this algorithm is divided into two parts.Subkey Generation − This process transform the key upto 448 bits long to subkeys adding 4168 ... Read More

What is the Blowfish encryption algorithm?

Ginni

Ginni

Updated on 15-Mar-2022 10:20:28

2K+ Views

The Blowfish encryption algorithm is a symmetric block cipher designed to achieve in the DES algorithm that was slow and uncertain. Blowfish is a keyed, symmetric cryptographic block cipher invented by Bruce Schneier in 1993 and located in the public domain.Symmetric encryption uses an individual encryption key to both encrypt ... Read More

What are the strength of DES in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 10:17:35

8K+ Views

The strength of DES is as follows −Use of 56 bit keys56 bit key can be frequently used in encryption. There are 256 possible keys. A brute force attack on such number of keys is impossible.A machine implementing one DES encryption per microsecond would take more than thousands of years ... Read More

What are the popular examples of Block Cipher?

Ginni

Ginni

Updated on 15-Mar-2022 10:15:48

742 Views

There are some popular examples of Block Cipher which are as follows −The CAST Block Cipher − The CAST Block Cipher is an advancement of the DES block cipher, introduced in Canada by Carlisle Adams and Stafford Tavares. The name of the cipher appear to be after the initials of ... Read More

What are the Weaknesses of Data Encryption Standard?

Ginni

Ginni

Updated on 15-Mar-2022 10:13:41

4K+ Views

Weaknesses in Cipher Design − Some weaknesses that have been discovered in the design of cipher are as follows −S-boxes − There are three weaknesses have been discovered in S-boxes which are as follows −In S-box 4, the last three output bits can be changed in the same method as ... Read More

How can we evaluate the performance of a Data Encryption Algorithm?

Ginni

Ginni

Updated on 15-Mar-2022 10:11:04

198 Views

The Data Encryption Standards (DES) algorithm was invented by IBM in the early 1970s. The two main element of the DES-based system are an algorithm and a key. The DES algorithm is a complex interactive procedure includes substitutions, permutations, and mathematical operations.The key feature of DES is that the algorithms ... Read More

What are the types of Decryption in Information Security?

Ginni

Ginni

Updated on 15-Mar-2022 10:09:30

3K+ Views

A reverse process of encryption is known as Decryption. It is a procedure of transforming Cipher Text into Plain Text. Cryptography need the decryption technique at the receiver side to acquire the original message from non-readable message (Cipher Text).Decryption operate by using the opposite conversion algorithm used to encode the ... Read More

Advertisements