Modified F - Function for Feistel Network in Blowfish Algorithm

Download Now
Provided by: International Journal of Engineering and Innovative Technology (IJEIT)
Topic: Hardware
Format: PDF
A secure computing environment would not be complete without consideration of encryption technology. Encryption can be used to provide high levels of security to network communication, e-mail, files stored on hard drives or floppy disks and other information that requires protection. Encryption is said to occur when data is passed through a series of mathematical operations that generate an alternate form of that data. It is obtained by following certain steps of predefined operations called algorithms. The introduction of a key adds another level of security.
Download Now

Find By Topic