Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes

In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of...

وصف كامل

التفاصيل البيبلوغرافية
الحاوية / القاعدة:Wasit Journal of Computer and Mathematics Science
المؤلفون الرئيسيون: Bushra Jaber M.Jawad, Saif Al-alak
التنسيق: مقال
اللغة:الإنجليزية
منشور في: College of Computer and Information Technology – University of Wasit, Iraq 2023-12-01
الموضوعات:
الوصول للمادة أونلاين:https://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/203