Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes
In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of...
| الحاوية / القاعدة: | Wasit Journal of Computer and Mathematics Science |
|---|---|
| المؤلفون الرئيسيون: | , |
| التنسيق: | مقال |
| اللغة: | الإنجليزية |
| منشور في: |
College of Computer and Information Technology – University of Wasit, Iraq
2023-12-01
|
| الموضوعات: | |
| الوصول للمادة أونلاين: | https://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/203 |
