Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Data Structure Articles
Page 87 of 164
How are subkeys generated in Blowfish algorithm?
Blowfish is a symmetric block cipher algorithm invented by Brute Schneier in December 1993. Blowfish is a substitute of DES or IDEA. One of the most popular feistel network ciphers is Blowfish. Blowfish algorithm has 64-bit block size and variable key length from 42 bits to 448 bits. The algorithm includes a key-expansion part, and data-encryption part.Blowfish create the key of at most 448 bits into several subkey arrays the total is 1042 32 bit values or 4168 bytes. It is a 16- round feistel system, which supports very high key-dependent S-boxes and enable 16 iterations.Every round is adapted with ...
Read MoreWhat are the strength of DES in Information Security?
The strength of DES is as follows −Use of 56 bit keys56 bit key can be frequently used in encryption. There are 256 possible keys. A brute force attack on such number of keys is impossible.A machine implementing one DES encryption per microsecond would take more than thousands of years to divide the cipher.The assumption of one encryption per microsecond is excessively moderate. Diffie and Hellman postulated that the technology existed to develop a parallel machine with one million encryption equipment, each of which can implement one encryption per microsecond.It is necessary that there is more to key-search attack than ...
Read MoreWhat are the popular examples of Block Cipher?
There are some popular examples of Block Cipher which are as follows −The CAST Block Cipher − The CAST Block Cipher is an advancement of the DES block cipher, introduced in Canada by Carlisle Adams and Stafford Tavares. The name of the cipher appear to be after the initials of the inventors. The CAST algorithm has 64 bit block size and has a key of size 64 bits.CAST is based on the Feistel structure to perform the substitution permutation network. The authors defines that they need the Feistel mechanism, as it is well considered and free of basic structural weaknesses.Blowfish ...
Read MoreWhat are the Weaknesses of Data Encryption Standard?
Weaknesses in Cipher Design − Some weaknesses that have been discovered in the design of cipher are as follows −S-boxes − There are three weaknesses have been discovered in S-boxes which are as follows −In S-box 4, the last three output bits can be changed in the same method as the first output bit by integrating some of the input bits.Two particularly chosen inputs to an S-box array can generate the same output.It is possible to acquire the same output in an individual round by converting bits in only three neighboring S-boxes.D-boxes − One mystery and one weakness were discovered ...
Read MoreHow can we evaluate the performance of a Data Encryption Algorithm?
The Data Encryption Standards (DES) algorithm was invented by IBM in the early 1970s. The two main element of the DES-based system are an algorithm and a key. The DES algorithm is a complex interactive procedure includes substitutions, permutations, and mathematical operations.The key feature of DES is that the algorithms is fixed and is public data. But the actual key used is shared secret among the originator and the receiver of a transmission. Advances in DES contains lengthening a key to 128 bits and the multi-pass DES which include multiple passes usually three of encryption and decryption using multiple keys.In ...
Read MoreWhat are the types of Decryption in Information Security?
A reverse process of encryption is known as Decryption. It is a procedure of transforming Cipher Text into Plain Text. Cryptography need the decryption technique at the receiver side to acquire the original message from non-readable message (Cipher Text).Decryption operate by using the opposite conversion algorithm used to encode the information. The same key is needed to return the encrypted data to its initial state.In decryption, the system extracts and transform the garbled information and change it to texts and images that are simply comprehensible not only by the reader but also by the system. Decryption can be accomplished manually ...
Read MoreWhat are the types of Encryption in Information Security?
Encryption is a procedure of coding data which can be a file or mail message into cipher text a form unreadable without a decoding key in order to avoid anyone except the pre-determined receiver from reading that information.Decryption is the reverse procedure of transforming encrypted data to its original unencoded form, plaintext. A key in cryptography is a large order of bits used by encryption/ decryption algorithms.In encryption, it is based on the type of encryption, information can be displayed as several numbers, letters, or symbols. Those who work in cryptography fields create it their job, to encrypt data or ...
Read MoreWhat are the advantage and disadvantage of DES?
Data Encryption Standard (DES) is the block cipher which creates a fixed-length string of plaintext bits and change it through a sequence of complicated operations into another cipher text bit string of the similar length. It is a symmetric encryption technique which defines both sender and receiver need a shared key to encrypt and decrypt the information.The problem of this approach is that if the key is known to others the complete conversation is negotiated. The 3DES block size is 64 bits and also need a key to customize the conversion, so that decryption can only be implemented by those ...
Read MoreWhat is suspicious email detection in Information Security?
Suspicious email detection is a type of mailing system where suspicious users are recognized by deciding the keywords used by him. The suspicious keywords are discovered in the mails which are sent by the user. All the blocked mails are tested by the management and recognize the users who have sent such mails.Suspicious mail detection is a type of system by which suspected users are identified by recognizing the types of words. Words can be as hijacking, explosion which can be discovered in their mails which they send to others. These type of mails are tested by the admin and ...
Read MoreWhat are the modules of Triple DES Algorithm?
Triple DES Algorithm used by admin to encode the messages sent to the users or sent some warnings about the different user’s suspicious event. In this research, suspicious words dictionary can be used to find the suspicious words which are not generally used in the normal messaging or communication.There are some modules of Triple DES which are as follows −Admin Login − In this project, admin can get in the username and password to validate himself to access the account panel modules.User Login − In this module, users can get in their username and password to authenticate themselves to access ...
Read More