CSF11903: Project 1 - Blowfish & Twofish Analysis

This project, part of the Network and Security Fundamentals course (CSF11903), explores the cryptographic algorithms Blowfish and Twofish. Led by Lecturer Nazirah binti Abd Hamid, the project includes contributions from group members, including Anas Fathi

Ammar Norzan98 views13:38

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Pakistan under the topic 'f'.

About this video

Subject: Network and Security Fundamentals(CSF11903) Lecturer: Nazirah binti Abd Hamid Group Members: 1. Anas Fathi bin Md Yunos | 060566 2. Arif Iqbal bin Anizam | 060559 3. Nur Alawiyah binti Mohd Yassin | 060562 4. Nasuha binti Kamarudin | 060570 5. Muhammad Alim bin Mohd Arifin | 060568 6. Muhammad Ammar bin Norzan | 060565 ______________________________________________ References: 1. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html#:~:text=Twofish%20is%20a%20symmetric%20block,and%20256%2Dbit%20keys.) ‌2. Blowfish Algorithm with Examples - GeeksforGeeks. (2019, October 14). Retrieved June 5, 2021, from GeeksforGeeks website: https://www.geeksforgeeks.org/blowfish-algorithm-with-examples/ ‌3. Schneier on Security: Products that Use Twofish. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/twofish/products/ ‌4. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce. (2020). Cryptographic Standards and Guidelines | CSRC. Nist.gov. https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/archived-crypto-projects/aes-development 5. Section 5.1. Evaluation Criteria For AES | Cryptography and Network Security (4th Edition). (2017). Flylib.com. https://flylib.com/books/en/3.190.1.54/1/ 6. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Schneier.com. https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html _______________________________________________ Thank you for watching!!

Video Information

Views
98

Total views since publication

Likes
3

User likes and reactions

Duration
13:38

Video length

Published
Jun 5, 2021

Release date

Quality
hd

Video definition