CSF11903: Project 1 - Blowfish & Twofish Analysis
This project, part of the Network and Security Fundamentals course (CSF11903), explores the cryptographic algorithms Blowfish and Twofish. Led by Lecturer Nazirah binti Abd Hamid, the project includes contributions from group members, including Anas Fathi
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
Subject: Network and Security Fundamentals(CSF11903)
Lecturer: Nazirah binti Abd Hamid
Group Members:
1. Anas Fathi bin Md Yunos | 060566
2. Arif Iqbal bin Anizam | 060559
3. Nur Alawiyah binti Mohd Yassin | 060562
4. Nasuha binti Kamarudin | 060570
5. Muhammad Alim bin Mohd Arifin | 060568
6. Muhammad Ammar bin Norzan | 060565
______________________________________________
References:
1. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html#:~:text=Twofish%20is%20a%20symmetric%20block,and%20256%2Dbit%20keys.)
2. Blowfish Algorithm with Examples - GeeksforGeeks. (2019, October 14). Retrieved June 5, 2021, from GeeksforGeeks website: https://www.geeksforgeeks.org/blowfish-algorithm-with-examples/
3. Schneier on Security: Products that Use Twofish. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/twofish/products/
4. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce. (2020). Cryptographic Standards and Guidelines | CSRC. Nist.gov. https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/archived-crypto-projects/aes-development
5. Section 5.1. Evaluation Criteria For AES | Cryptography and Network Security (4th Edition). (2017). Flylib.com. https://flylib.com/books/en/3.190.1.54/1/
6. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Schneier.com. https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html
_______________________________________________
Thank you for watching!!
Video Information
Views
98
Total views since publication
Likes
3
User likes and reactions
Duration
13:38
Video length
Published
Jun 5, 2021
Release date
Quality
hd
Video definition