CSF11903: Mastering Network & Security Fundamentals with Blowfish & Twofish Algorithms π
Learn essential network security concepts and explore the powerful Blowfish and Twofish encryption algorithms in this educational video. Perfect for aspiring cybersecurity professionals!

Nik Hudani Dini Nik Rahimy
1.3K views β’ Jun 7, 2021

About this video
Disclaimer: This video is for educational purpose
REFERENCE;
1. splashdata. (n.d.). SplashID Safe Password Vault. Retrieved from https://www.splashdata.com/splashid/blowfish.htm
2. Sharma, S. (April, 2018). Explain Blowfish Algorithm. Retrieved from Ques10: https://www.ques10.com/p/33931/explain-blowfish-algorithm-1/#
3 . ATIA, T. S. (2014). DEVELOPMENT OF A NEW ALGORITHM FOR KEY. Journal of Engineering Science and Technology, 3.
4. Gatliff, B. (July, 2003). Encrypting data with the Blowfish algorithm. Retrieved from embedded: https://www.embedded.com/encrypting-data-with-the-blowfish-algorithm/
5. AUEssays. (November, 2018). Blowfish Algorithm Advantages and Disadvantages. . Retrieved from https://www.auessays.com/essays/computer-science/blowfish-algorithm-history-and-background-computer-science-essay.php
6. CONSULTING, E. (n.d.). What is Blowfish in security? Who uses Blowfish? Retrieved from https://www.encryptionconsulting.com/education-center/what-is-blowfish/
7. Deepali D.Rane (2016, November). Superiority Twofish over Blowfish. In 2016 International Journal of Scientific Research and Management (IJSRM) Volume 4 (pp. 4744-4746).
8.B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm, A 128-Bit Block Cipher, John Wiley & Sons, 1999.
9.Bruce Schneir, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno and Mike Stay (2000, May). The Twofish Teamβs Final Comments on AES Selection.
10. Journal, D. D. (December, 1998). The Twofish Encryption Algorithm. Retrieved from Schneier on Security: https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html
11. Khan, S. (n.d.). What is the Twofish encryption algorithm? Retrieved from educative: https://www.educative.io/edpresso/what-is-the-twofish-encryption-algorithm
12. Stancu, H. P. (2004). TWOFISH ENCRYPTION ALGORITHM. Horatiu Paul Stancu.
13. Purnima Gehlot, S. R Biradar and B. P. Singh (May, 2013). Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL. In International Journal of Computer Applications (0975 β 8887) Volume 70 (pp. 37 β 42)
14.Chujiao Ma, John Chandy and Zhijie Shi (May, 2017). Algebraic Side-Channel Attack on
Twofish. In Journal of Internet Services and Information Security (JISIS) Volume 7 (32-43).
15. R. Balasubramaniam, Dr. M. Aramuthan (July-August, 2012). Efficient Parallel Data
Processing For Resource Sharing In Cloud Computing. In IOSR Journal of computer engineering (IOSRJCE) Volume 2, Issue 3 (pp.01-05).
16. CONSULTING, E. (n.d.). What is Twofish? Is Twofish secure? Retrieved from https://www.encryptionconsulting.com/education-center/what-is-twofish/
17. Rane, D. D. (16 November,2016). Superiority of Twofish over Blowfish. International Journal of scientific research and management (IJSRM), 3/3.
REFERENCE;
1. splashdata. (n.d.). SplashID Safe Password Vault. Retrieved from https://www.splashdata.com/splashid/blowfish.htm
2. Sharma, S. (April, 2018). Explain Blowfish Algorithm. Retrieved from Ques10: https://www.ques10.com/p/33931/explain-blowfish-algorithm-1/#
3 . ATIA, T. S. (2014). DEVELOPMENT OF A NEW ALGORITHM FOR KEY. Journal of Engineering Science and Technology, 3.
4. Gatliff, B. (July, 2003). Encrypting data with the Blowfish algorithm. Retrieved from embedded: https://www.embedded.com/encrypting-data-with-the-blowfish-algorithm/
5. AUEssays. (November, 2018). Blowfish Algorithm Advantages and Disadvantages. . Retrieved from https://www.auessays.com/essays/computer-science/blowfish-algorithm-history-and-background-computer-science-essay.php
6. CONSULTING, E. (n.d.). What is Blowfish in security? Who uses Blowfish? Retrieved from https://www.encryptionconsulting.com/education-center/what-is-blowfish/
7. Deepali D.Rane (2016, November). Superiority Twofish over Blowfish. In 2016 International Journal of Scientific Research and Management (IJSRM) Volume 4 (pp. 4744-4746).
8.B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm, A 128-Bit Block Cipher, John Wiley & Sons, 1999.
9.Bruce Schneir, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson, Tadayoshi Kohno and Mike Stay (2000, May). The Twofish Teamβs Final Comments on AES Selection.
10. Journal, D. D. (December, 1998). The Twofish Encryption Algorithm. Retrieved from Schneier on Security: https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html
11. Khan, S. (n.d.). What is the Twofish encryption algorithm? Retrieved from educative: https://www.educative.io/edpresso/what-is-the-twofish-encryption-algorithm
12. Stancu, H. P. (2004). TWOFISH ENCRYPTION ALGORITHM. Horatiu Paul Stancu.
13. Purnima Gehlot, S. R Biradar and B. P. Singh (May, 2013). Implementation of Modified Twofish Algorithm using 128 and 192-bit keys on VHDL. In International Journal of Computer Applications (0975 β 8887) Volume 70 (pp. 37 β 42)
14.Chujiao Ma, John Chandy and Zhijie Shi (May, 2017). Algebraic Side-Channel Attack on
Twofish. In Journal of Internet Services and Information Security (JISIS) Volume 7 (32-43).
15. R. Balasubramaniam, Dr. M. Aramuthan (July-August, 2012). Efficient Parallel Data
Processing For Resource Sharing In Cloud Computing. In IOSR Journal of computer engineering (IOSRJCE) Volume 2, Issue 3 (pp.01-05).
16. CONSULTING, E. (n.d.). What is Twofish? Is Twofish secure? Retrieved from https://www.encryptionconsulting.com/education-center/what-is-twofish/
17. Rane, D. D. (16 November,2016). Superiority of Twofish over Blowfish. International Journal of scientific research and management (IJSRM), 3/3.
Video Information
Views
1.3K
Likes
19
Duration
17:44
Published
Jun 7, 2021
User Reviews
4.4
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.