CSF11903: Project 1 - Blowfish & Twofish Analysis
This project, part of the Network and Security Fundamentals course (CSF11903), explores the cryptographic algorithms Blowfish and Twofish. Led by Lecturer Nazirah binti Abd Hamid, the project includes contributions from group members, including Anas Fathi

Ammar Norzan
98 views โข Jun 5, 2021

About this video
Subject: Network and Security Fundamentals(CSF11903)
Lecturer: Nazirah binti Abd Hamid
Group Members:
1. Anas Fathi bin Md Yunos | 060566
2. Arif Iqbal bin Anizam | 060559
3. Nur Alawiyah binti Mohd Yassin | 060562
4. Nasuha binti Kamarudin | 060570
5. Muhammad Alim bin Mohd Arifin | 060568
6. Muhammad Ammar bin Norzan | 060565
______________________________________________
References:
1. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html#:~:text=Twofish%20is%20a%20symmetric%20block,and%20256%2Dbit%20keys.)
โ2. Blowfish Algorithm with Examples - GeeksforGeeks. (2019, October 14). Retrieved June 5, 2021, from GeeksforGeeks website: https://www.geeksforgeeks.org/blowfish-algorithm-with-examples/
โ3. Schneier on Security: Products that Use Twofish. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/twofish/products/
โ4. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce. (2020). Cryptographic Standards and Guidelines | CSRC. Nist.gov. https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/archived-crypto-projects/aes-development
5. Section 5.1. Evaluation Criteria For AES | Cryptography and Network Security (4th Edition). (2017). Flylib.com. https://flylib.com/books/en/3.190.1.54/1/
6. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Schneier.com. https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html
_______________________________________________
Thank you for watching!!
Lecturer: Nazirah binti Abd Hamid
Group Members:
1. Anas Fathi bin Md Yunos | 060566
2. Arif Iqbal bin Anizam | 060559
3. Nur Alawiyah binti Mohd Yassin | 060562
4. Nasuha binti Kamarudin | 060570
5. Muhammad Alim bin Mohd Arifin | 060568
6. Muhammad Ammar bin Norzan | 060565
______________________________________________
References:
1. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html#:~:text=Twofish%20is%20a%20symmetric%20block,and%20256%2Dbit%20keys.)
โ2. Blowfish Algorithm with Examples - GeeksforGeeks. (2019, October 14). Retrieved June 5, 2021, from GeeksforGeeks website: https://www.geeksforgeeks.org/blowfish-algorithm-with-examples/
โ3. Schneier on Security: Products that Use Twofish. (2021). Retrieved June 5, 2021, from Schneier.com website: https://www.schneier.com/academic/twofish/products/
โ4. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Department of Commerce. (2020). Cryptographic Standards and Guidelines | CSRC. Nist.gov. https://csrc.nist.gov/projects/cryptographic-standards-and-guidelines/archived-crypto-projects/aes-development
5. Section 5.1. Evaluation Criteria For AES | Cryptography and Network Security (4th Edition). (2017). Flylib.com. https://flylib.com/books/en/3.190.1.54/1/
6. Academic: The Twofish Encryption Algorithm - Schneier on Security. (2021). Schneier.com. https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html
_______________________________________________
Thank you for watching!!
Video Information
Views
98
Likes
3
Duration
13:38
Published
Jun 5, 2021
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.