Understanding Blowfish & Twofish Encryption Algorithms π
Learn the fundamentals of Blowfish and Twofish encryption algorithms in this educational video. Perfect for CSf 11903 Network and Security Fundamentals students!

Jamunah Rajendran
2.8K views β’ Jun 4, 2021

About this video
Disclaimer : This video is for education purpose and to complete the assessment of CSf 11903- Network and Security Fundamentals
REFERENCE:
1.Techopedia Inc.(2021).Encryption Algorithm.What Does Encryption Algorithm Mean? Retrieved from
https://www.techopedia.com/definition/1778/encryption-algorithm#:~:text=An%20encryption%20algorithm%20is%20a%20component%20for%20electronic,are%20used%20to%20encrypt%20electronic%20data%20or%20numbers.
2.Bill Gatliff( 2003, July 15).Encrypting data with the Blowfish algorithm.Retrieved from https://www.embedded.com/encrypting-data-with-the-blowfish-algorithm/
3. Encryption Consulting.What is Blowfish in security? Who uses Blowfish?.https://www.encryptionconsulting.com/education-center/what-is-blowfish/hat is Blowfish in security?Β
4.TECH .(2019, March 7).Twofish Encryption: What Is It?. Retrieved from https://choosetoencrypt.com/tech/twofish-encryption/
5. Dr. Dobb's Journal, (1998,December ).The Twofish Encryption Algorithm. Retrieved from https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html#:~:text=Twofish%20is%20much%20faster%3B%20its,plaintext%20with%20the%20same%20key
6. Deepali D. Rane.(2016 )Superiority of Twofish over Blowfish.International Journal of scientific research and management (IJSRM), 4(11),
Β Β Β Β Β 4746. www.ijsrm.in
7. Ghosh, Archisman. (2020). Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks. Retrieved from https://www.researchgate.net/publication/342764235_Comparison_of_Encryption_Algorithms_AES_Blowfish_and_Twofish_for_Security_of_Wireless_Networks
REFERENCE:
1.Techopedia Inc.(2021).Encryption Algorithm.What Does Encryption Algorithm Mean? Retrieved from
https://www.techopedia.com/definition/1778/encryption-algorithm#:~:text=An%20encryption%20algorithm%20is%20a%20component%20for%20electronic,are%20used%20to%20encrypt%20electronic%20data%20or%20numbers.
2.Bill Gatliff( 2003, July 15).Encrypting data with the Blowfish algorithm.Retrieved from https://www.embedded.com/encrypting-data-with-the-blowfish-algorithm/
3. Encryption Consulting.What is Blowfish in security? Who uses Blowfish?.https://www.encryptionconsulting.com/education-center/what-is-blowfish/hat is Blowfish in security?Β
4.TECH .(2019, March 7).Twofish Encryption: What Is It?. Retrieved from https://choosetoencrypt.com/tech/twofish-encryption/
5. Dr. Dobb's Journal, (1998,December ).The Twofish Encryption Algorithm. Retrieved from https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html#:~:text=Twofish%20is%20much%20faster%3B%20its,plaintext%20with%20the%20same%20key
6. Deepali D. Rane.(2016 )Superiority of Twofish over Blowfish.International Journal of scientific research and management (IJSRM), 4(11),
Β Β Β Β Β 4746. www.ijsrm.in
7. Ghosh, Archisman. (2020). Comparison of Encryption Algorithms: AES, Blowfish and Twofish for Security of Wireless Networks. Retrieved from https://www.researchgate.net/publication/342764235_Comparison_of_Encryption_Algorithms_AES_Blowfish_and_Twofish_for_Security_of_Wireless_Networks
Video Information
Views
2.8K
Likes
35
Duration
8:58
Published
Jun 4, 2021
User Reviews
4.4
(2) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now