Blowfish based encryption model in real cloud environment
Abstract
Keywords
Full Text:
PDFReferences
1. Kumar N, Thakur J, Kalia A. Performance analysis of symmetric key cryptography algorithms: DES, AES and Blowfish. An International Journal of Engineering Sciences 2011; 4: 28–37.
2. Goyal S. A survey on the applications of cryptography. International Journal of Science and Technology 2012; 2(3): 352–355.
3. Mathur A. A research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms. International Journal on Computer Science and Engineering (IJCSE) 2012; 4(9): 1650–1657.
4. Ismil IA, Galal-Edeen GH, Khattab S, et al. Performance examination of AES encryption algorithm with constant and dynamic rotation. International Journal of Reviews in Computing 2012; 12: 18–29.
5. Dave KC, Parmar SK. A review on various most common symmetric encryptions algorithms. International Journal for Scientific Research & Development 2013; 1(4): 1015–1018.
6. Pahal R, Kumar V. Efficient implementation of AES. International Journal of Advanced Research in Computer Science and Software Engineering 2013; 3(7): 290–295.
7. Rakholiya KR, Kathiriya D. Efficient black-box collision search in cryptanalysis. Paripex-Indian Journal of Research 2013; 2(1): 30–31.
8. Sandhu GS, Verma V. Comparing popular symmetric key algorithms using various performance metrics. International Journal of Advance Research in Computer Science and Management Studies 2013; 1(7): 394–399.
9. Sumitra. Comparative analysis of AES and DES security algorithms. International Journal of Scientific and Research Publications 2013; 3(1): 1–5.
10. Manjesh KN, Karunavathi RK. Secured high throughput implementation of AES Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering 2013; 3(5): 1193–1198.
11. Lalitha N, Manimegalai P, Muthukumar VP, Santha M. Efficient data hiding by using AES & advance hill cipher algorithm. International Journal of Research in Computer Applications and Robotics 2014; 2(1): 1–13.
12. Acharya K, Sajwan M, Bhargava S. Analysis of cryptographic algorithms for network security. International Journal of Computer Applications Technology and Research 2014; 3(2): 130–135.
13. Al Hamid HA, Rahman SMM, Hossain MS, et al. A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 2017; 5: 22313–22328. doi: 10.1109/ACCESS.2017.2757844
14. Qadir AM, Varol N. A review paper on cryptography. In: 2019 7th International Symposium on Digital Forensics and Security (ISDFS); 10–12 June 2019; Barcelos, Portugal.
15. Gupta RK. A review paper on concepts of cryptography and cryptographic hash function. European Journal of Molecular & Clinical Medicine 2020; 7(7): 3397–3408.
16. Verma J, Shahrukh M, Krishna M, Goel R. A critical review on cryptography and hashing algorithm SHA-512. International Research Journal of Modernization in Engineering Technology and Science 2021; 3(12): 1760–1764.
17. Oberoi N, Sachdeva S, Garg P, Walia R. Dynamic extraction and analytics of big data from cloud and social media integrated platforms. Advances in Mathematics: Scientific Journal 2020; 9(6): 3703–3711. doi: 10.37418/amsj.9.6.48
18. Walia R, Garg P. Cryptography: Analysis of SYN and UDP attacks using wire shark. In: 2021 2nd International Conference on Computational Methods in Science & Technology (ICCMST); 17–18 December 2021; Mohali, India.
19. Walia R, Garg P. Key management scheme for cloud integrated Internet of Things. In: 2023 International Conference on Artificial Intelligence and Smart Communication (AISC); 27–29 January 2023; Greater Noida, India. pp. 1067–1071.
DOI: https://doi.org/10.32629/jai.v6i3.695
Refbacks
- There are currently no refbacks.
Copyright (c) 2023 Rubika Walia, Prachi Garg, Manish Kumar
License URL: https://creativecommons.org/licenses/by-nc/4.0