2016
DOI: 10.1016/j.protcy.2016.08.104
|View full text |Cite
|
Sign up to set email alerts
|

Hardware Implementation of Blowfish Algorithm for the Secure Data Transmission in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(23 citation statements)
references
References 8 publications
0
22
0
1
Order By: Relevance
“…Application layer is the third layer and its main objective is to unite the IoT community requirements and mechanical innovation. Application layer can be thought as the midpoint level among the business advances and in what way it can be organized to fulfill the social requirements [6].…”
Section: Iot Architecturementioning
confidence: 99%
“…Application layer is the third layer and its main objective is to unite the IoT community requirements and mechanical innovation. Application layer can be thought as the midpoint level among the business advances and in what way it can be organized to fulfill the social requirements [6].…”
Section: Iot Architecturementioning
confidence: 99%
“…Feistel network is a general method of transforming any function (usually called an F-function) into a permutation [27], [30].…”
Section: Blowfish Algorithmmentioning
confidence: 99%
“…It uses a variable key-length ranging from 32 bits to 448 bits having 16 rounds with input of 64-bit data [27]. This data is further divided into two equal halves as shown in Figure 3, and then apply following algorithm steps on it.…”
Section: ) Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptographic algorithms or Crypto-algorithms are categorized as either symmetric or asymmetric where [1], [10]- [12] symmetric algorithms, as compared to asymmetric, are extremely fast [8], [13] and secure through strong key size [8]. Among symmetric algorithms, Blowfish is considered superior in terms of security, avalanche effect, throughput, memory usage, execution time, and power consumption [14]. It gives better performance compared to other algorithms [15] and demonstrated excellent security as it is known to have no successful attacks [15]- [17].…”
Section: Introductionmentioning
confidence: 99%