2012
DOI: 10.5120/6308-8632
|View full text |Cite
|
Sign up to set email alerts
|

Superiority of Blowfish Algorithm in Wireless Networks

Abstract: Encryption algorithm plays a crucial role in information security which guarantees the recent growing internet and network applications. They are used to secure the data in wireless networks against malicious attacks but securing data also consumes resources such as C.P.U time, Memory, battery power, encryption time etc. In this paper, we evaluated the performance of four symmetric key encryption algorithms; AES, DES, 3DES and Blowfish which commonly used for data encryption in terms of encryption time, decryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 4 publications
0
16
0
Order By: Relevance
“…Blowfish algorithm is used more than AES due to its large key length and high security. It provides high throughput compared to other algorithms considered in this research work [18,21] …”
Section: Blow-fish (Bf)mentioning
confidence: 99%
See 4 more Smart Citations
“…Blowfish algorithm is used more than AES due to its large key length and high security. It provides high throughput compared to other algorithms considered in this research work [18,21] …”
Section: Blow-fish (Bf)mentioning
confidence: 99%
“…The last option is having 56 key bits as same as DES but used thrice in the algorithm because of all three keys are equal and prediction can be done easily. It is a symmetric key block cipher [16]. It is less secured than AES.…”
Section: Triple Data Encryption Standard (Tdes)mentioning
confidence: 99%
See 3 more Smart Citations