EEPIS Repository

Studi Dan Implementasi Algoritma Blowfish Untuk Enkripsi Email

Rahman, Chumaidi and Nadhori, Isbat Uzzin and Fathoni, Kholid (2010) Studi Dan Implementasi Algoritma Blowfish Untuk Enkripsi Email. eepis final project.

PDF - Published Version
Download (397Kb) | Preview


    The needs of information currently encourage the growth of information security methods. Art encryption and security is the cryptographic message is growing very fast right now. The use of digital computers currently encouraging the growth of modern cryptographic algorithms that operate in bit mode. Modern cryptographic algorithms are divided into key and public key symmetry. Symmetry key algorithm was divided into stream ciphers and block ciphers. All of these types of algorithms used in various fields of application. Blowfish is a block cipher algorithm that is very broad and many use today. The second algorithm developed by Bruce Scheneier. Twofish Widespread use of these algorithms due to the strong against attacks. The study of Blowfish algorithms performed because a close relationship between the algorithm. The study and implementation is done by looking at the algorithm from different sides. Side which will be discussed in this study is the explanation of the algorithm, security testing algorithms, and implementation of algorithms

    Item Type: Article
    Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
    Q Science > QA Mathematics > QA76 Computer software
    Divisions: Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science
    Depositing User: Ms Annisa Nurul Faridha
    Date Deposited: 29 Jul 2011 15:17
    Last Modified: 29 Jul 2011 15:17

    Actions (login required)

    View Item