Superiority of Twofish over Blowfish
Journal Title: International Journal of Scientific Research and Management - Year 2016, Vol 4, Issue 11
Abstract
Now a day’s users are generating huge amount of data and hence they are motivated to outsource it to the public cloud. As cloud server is not trusted server, so data users wants their data to be safe at cloud side. To preserve the privacy of documents, i t should get encrypted before outsourcing to the cloud. For ensuring privacy of documents, numerous algorithms have been proposed which makes user data private and avoid unauthorized access to their confidential data. Most essential characteristics of any Encryption algorithm are: Speed of Encryption and Security. In this Paper, speed comparisons between two algorithms i.e. Twofish and Blowfish have been studied. We have analyzed encryption speed of both algorithms by encrypting different sized data. Perfor mance has been calculated in terms of throughput of each algorithm on different sets of data
Authors and Affiliations
Deepali D. Rane
Analysis of Factors Influencing Consumer Purchase Decision of Cellular Phones
In India, obsession towards cellular phones is increasing continuously. India holds second place in number of cellular phone usage, with the number of 1276660000.Cellul ar phones have brought immense change in people’s l...
Impact of Capital Structure on Financial Performance of Construction and Real Estate Quoted Companies i n Nigeria
This paper examines the impact of capital structure on the financial performance of quoted Construction and Real Estate Companies in Nigeria from 2005 - 2014.The study made use of ex post facto research design which invo...
Performance evaluation for a unicast Non Delay Tolerant position based routing protocols in VANETs
Vehicular Ad hoc Network s are special kind of Mobile Ad Hoc Networks. VANET is an emerging technology, which enables an extensive range of applications, including road safety, passenger convenience, self - driven vehicl...
Signature Verification Using Support VectorMachine(SVM)
Automated signature verificationhas many applications in our daily lifelikeBank-cheque processing,document authentication, ATM access etc. Handwritten signatures have proved to be important inauthenticating a person's id...
RECYCLING OF MUNICIPAL SOLID WASTE FOR ELECTRCITY GENERATION AND GREEN EARTH
Waste generation is increasing everywhere. Hence improved waste management is an essential element to make the resource efficient. Municipal Solid Waste (MSW), generated if not properly managed,...