Design and Implementation of Multi-key Blowfish and CAST Algorithm: Comparative Study with CBC, CFB and CTR Modes

In modern communication systems, secret keys are used to secure sensitive information such as personal data, financial transactions and government secrets. However, the security of these systems is only as strong as the secrecy of the key utilized for encrypting and decrypting the data. The use of...

Full description

Bibliographic Details
Main Authors: Bushra Jaber M.Jawad, Saif Al-alak
Format: Article
Language:English
Published: College of Computer and Information Technology – University of Wasit, Iraq 2023-12-01
Series:Wasit Journal of Computer and Mathematics Science
Subjects:
Online Access:https://wjcm.uowasit.edu.iq/index.php/wjcm/article/view/203