Superiority of Twofish over Blowfish
Journal Title: International Journal of Scientific Research and Management - Year 2016, Vol 4, Issue 11
Abstract
Now a day’s users are generating huge amount of data and hence they are motivated to outsource it to the public cloud. As cloud server is not trusted server, so data users wants their data to be safe at cloud side. To preserve the privacy of documents, i t should get encrypted before outsourcing to the cloud. For ensuring privacy of documents, numerous algorithms have been proposed which makes user data private and avoid unauthorized access to their confidential data. Most essential characteristics of any Encryption algorithm are: Speed of Encryption and Security. In this Paper, speed comparisons between two algorithms i.e. Twofish and Blowfish have been studied. We have analyzed encryption speed of both algorithms by encrypting different sized data. Perfor mance has been calculated in terms of throughput of each algorithm on different sets of data
Authors and Affiliations
Deepali D. Rane
Use and Awareness of Online Public Access Catalogue (OPAC) by Students and Faculty members of Anna University Regional Campus, Coimbatore,Tamil Nadu –A Case Study
This paper aims to present the results of a survey conducted to determine the use of online public access catalogue (OPAC) at the library of Anna University Regional Campus, Coimbatore. Th...
Advance Flow Control for High Efficiency Renewable System Using Arm Processor
The Segmented Energy Storage management (SES) is the proposed solution of smoothing renewable power generation fluctuations. A SES based hybrid renewable power management system requires a suitable control...
Application Of Neuro – Fuzzy Systems In Gene Classification
Neuro - Fuzzy Systems are one of the important research topics in computer science nowadays. They combine the approaches of Neural networks with the logics and calculations of Fuzzy. This paper...
Improved Feature Subset Selection using Hybrid Ant Colony and Perceptron Network
As classification accuracy is strongly dependent on the set of features used as input variables. For automatic feature acquisition, the literature provides us with numerous strategies aiming to find a “best” set of feat...
Stabilization of Nigerian Deltaic Laterites with Saw Dust Ash
Soil improvement potential of saw dust ash was studied with regards to compaction and CBR characteristics of a deltaic laterite. The physical properties and engineering characteristics studied include the...