Twofish Encryption

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 36 Experts worldwide ranked by ideXlab platform

Yao Minglin - One of the best experts on this subject based on the ideXlab platform.

  • design of Twofish Encryption decryption chip based on fpga
    Computer Engineering, 2009
    Co-Authors: Yao Minglin
    Abstract:

    Aiming at the problems of secure data transformation and private protection,this paper researches the design of improved Twofish Encryption/decryption chip based on Field Programmable Gate Array(FPGA).It uses sixteen Rijndael-like S-boxes to improve the security of Twofish algorithm,and adds a pseudo random number generator to determine the S-box applied in each round,which can enhance the performance to against attacks.The improved chip is realized with FPGA Stratix EP1S20 manufactured by Altera Co.,and it is proved that this method can enhance the security of the system.

Tang Zuoxia - One of the best experts on this subject based on the ideXlab platform.

  • design of Twofish Encryption decryption unit based on sopc
    Journal of Yunnan University, 2011
    Co-Authors: Tang Zuoxia
    Abstract:

    The Twofish algorithm is one of the final five candidate's algorithms for the AES Encryption standard.In this paper,follow the similar of the algorithms in different key length,we designed a time-multiplexed Twofish Encryption / decryption processing unit based on SOPC technology.In order to optimize the hardware structure of the target without compromising the safety of the original premise,we revised the design of S-boxes.Compared with the traditional system,it Encryption speed faster and consume fewer resources,and so on.This design uses VHDL hardware description language,and layout and wire on Quartus Ⅱ8.0.And then encapsulation this processing unit into an independent IP-core,attached to the Altera Nios-Ⅱ system,and eventually downloads to Altera EP2C20F484C6 target chip for validation.

Beomgeun Lee - One of the best experts on this subject based on the ideXlab platform.

  • high speed hardware design for the Twofish Encryption algorithm
    Journal of information and communication convergence engineering, 2005
    Co-Authors: Choongmo Youn, Beomgeun Lee
    Abstract:

    Twofish is a 128-bit block cipher that accepts a variable-length key up to 256 bits. The cipher is a 16­round Feistel network with a bijective F function made up of four key-dependent 8-by-8-bit S-boxes, a fixed 4­by-4 maximum distance separable matrix over Galois Field, a pseudo-Hadamard transform, bitwise rotations, and a carefully designed key schedule. In this paper, the Twofish is modeled in VHDL and simulated. Hardware implementation gives much better performance than software-based approaches.

Ahmed Oun - One of the best experts on this subject based on the ideXlab platform.

  • two factor authentication using Twofish Encryption and visual cryptography algorithms for secure data communication
    The Internet of Things, 2019
    Co-Authors: Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi Amsaad, Muder Almiani, Raouf M Ganda, Ahmed Oun
    Abstract:

    Dependence of the individuals on the Internet for performing the several actions require secure data communication. Thus, the reliable data communication improves the confidentiality. As, enhanced security leads to reliable and faster communication. To improve the reliability and confidentiality, there is dire need of fully secured authentication method. There are several methods of password protections were introduced to protect the confidentiality and reliability. Most of the existing methods are based on alphanumeric approaches, but few methods provide the dual authentication process. In this paper, we introduce improved graphical password authentication using Twofish Encryption and Visual Cryptography (TEVC) method. Our proposed TEVC is unpredictably organized as predicting the correct graphical password and arranging its particles in the proper order is harder as compared to traditional alphanumeric password system. TEVC is tested by using JAVA platform. Based on the testing results, we confirm that proposed TEVC provides secure authentication. TEVC Encryption algorithm detected as more prudent and possessing lower time complexity as compared to other known existing algorithms message code confirmation and fingerprint scan with password.

P Ramadevi - One of the best experts on this subject based on the ideXlab platform.

  • fpga implementation of fuzzy based Twofish Encryption algorithm in wireless network
    Transylvanian Review, 2016
    Co-Authors: G Geetharamani, P Ramadevi
    Abstract:

    In emerging field of data communication is the process of transforming information data from on place to another place.  Proper secured data communication and security is main issue for any communication. Hence secure communication algorithm is highly required. The influenced Two-fish algorithm is competing cipher of 128-bit block and this algorithm is a follow of National Institute of Standards and Technology’s (NIST) and AES competition competitors, for many Encryption systems world-wide replacement of DES at the core. In detail modules for 128, 192 and 256-bit key size has been explained for two-fish security algorithm. This new algorithm ropes different connectivity of wireless network. By key lengths variation to get support of processing level and different security level the Encryption/decryption is being done. Utilizing fuzzy logic this competence is achieved. The main research work aspect is to take up an Encryption algorithm and perform with lower or higher key length depends upon the wireless network connectivity. Implementation of this enhanced two-fish Encryption algorithm using Verilog HDL.