ANALISIS PERBANDINGAN RUANG DAN WAKTU ALGORITMA ENKRIPSI BLOWFISH DAN TWOFISH PADA ENKRIPSI DAN DESKRIPSI BERKAS MENGGUNAKAN MODUL PYTHON

Candra Kurniawan, Mochammad Fadhli Magfur, Fauziah Fauziah
{"title":"ANALISIS PERBANDINGAN RUANG DAN WAKTU ALGORITMA ENKRIPSI BLOWFISH DAN TWOFISH PADA ENKRIPSI DAN DESKRIPSI BERKAS MENGGUNAKAN MODUL PYTHON","authors":"Candra Kurniawan, Mochammad Fadhli Magfur, Fauziah Fauziah","doi":"10.30587/e-link.v19i1.6592","DOIUrl":null,"url":null,"abstract":"The rapid development of information technology is accompanied by an increase in cyber incidents such as data breaches. One of the security methods that can be implemented to enhance data security against data breaches is by applying cryptography to data management systems. Cryptography is useful for encrypting plaintext into ciphertext, making the data not easily readable. One of the encryption algorithms widely used in data security is Blowfish and Twofish. Blowfish and Twofish are symmetric encryption algorithms that use a single key for encryption and decryption. This journal focuses on testing the encryption and decryption of Blowfish and Twofish algorithms in relation to space and time complexity. The results of testing three sets of data on two different devices indicate that the Blowfish algorithm has better speed than Twofish, while Twofish performs better than Blowfish in terms of memory usage. Moreover, the usage of the processor affects the speed of the process.","PeriodicalId":421293,"journal":{"name":"E-Link: Jurnal Teknik Elektro dan Informatika","volume":" March","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"E-Link: Jurnal Teknik Elektro dan Informatika","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30587/e-link.v19i1.6592","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The rapid development of information technology is accompanied by an increase in cyber incidents such as data breaches. One of the security methods that can be implemented to enhance data security against data breaches is by applying cryptography to data management systems. Cryptography is useful for encrypting plaintext into ciphertext, making the data not easily readable. One of the encryption algorithms widely used in data security is Blowfish and Twofish. Blowfish and Twofish are symmetric encryption algorithms that use a single key for encryption and decryption. This journal focuses on testing the encryption and decryption of Blowfish and Twofish algorithms in relation to space and time complexity. The results of testing three sets of data on two different devices indicate that the Blowfish algorithm has better speed than Twofish, while Twofish performs better than Blowfish in terms of memory usage. Moreover, the usage of the processor affects the speed of the process.
使用 python 模块对文件加密和描述中的 blowfish 和 twofish 加密算法的空间和时间进行比较分析
信息技术飞速发展的同时,数据泄露等网络事件也在增加。在数据管理系统中应用加密技术是加强数据安全、防止数据外泄的安全方法之一。加密技术可将明文加密为密文,使数据不易被读取。数据安全中广泛使用的加密算法之一是 Blowfish 和 Twofish。Blowfish 和 Twofish 是对称加密算法,使用单一密钥进行加密和解密。本期刊重点测试 Blowfish 和 Twofish 算法在空间和时间复杂性方面的加密和解密。在两种不同设备上测试三组数据的结果表明,Blowfish 算法的速度优于 Twofish 算法,而 Twofish 算法在内存使用方面的表现优于 Blowfish 算法。此外,处理器的使用也会影响处理速度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信