Main Article Content
M. Mushtaq, S. Jamel, A. Disina, Z. Pindar, N. Shakir, and M. Mat Deris, “A survey on the cryptographic encryption algorithms,” International Journal of Advanced Computer Science and Applications, vol. 8, pp. 333–344, 11 2017.
A. Shorman and M. Qatawneh, “Performance improvement of double data encryption standard algorithm using parallel computation,” International Journal of Computer Applications, vol. 179, pp. 1–6, 03 2018.
A. Kahate, Cryptography and Network Security. Tata Mcgraw-Hill Publishing Company Limited, 2003. [Online]. Available: https://books.google.com.kw/books?id=SWbn3lBe2FcC
H. Zodpe and P. Wani, “Design and implementation of algorithm for des cryptanalysis,” 12 2012, pp. 278–282.
B. J. Saha and K. Kabi, “Digital image encryption using ecc and des with chaotic key generator,” International Journal of Engineering Research & Technology (IJERT), vol. 2, 11 2013.
P. Patil, P. Narayankar, D. Narayan, and S. M. Meena, “A comprehensive evaluation of cryptographic algorithms: Des, 3des, aes, rsa and blowfish,” Procedia Computer Science, vol. 78, pp. 617–624, 2016.
M. Panhwar, S. Ali Khuhro, G. Panhwar, and K. Ali, “Saca: A study of symmetric and asymmetric cryptographic algorithms,” IJCSNS International Journal of Computer Science and Network Security, vol. 19, no. 1, 01 2019.
C. Rahmad, K. Arai, A. Prasetyo, and N. Arizki, “Noble method for data hiding using steganography discrete wavelet transformation and cryptography triple data encryption standard: Des,” International Journal of Advanced Computer Science and Applications, vol. 9, 01 2018.
R. Patel and P. Kamboj, “Security enhancement of blowfish block cipher,” 08 2016, pp. 231–238.
E.Jeevalatha and S.SenthilMurugan, “Evolution of aes, blowfish and two fish encryption algorithm,” International Journal of Scientific and Engineering Research, vol. 9, 04 2018.
P. Gehlot, S. R. Biradar, and B. P. Singh, “Implementation of modified twofish algorithm using 128 and 192-bit keys on vhdl,” International Journal of Computer Applications, vol. 70, pp. 36–42, 2013.
B. Schneier, “The twofish encryption algorithm,” https://www.schneier.com/academic/archives/1998/12/the_twofish_encrypti.html, Dec. 1998, [Online; accessed 11 Nov 2021].
R. Bhanot and R. Hans, “A review and comparative analysis of various encryption algorithms,” International Journal of Security and Its Applications, vol. 9, no. 4, 2015.
S. S. A, A. M. George, and P. S, “The skien hash function,” International Journal of Engineering Research and Applications, vol. 3, 12 2013.
D. Bujari and E. Aribas, “Comparative analysis of block cipher modes of operation,” 11 2017.
M. Bellare, P. Rogaway, and D. Wagner, “The eax mode of operation,” in International Workshop on Fast Software Encryption. Springer, 2004, pp. 389–407.
E. B. Kavun, H. Mihajloska, and T. Yalcin, “A survey on authenticated encryption–asic designer’s perspective,” Cryptology ePrint Archive, 2019.
M. N. A. Wahid, A. K. Ali, B. Esparham, and M. Marwan, “A comparison of cryptographic algorithms: Des, 3des, aes, rsa and blowfish for guessing attacks prevention,” 2018.
N. Tyagi and A. Ganpati, “Comparative analysis of symmetric key encryption algorithms,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 8, 2014.
P. Princy, “A comparison of symmetric key algorithms des, aes, blowfish, rc4, rc6: A survey,” International Journal of Computer Science & Engineering Technology (IJCSET), vol. 6, no. 5, 2015.
M. Mathur and A. Kesarwani, “Comparison between des, 3des, rc2, rc6, blowfish and aes,” 2013.
P. Nema and M.A.Rizvi, “Critical analysis of various symmetric key cryptographic algorithms,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 3, no. 6, June 2015.
A. Nadeem and M. Y. Javed, “A performance comparison of data encryption algorithms,” International Conference on Information and Communication Technologies, pp. 84–89, 2005.
V. Vijaya, R. Ausuria, and N. Surya, “Design and implementation of threefish cipher algorithm blocks using fpga,” vol. 6, 10 2017.
L. GitHub, “Crypto.cipher package,”
https://pycryptodome.readthedocs.io/en/latest/src/cipher/cipher.html, Jun. 2014, [On- line; accessed 12 Dec 2021].
N. Ferguson, “twofish 0.3.0,” https://pypi.org/project/twofish/, Nov. 2013, [Online; accessed 12 Dec 2021].
H. Fu¨rstenau, “Pyskein 1.0 - the skein hash algorithm for python,” https://pythonhosted.org/pyskein/index.html, Aug. 2013, [Online; accessed 12 Dec 2021].
C. wiki, “Threefish,” https://www.cryptopp.com/wiki/Threefish, Sep. 2021, [Online; accessed 14 Dec 2021].