Awny Sayed1,2, Maha Mahrous3, Enas Elgeldawi1,*
CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1723-1734, 2023, DOI:10.32604/cmc.2023.032838
- 22 September 2022
Abstract Securing digital data from unauthorized access throughout its entire lifecycle has been always a critical concern. A robust data security system should protect the information assets of any organization against cybercriminal activities. The Twofish algorithm is one of the well-known symmetric key block cipher cryptographic algorithms and has been known for its rapid convergence. But when it comes to security, it is not the preferred cryptographic algorithm to use compared to other algorithms that have shown better security. Many applications and social platforms have adopted other symmetric key block cipher cryptographic algorithms such as the… More >