Publicado:
2022-12-02Número:
Vol. 19 Núm. 1 (2022)Sección:
Actualidad TecnológicaAplicaciones actuales de los algoritmos de cifrado Blowfish - Twofish para la protección de los sistemas IoT y computación en la nube
Implementation Current applications of Blowfish - Twofish encryption algorithms for the protection of IoT systems and Cloud Computing
Palabras clave:
Twofish, Blowfish, Internet de las cosas (IoT), Computación en la nube, Seguridad, Cifrado (es).Palabras clave:
Twofish, Blowfish, Internet of Things (IOT), Cloud Computing, Security, Encryption (en).Descargas
Resumen (es)
En el presente artículo se da a conocer los conceptos fundamentales de los algoritmos de cifrado (Twofish y Blowfish) y su importancia en el manejo de la privacidad de la información, así como también las técnicas de seguridad que se han implementado por medio de estos algoritmos en el campo de la computación en la nube e Internet de las cosas (IoT).
Resumen (en)
This paper aims to introduce the fundamental concepts of encryption algorithms (Twofish and Blowfish) and their importance in information privacy management as well as the security techniques that have been implemented by means of these algorithms in the field of cloud computing and Internet of Things (IoT).
Referencias
B. Gatliff, "Encrypting data with the Blowfish algorithm - Embedded.com," Embedded.com, 2021. [Online]. Available: https://www.embedded.com/encrypting-data-with-the-blowfish-algorithm.
"Blowfish Algorithm with Examples - GeeksforGeeks," GeeksforGeeks, 2021. [Online]. Available: https://www.geeksforgeeks.org/blowfish-algorithm-with-examples/
R. Mishra and R. Mishra, "Blowfish Encryption Algorithm - Everything You Need To Know - Tech4EN," Tech4EN, 2021. [Online]. Available: https://tech4en.org/blowfish-encryption-algorithm/
O. Casas, Implementación de los cifradores de bloque Rijndael, Serpent, Mars, Twofish y RC6 para su uso en sistemas embebidos, 1st ed. Cali, Colombia: La Umbría, carretera a Pance, 2010, pp. 55-64.
M. J. Saddam, A. A. Ibrahim and A. H. Mohammed, "A Lightweight Image Encryption And Blowfish Decryption For The Secure Internet Of Things," 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), Istanbul, Turkey, 2020, pp. 1-5.
"Glosario", Ccn-cert.cni.es, 2021. [Online]. Available: https://www.ccn-cert.cni.es/publico/seriesCCN-STIC/series/400-Guias_Generales/401-glosario_abreviat uras/index.html?n=936.html
L. Sanjuan, “Criptografía I,” 2012. [Online]. Available: http://materias.fi.uba.ar/6669/alumnos/1999/aes.pdf
K. Santoso, M. Muin and M. Mahmudi, "Implementation of AES cryptography and twofish hybrid algorithms for cloud," Journal of the Gujarat Research Society, 2020.
B. T. Reddy, K. B. Chowdappa, & S. R. Reddy, "Cloud Security using Blowfish and Key Management Encryption Algorithm," International Journal of Engineering and Applied Sciences, vol. 2, no. 6, Junio de 2015.
A. Devi, B. S. Ramya, "Two fish Algorithm Implementation for lab to provide data security with predictive analysis, " International Research Journal of Engineering and Technology, vol. 4, no. 5, pp. 3033-3036, 2017
V. K. R. Gangireddy, S. Kannan, K. Subburathinam, "Implementation of enhanced blowfish algorithm in cloud environment," Journal of Ambient Intelligence and Humanized Computing, pp. 1-7, 2020.
B. Pushpa, "Hybrid Data Encryption Algorithm for Secure Medical Data Transmission in Cloud Environment," 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, pp. 329-334, 2020.
M. Suresh, M. Neema, "Hardware implementation of blowfish algorithm for the secure data transmission in Internet of Things, " Procedia technology, vol. 25, pp. 248-255, 2016.
B. T. Asare, K. Quist-Aphetsi & L. Nana, "Secure Data Exchange Between Nodes in IoT Using TwoFish and DHE," 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), Accra, Ghana, pp. 101-104, 2019.
P. Patel, R. Patel, & N. Patel, "Integrated ECC and Blowfish for smartphone security," Procedia Computer Science, vol. 78, pp. 210-216, 2016.
Cómo citar
IEEE
ACM
ACS
APA
ABNT
Chicago
Harvard
MLA
Turabian
Vancouver
Descargar cita
Visitas
Descargas
Licencia
Derechos de autor 2022 Revista Vínculos

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial 4.0.
2.png)
Este obra está bajo una licencia Creative Commons Atribución 4.0
