Statements (53)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Gnu_PG_1.4.33
gptkb:Gnu_PG_1.4.60 |
gptkbp:based_on |
Feistel network
|
gptkbp:block |
64 bits
|
gptkbp:data_privacy |
gptkb:theorem
|
gptkbp:designed_by |
gptkb:Bruce_Schneier
|
gptkbp:enforces |
gptkb:theorem
|
gptkbp:first_published |
gptkb:1993
|
https://www.w3.org/2000/01/rdf-schema#label |
Blowfish algorithm
|
gptkbp:is_implemented_in |
cryptographic libraries
|
gptkbp:is_often_used_in |
gptkb:mobile_application
|
gptkbp:is_open_source |
gptkb:theorem
|
gptkbp:is_part_of |
gptkb:currency
encryption standards |
gptkbp:is_used_in |
gptkb:theorem
gptkb:SSL/_TLS access control data protection disk encryption file encryption identity protection network security secure communications secure transactions web security secure messaging digital rights management password hashing secure email secure file transfer e-commerce security secure cloud computing mobile security data-at-rest encryption database encryption secure backups cloud storage security data-in-transit encryption Io T security VP Ns |
gptkbp:is_vulnerable_to |
related-key attacks
|
gptkbp:key |
32 to 448 bits
|
gptkbp:replaced_by |
new applications
|
gptkbp:rounds |
gptkb:16
|
gptkbp:security_features |
gptkb:theorem
|
gptkbp:speed |
DES
3 DES AES in some cases |
gptkbp:successor |
gptkb:Twofish
|
gptkbp:suitable_for |
embedded systems
new designs |