Blowfish algorithm

GPTKB entity

Statements (53)
Predicate Object
gptkbp:instance_of gptkb:currency
gptkbp:bfsLayer 4
gptkbp:bfsParent gptkb:Gnu_PG_1.4.33
gptkb:Gnu_PG_1.4.60
gptkbp:based_on Feistel network
gptkbp:block 64 bits
gptkbp:data_privacy gptkb:theorem
gptkbp:designed_by gptkb:Bruce_Schneier
gptkbp:enforces gptkb:theorem
gptkbp:first_published gptkb:1993
https://www.w3.org/2000/01/rdf-schema#label Blowfish algorithm
gptkbp:is_implemented_in cryptographic libraries
gptkbp:is_often_used_in gptkb:mobile_application
gptkbp:is_open_source gptkb:theorem
gptkbp:is_part_of gptkb:currency
encryption standards
gptkbp:is_used_in gptkb:theorem
gptkb:SSL/_TLS
access control
data protection
disk encryption
file encryption
identity protection
network security
secure communications
secure transactions
web security
secure messaging
digital rights management
password hashing
secure email
secure file transfer
e-commerce security
secure cloud computing
mobile security
data-at-rest encryption
database encryption
secure backups
cloud storage security
data-in-transit encryption
Io T security
VP Ns
gptkbp:is_vulnerable_to related-key attacks
gptkbp:key 32 to 448 bits
gptkbp:replaced_by new applications
gptkbp:rounds gptkb:16
gptkbp:security_features gptkb:theorem
gptkbp:speed DES
3 DES
AES in some cases
gptkbp:successor gptkb:Twofish
gptkbp:suitable_for embedded systems
new designs