Statements (64)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:block |
64 bits
|
gptkbp:designed_by |
gptkb:Bruce_Schneier
|
gptkbp:first_published |
gptkb:1993
|
https://www.w3.org/2000/01/rdf-schema#label |
Blowfish encryption
|
gptkbp:is_implemented_in |
gptkb:Java
gptkb:C++ gptkb:software gptkb:Library gptkb:C# gptkb:LEGO_set gptkb:item gptkb:chess_match gptkb:Perl |
gptkbp:is_open_source |
gptkb:theorem
|
gptkbp:is_part_of |
gptkb:currency
data integrity data confidentiality data security network security secure applications secure data storage secure networks secure storage symmetric encryption secure transactions block ciphers data integrity checks secure messaging cryptographic protocols information security secure data transmission encryption algorithms secure systems secure data encryption secure protocols secure file transfer data authenticity secure data exchange secure data processing secure data handling secure communications channels secure computing secure data transmission protocols secure data management |
gptkbp:is_used_in |
data protection
disk encryption file encryption secure communications password storage VP Ns |
gptkbp:is_vulnerable_to |
brute-force attacks
|
gptkbp:key |
32 to 448 bits
|
gptkbp:network |
gptkb:theorem
|
gptkbp:replaced_by |
gptkb:AES
|
gptkbp:rounds |
gptkb:16
|
gptkbp:security_features |
gptkb:theorem
|
gptkbp:speed |
DES
|
gptkbp:successor |
gptkb:Twofish
|
gptkbp:suitable_for |
embedded systems
new applications |
gptkbp:bfsParent |
gptkb:Open_VPN_server
gptkb:Open_VPN |
gptkbp:bfsLayer |
4
|