A study on the twofish security processor design using USB interface device

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Since most cryptographic systems are PCI type, it is not suitable for users except experts to handle security system. In particular, most security programs used have not been verified against crack and are exposed to attack of virus or hacker. In this regard, this thesis designed Twofish cryptographic algorithm that uses USB, which can be easily used by users at general computers. Users can use security system easily using USB. In addition, Twofish cryptographic algorithm with various variable key lengths can be applied to various security system. Such Twofish cryptographic algorithm can improve performance for encryption and decryption, and increase efficiency of mobile security system in addition to USB. © 2011 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Lee, S. K., Kim, S. Y., & Ra, Y. C. (2011). A study on the twofish security processor design using USB interface device. In Communications in Computer and Information Science (Vol. 206 CCIS, pp. 182–189). https://doi.org/10.1007/978-3-642-24106-2_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free