
Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish
Author(s) -
Wasis Haryono
Publication year - 2020
Language(s) - English
DOI - 10.32734/jocai.v4.i2-4004
Subject(s) - running key cipher , transposition cipher , computer science , block cipher , stream cipher , cbc mac , cipher , triple des , encryption , block cipher mode of operation , two square cipher , ciphertext , theoretical computer science , algorithm , computer security