Key size for Blowfish

Specify key size for the Blowfish?

E

Expert

Verified

Blowfish takes use of key that ranges from the 32 bits to the 448 bits (one to fourteen 32-bit words). That key is used to produce the 18 32-bit sub keys and four 8*32 S-boxes consisting of total of 1024 32-bit entries. The total is 1042 32-bit values, or 4168 bytes.

   Related Questions in Computer Network Security

  • Q : Competition matrix-Michael Porters

    The competition matrix is a term used while talking about strategy development, first used by Michael E. Porter 1983. They tell about product politics in marketing for individual business fields of an enterprise to gain competition advantage. In this,

  • Q : Ip Question 4 - You have been asked to

    Question 4 - You have been asked to design an IP addressing plan for a medium size corporation, Corporation (X) converting to an IP network. The corporation currently has 88 locations but plans to expand to approximately 100 Locations within the next year. Each location should have a user network

  • Q : Elements of MIME State the various

    State the various elements of MIME?

  • Q : Distribution of secret keys to

    Specify the ways through which the secret keys may be distributed to the two communicating parties.

  • Q : Address allocation and flow mapping

    Any questions that are completed should be explained and given a general reason to why that strategy was used. Address allocation is already done and flow mapping is already completed. I just need Q2, Q4, Q5, Q6, Q7, Q8, Q9 answered.  

  • Q : Purpose of State array State the

    State the purpose of State array?

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : Secure a network perimeter How can you

    How can you secure a network perimeter? Be ensure to discuss all three of the basic access points into most networks, as well as the different types of firewalls commonly used today.

  • Q : Mono-alphabetic and Playfair cipher

    Define: a) Mono-alphabetic cipher b) Playfair cipher c) Transposition cipher

  • Q : Reasons for using PGP Specify the

    Specify the reasons for using the PGP?

©TutorsGlobe All rights reserved 2022-2023.