@incollection{, 71D6070D3EED1E0E2E2D5C4B5395E281 , author={{H.Fathima} and {H.Fathima} and {KSRMHSS}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1721316 } @book{b0, , title={{Cryptography: Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) -Schneier on Security}} , year={2015-12-31} , note={References Références Referencias 1} } @book{b1, , title={{On the Practical (In-) Security of 64-bit Block Ciphers -Collision Attacks on HTTP over TLS and OpenVPN}} , author={{ KarthikeyanBhargavan } and { GaëtanLeurent }} , year={August 2016. 2016} , publisher={ACM CCS} } @incollection{b2, , title={{Saluting the data encryption legacy}} , author={{ BruceSchneier }} , journal={{CNet. Retrieved}} , year={2004-09-27. 2015-07-22} } @book{b3, , title={{Improving the Biclique Cryptanalysis of AES}} , author={{ BiaoshuaiTao } and { & HongjunWu }} , year={2015} } @book{b4, , title={{Inside the NSA's War on Internet Security}} , author={{ Spiegel Online }} , year={28 December 2014. 4 September 2015} , address={Hamburg, Germany} }