• General Description
  • NIST General Criteria for AES
  • Two fish encryption algorithm




    Download 0.87 Mb.
    bet1/5
    Sana05.03.2024
    Hajmi0.87 Mb.
    #167158
      1   2   3   4   5
    Bog'liq
    Twofish-Encryption-Algorithm-by-Horatiu-Paul-Stancu (1)
    Ilm-fan 0150, 1-modul

    TWOFISH ENCRYPTION ALGORITHM

    • CS–627: Cryptology
    • Fall 2004
    • Horatiu Paul Stancu

    Background

    • Between 1972 and 1974 NIST issued the first public request for an encryption standard. As a result DES became the accepted encryption standard. Although this algorithm was very popular, it has always been surrounded by controversy as many cryptographers objected to the “closed-door” design of the algorithm. There was also a suspicion that NSA planted a “back-door” in the algorithm, as NSA modified it before it was standardized, although none was able to prove this until now.
    • Furthermore the key length of DES became to small for acceptable commercial security, so as a interim solution Triple-DES was used for a while because it provided increased security.
    • Responding to the desire to replace DES with stronger and more reliable algorithm, NIST announced another public request for an encryption standard, called Advanced Encryption Standard(AES), in 1997.
    • Twofish is one of the candidates that made it to the final round of the AES program.

    General Description

    • 128-bit block
    • 128, 192, or 256-bit key
    • 16 rounds
    • Works in all standard modes
    • Encrypts data in:

    General Description

    • (Bruce Schneier, http://www.schneier.com/twofish-brief.html)

    General Description

    • (Bruce Schneier, http://www.schneier.com/twofish-brief.html)

    General Description

    • (Bruce Schneier, http://www.schneier.com/twofish-brief.html)

    General Description

    • Main Advantages:
    • Extensively cryptanalyzed
    • Unpatented
    • Uncopyrighted
    • Free

    NIST General Criteria for AES

    • A 128-bit symmetric block cipher.
    • Key lengths of 128 bits, 192 bits, and 256 bits.
    • No weak keys.
    • Efficiency, both on the Intel Pentium Pro and other software and hardware platforms.
    • Flexible design: e.g., accept additional key lengths; be implementable on a wide variety of platforms and applications; and be suitable for a stream cipher, hash function, and MAC.
    • Simple design, both to facilitate ease of analysis and ease of implementation.

    Download 0.87 Mb.
      1   2   3   4   5




    Download 0.87 Mb.