|
Two fish encryption algorithm
|
bet | 1/5 | Sana | 05.03.2024 | Hajmi | 0.87 Mb. | | #167158 |
Bog'liq Twofish-Encryption-Algorithm-by-Horatiu-Paul-Stancu (1) Ilm-fan 0150, 1-modul - CS–627: Cryptology
- Fall 2004
- Horatiu Paul Stancu
Background - Between 1972 and 1974 NIST issued the first public request for an encryption standard. As a result DES became the accepted encryption standard. Although this algorithm was very popular, it has always been surrounded by controversy as many cryptographers objected to the “closed-door” design of the algorithm. There was also a suspicion that NSA planted a “back-door” in the algorithm, as NSA modified it before it was standardized, although none was able to prove this until now.
- Furthermore the key length of DES became to small for acceptable commercial security, so as a interim solution Triple-DES was used for a while because it provided increased security.
- Responding to the desire to replace DES with stronger and more reliable algorithm, NIST announced another public request for an encryption standard, called Advanced Encryption Standard(AES), in 1997.
- Twofish is one of the candidates that made it to the final round of the AES program.
- 128-bit block
- 128, 192, or 256-bit key
- 16 rounds
- Works in all standard modes
- Encrypts data in:
General Description - (Bruce Schneier, http://www.schneier.com/twofish-brief.html)
General Description - (Bruce Schneier, http://www.schneier.com/twofish-brief.html)
General Description - (Bruce Schneier, http://www.schneier.com/twofish-brief.html)
General Description - Main Advantages:
- Extensively cryptanalyzed
- Unpatented
- Uncopyrighted
- Free
- A 128-bit symmetric block cipher.
- Key lengths of 128 bits, 192 bits, and 256 bits.
- No weak keys.
- Efficiency, both on the Intel Pentium Pro and other software and hardware platforms.
- Flexible design: e.g., accept additional key lengths; be implementable on a wide variety of platforms and applications; and be suitable for a stream cipher, hash function, and MAC.
- Simple design, both to facilitate ease of analysis and ease of implementation.
|
| |