- Twofish
Infobox block cipher
name = Twofish
caption = The Twofish algorithm
designers =Bruce Schneier
publish date = 1998
derived from = Blowfish,SAFER , Square
derived to =
related to =
certification =AES finalist
key size = 128, 192 or 256 bits
block size = 128 bits
structure =Feistel network
rounds = 16
cryptanalysis =Truncated differential cryptanalysis requiring roughly 251 chosen plaintexts. cite paper
author=Shiho Moriai, Yiqun Lisa Yin
title=Cryptanalysis of Twofish (II)
publisher=
date=2000
url=http://www.schneier.com/twofish-analysis-shiho.pdf
format=PDF
accessdate=2006-08-13 ] Incryptography , Twofish is a symmetric keyblock cipher with a block size of 128bit s andkey size s up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but was not selected for standardisation. Twofish is related to the earlier block cipher Blowfish.Twofish's distinctive features are the use of pre-computed key-dependent S-boxes, and a relatively complex
key schedule . One half of an n-bit key is used as the actual encryption key and the other half of the n-bit key is used to modify the encryption algorithm (key-dependent S-boxes). Twofish borrows some elements from other designs; for example, thepseudo-Hadamard transform (PHT) from theSAFER family of ciphers. Twofish uses the same Feistel structure as DES.On most
software platforms Twofish is slightly slower thanRijndael (the chosen algorithm forAdvanced Encryption Standard ) for 128-bit keys, but somewhat faster for 256-bit keys.cite paper
author=Bruce Schneier, Doug Whiting
title=A Performance Comparison of the Five AES Finalists
date=2000-04-07
url=http://www.schneier.com/paper-aes-comparison.html
format=PDF /PostScript
accessdate=2006-08-13]Twofish was designed by
Bruce Schneier , John Kelsey,Doug Whiting ,David Wagner , Chris Hall, andNiels Ferguson ; the "extended Twofish team" who met to perform further cryptanalysis of Twofish and other AES contest entrants includedStefan Lucks ,Tadayoshi Kohno , andMike Stay .The Twofish cipher has not been
patent ed and thereference implementation has been placed in thepublic domain . As a result, the Twofish algorithm is free for anyone to use without any restrictions whatsoever. However, Twofish has seen less widespread usage than Blowfish, which has been available for a longer period of time.Cryptanalysis
As of
2008 , the best published cryptanalysis on the Twofish block cipher is atruncated differential cryptanalysis of the full 16-round version. The paper claims that the probability of truncated differentials is 2-57.3 per block and that it will take roughly 251 chosen plaintexts (32PiB worth of data) to find a good pair of truncated differentials.Bruce Schneier responds in a 2005 blog entry that this paper does not present a full cryptanalytic attack, but only some hypothesized differential characteristics: "But even from a theoretical perspective, Twofish isn't even remotely broken. There have been no extensions to these results since they were published" in 2000.cite web
last = Schneier
first = Bruce
authorlink = Bruce Schneier
title = Twofish Cryptanalysis Rumors
work =
publisher = Schneier on Security blog
date = 2005-11-23
url = http://www.schneier.com/blog/archives/2005/11/twofish_cryptan.html
accessdate = 2006-11-28]References
* cite paper
author=Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson
title=The Twofish Encryption Algorithm
date=1998-06-15
url=http://www.schneier.com/paper-twofish-paper.html
format=PDF /PostScript
accessdate=2007-03-04
* cite book
author = Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson
title = The Twofish Encryption Algorithm: A 128-Bit Block Cipher
publisher =John Wiley & Sons
date = 1999-03-22
location =New York City
isbn = 0-471-35381-7ee also
*
Advanced Encryption Standard
*Data Encryption Standard External links
* [http://www.schneier.com/twofish.html Twofish web page] with full specifications, free source code, and other Twofish resources.
* [http://groups.google.com/group/sci.crypt/browse_thread/thread/7834ad13db22e207/6f6e157149330057 David Wagner's sci.crypt post recommending AES over Twofish ] — Wagner was one of the designers of Twofish.
* [http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html#Twofish SCAN's entry for Twofish]
* [http://www.schneier.com/twofish-products.html] List of products using TwoFish
Wikimedia Foundation. 2010.