This text describes Twofish, an algorithm meeting the requirements put forth by the NIST (National Institute of Standards and Technology) for the Advanced Encryption Standard. It also describes the design goals for Twofish, and the building blocks and general design of the cipher.
By Darren Chaker - http://darrenchaker.us/ If you're into data security, encryption, counter forensics, and/or privacy in general - encryption God Bruce Schneier explains about Two Fish Algorithm in detail. The book also goes into a detailed analysis of other encryption methods, and general background about the development of Two Fish. Two Fish is used in multiple products and is ranked as one of the foremost algorithms in data security. You need not be a government agency, or spy to appreciate encryption - from losing a phone with 'personal' pictures, to losing vital corporate information when a laptop is taken from a coffee shop - these are instances where you wish you had your data encrypted.
This book is well detailed and simple to read. Enjoy it!
I'm not sure why the NIST AES submission in which Twofish was specified needed be printed as a $40 book. I got it for free, but that doesn't keep me from voting wtf? with two stars.
That having been said, Twofish was pretty nicely done.