Jump to ratings and reviews
Rate this book

The Twofish Encryption Algorithm

Rate this book
This text describes Twofish, an algorithm meeting the requirements put forth by the NIST (National Institute of Standards and Technology) for the Advanced Encryption Standard. It also describes the design goals for Twofish, and the building blocks and general design of the cipher.

200 pages, Paperback

First published March 1, 1999

1 person is currently reading
62 people want to read

About the author

David Wagner

11 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (27%)
4 stars
4 (22%)
3 stars
5 (27%)
2 stars
3 (16%)
1 star
1 (5%)
Displaying 1 - 3 of 3 reviews
Profile Image for Darren Chaker.
5 reviews
July 16, 2016
By Darren Chaker - http://darrenchaker.us/
If you're into data security, encryption, counter forensics, and/or privacy in general - encryption God Bruce Schneier explains about Two Fish Algorithm in detail. The book also goes into a detailed analysis of other encryption methods, and general background about the development of Two Fish.
Two Fish is used in multiple products and is ranked as one of the foremost algorithms in data security. You need not be a government agency, or spy to appreciate encryption - from losing a phone with 'personal' pictures, to losing vital corporate information when a laptop is taken from a coffee shop - these are instances where you wish you had your data encrypted.

This book is well detailed and simple to read. Enjoy it!
Profile Image for Nick Black.
Author 2 books910 followers
March 23, 2008
I'm not sure why the NIST AES submission in which Twofish was specified needed be printed as a $40 book. I got it for free, but that doesn't keep me from voting wtf? with two stars.

That having been said, Twofish was pretty nicely done.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.