Jump to ratings and reviews
Rate this book

The Twofish Encryption Algorithm

Rate this book
The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look
* All aspects of Twofish's design and anatomy
* Twofish performance and testing results
* Step-by-step instructions on how to use it in your systems
* Complete source code, in C, for implementing Twofish
On the companion Web site you'll
* A direct link to Counterpane Systems for updates on Twofish
* A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium
For updates on Twofish and the AES process, visit these
* www.wiley.com/compbooks/schneier
* www.counterpane.com
* www.nist.gov/aes
Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier

208 pages, Hardcover

First published March 1, 1999

1 person is currently reading
62 people want to read

About the author

John Kelsey

124 books4 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (27%)
4 stars
4 (22%)
3 stars
5 (27%)
2 stars
3 (16%)
1 star
1 (5%)
Displaying 1 - 3 of 3 reviews
Profile Image for Darren Chaker.
5 reviews
July 16, 2016
By Darren Chaker - http://darrenchaker.us/
If you're into data security, encryption, counter forensics, and/or privacy in general - encryption God Bruce Schneier explains about Two Fish Algorithm in detail. The book also goes into a detailed analysis of other encryption methods, and general background about the development of Two Fish.
Two Fish is used in multiple products and is ranked as one of the foremost algorithms in data security. You need not be a government agency, or spy to appreciate encryption - from losing a phone with 'personal' pictures, to losing vital corporate information when a laptop is taken from a coffee shop - these are instances where you wish you had your data encrypted.

This book is well detailed and simple to read. Enjoy it!
Profile Image for Nick Black.
Author 2 books892 followers
March 23, 2008
I'm not sure why the NIST AES submission in which Twofish was specified needed be printed as a $40 book. I got it for free, but that doesn't keep me from voting wtf? with two stars.

That having been said, Twofish was pretty nicely done.
Displaying 1 - 3 of 3 reviews

Can't find what you're looking for?

Get help and learn more about the design.