Questions tagged [twofish]

A symmetric block-cipher algorithm with a 128-bit block size, and key sizes up to 256 bits.

Twofish is a symmetric block-cipher algorithm with a 128-bit block size, and key sizes up to 256 bits.

The Twofish block-cipher was one of the five finalists of the Advanced Encryption Standard contest, but was not selected. It is related to the earlier Blowfish block-cipher.

See the wikipedia page for more information.

40 questions
17
votes
2 answers

Twofish vs. Serpent vs. AES (or a combo)

I've seen some posts and info online, but they are from 2009, 2010, 2011 or 2012, which is 3-6 years ago, which is a very long time. So I'm looking for an up-to-date answer about which of these is the safest encryption to be used, or rather most…
Jack
  • 273
  • 1
  • 2
  • 6
10
votes
3 answers

Twofish fails Dieharder test

I've tested Twofish (256 bit) as follows. A lengthy pseudorandom sequence was generated and used as a key. Plaintext phrases 000000000..00, 00000..01, 0000...FFFFF, were generated and encoded using Twofish with the key. Ciphertexts were split in 32…
Stepan
  • 221
  • 2
  • 8
10
votes
1 answer

Why Addition Mod 32?

I was looking at the algorithm for Twofish, and I noticed that in some places a XOR is used, but in others, they use "addition modulo-32." What makes modulo-32 special? Why not always use XOR? Why not always addition mod 32?
Jack V.
  • 145
  • 1
  • 7
8
votes
1 answer

Advantage of AES(Rijndael) over Twofish and Serpent

I'm trying to figure out a suitable encryption technique and after reading a bit, I figured the current AES 128-bit encryption is suitable for what I'm trying to do. However, this is more due to the wide-range use of AES than any other factor. So I…
GamingX
  • 647
  • 2
  • 7
  • 9
8
votes
5 answers

What encryption should I use: Blowfish, Twofish, or Threefish?

The title of this thread pretty much sums up what I'm asking: what is the best encryption to use out of the three — Blowfish, Twofish, or Threefish?
Fumerian Gaming
  • 103
  • 1
  • 2
  • 5
8
votes
3 answers

Is it true that Serpent and twofish are much stronger than AES?

I heard that Serpent and Twofish are much stronger than AES, but it was chosen because it is faster. If that's true, please tell me why it is stronger. Also: is it true that Twofish and serpent are better protected from brute force attacks because…
Richard R. Matthews
  • 4,545
  • 9
  • 31
  • 49
8
votes
2 answers

Rijndael vs. Serpent vs. Twofish: General comparison

Can anyone explain (or give a link to document about) why Rijndaal won the AES, especially comparing it to other finalists (Serpent and Twofish)? What criteria were used to make decision? Or is there detailed comparison of these algorithms including…
gordon-quad
  • 183
  • 1
  • 1
  • 4
7
votes
1 answer

How does Twofish avoid weak keys if it uses key-dependent S-boxes?

From section 7.2.2 of the Twofish paper, the four S-boxes for the 128-bit cipher are generated with: $$\begin{align} s_0(x) &= q_1[q_0[q_0[x] \oplus s_{0,0}] \oplus s_{1,0}]\\ s_1(x) &= q_0[q_0[q_1[x] \oplus s_{0,1}] \oplus s_{1,1}]\\ s_2(x) &=…
forest
  • 15,626
  • 2
  • 49
  • 103
7
votes
2 answers

Combining multiple symmetric encryption algorithms - implications?

I was just wondering if I add more security by combining two or more symmetric encryption algorithms on a plain text. For example: Plaintext → AES → Twofish → Serpent Of course a different key and IV (produced with a cryptographic secure prng) is…
Chris
  • 335
  • 3
  • 7
5
votes
1 answer

Order of multiple encryption algorithms

as you can see on image above, in VeraCrypt you can select either Serpent -> Twofish -> AES or AES -> Twofish -> Serpent what's the point of those permutations? is there any difference if I use A -> B -> C or C -> B -> A combination of…
5
votes
4 answers

Which symmetric cipher is best for studying?

I would like to study a modern symmetric cipher (I have never studied a cipher before) and I was wondering which would be the best cipher for studying purposes of the following: AES (Rijndael), Blowfish, Twofish, Threefish or Serpent. Basically I am…
5
votes
2 answers

Checking a key before actually using it

I have a block of data crypted using twofish with a key of 128 bit. The data must be accessed from a GUI, the user gives the key, the block is decoded and the real data is accessed. Problem is that I need to be sure that the key is correct before…
Remo.D
  • 245
  • 1
  • 5
4
votes
1 answer

Twofish MDS and PHT

Twofish was an AES candidate and it uses $4 \times 4$ Matrix as MDS followed by a PHT. The Branch Number of MDS and PHT is 5 and 2 Respectively. from formula $Branch~Number = Minimum~of~[HammingWeight(Input) + HammingWeight(Output)]$ Now if i want…
crypt
  • 2,522
  • 22
  • 33
3
votes
0 answers

Keepass Twofish plugin security

Keepass is a well known open-source password manager program, with plugin support. One of the offered plugin is a twofish encryption mode of operation in lieu of the build-in AES algorithm (http://keepass.info/plugins.html#twofishcipher). Since I…
Ninveh
  • 738
  • 5
  • 11
3
votes
2 answers

Is it possible to identify a Serpent encryption key in memory?

It has been shown that AES keys that are in use can be identified in memory. This identification relies on discovering expected round keys in memory that are contained within the key schedule. My question is: can we, by extension, assume that the…
learnerX
  • 687
  • 1
  • 8
  • 15
1
2 3