Questions tagged [twofish]
A symmetric block-cipher algorithm with a 128-bit block size, and key sizes up to 256 bits.
40
questions
1
vote
2
answers
316
views
Hamming Distance and Avalanche effect in Cryptography?
I am new to Cryptography and I know there are better ways to test a cipher's effectiveness out there but in this case I am trying to test a cryptographic algorithm's(AES,xchacha20,twofish) hamming ...
1
vote
1
answer
2k
views
OpenSSL supports AES, Camellia, ChaCha. How about Twofish, Threefish, Serpent?
If I understood correctly, some symmetric ciphers such as AES, Camellia, ChaCha are implemented in OpenSSL (along with several older ones) but some other commonly used and proven ciphers such as ...
0
votes
1
answer
182
views
Is this cumbersome strategy to produce a ridiculously strong password valid?
I'm writing something where somebody wants to have a ridiculously strong password for a file and yet be sure that he will always be able to reconstruct it. The way I have thought of this might be a ...
3
votes
2
answers
785
views
Is it possible to identify a Serpent encryption key in memory?
It has been shown that AES keys that are in use can be identified in memory. This identification relies on discovering expected round keys in memory that are contained within the key schedule.
My ...
7
votes
1
answer
318
views
How does Twofish avoid weak keys if it uses key-dependent S-boxes?
From section 7.2.2 of the Twofish paper, the four S-boxes for the 128-bit cipher are generated with:
$$\begin{align}
s_0(x) &= q_1[q_0[q_0[x] \oplus s_{0,0}] \oplus s_{1,0}]\\
s_1(x) &= q_0[...
2
votes
2
answers
485
views
How secure is a system that retrieves encrypted private keys from a public database?
The system in question is one with multiple users. Each user has a password associated with their account, and each user owns several public-private keypairs. A user's private keys are encrypted using ...
10
votes
3
answers
3k
views
Twofish fails Dieharder test
I've tested Twofish (256 bit) as follows. A lengthy pseudorandom sequence was generated and used as a key. Plaintext phrases 000000000..00, ...
3
votes
2
answers
2k
views
Is there a real purpose to use Twofish, Serpent or Threefish instead of AES?
I am wondering if other ciphers like Serpent or Twofish or even Threefish have really an use in real life, because AES seems to be very efficient in most situations.
But for example TrueCrypt or ...
0
votes
1
answer
201
views
Block Ciphers with encryption speed similar to AES
What all block ciphers can achieve encryption speed similar/near to AES on general purpose computers with AES-NI enabled and disabled.
Camellia seems to be near to AES, and Twofish seems to be much ...
2
votes
1
answer
190
views
How is Twofish flattening the result of Reed-Solomon MDS matrix multiplication into a 32-bit result?
I have trouble understanding how Reed-Solomon coding can produce same number of output bits than the input was.
Twofish uses this technique. I've read the paper, but still can't quite understand how ...
1
vote
3
answers
747
views
CSPRNG made out of Block Cipher running in CTR Mode?
From Definition of CSPRNG, it has two characteristics
It satisfies the next-bit test.
It withstands 'state compromise extensions' - part of all of the state being compromised does not allow for ...
1
vote
1
answer
976
views
Key strenth in Cipher cascades (Veracrypt)
Disclaimer : basic crypto knowledge
So this is a question specificly about veracrypt , but theoreticly applies to any other encryption software which supports cipher cascades .
So if you use a ...
2
votes
1
answer
9k
views
how secure is Twofish really?
So I heard that Twofish is much more secure than AES, because it is not vulnerable to bruteforce and only supports 256 bit.
Also I heard that is not vulnerable to most side channel attacks.
And ...
0
votes
1
answer
1k
views
Cryptographic algorithms compromised and alternatives?
After Edward Snowden's release of top secret information we have seen clues that the NIST certified crypto-algorithms like AES might be compromised.
Although not as fast as AES, we prefer Twofish ...
1
vote
1
answer
252
views
How secure is AES in a critical situation?
So this one is a tinfoil-hat question.
It is 99 % theoretical.
So we assume that I am someone who stores highly confidential information. Maybe super secret stolen goverment stuff. And I get caught ...