Skip to main content

Questions tagged [twofish]

A symmetric block-cipher algorithm with a 128-bit block size, and key sizes up to 256 bits.

1 vote
2 answers
316 views

Hamming Distance and Avalanche effect in Cryptography?

I am new to Cryptography and I know there are better ways to test a cipher's effectiveness out there but in this case I am trying to test a cryptographic algorithm's(AES,xchacha20,twofish) hamming ...
Jake's user avatar
  • 43
1 vote
1 answer
2k views

OpenSSL supports AES, Camellia, ChaCha. How about Twofish, Threefish, Serpent?

If I understood correctly, some symmetric ciphers such as AES, Camellia, ChaCha are implemented in OpenSSL (along with several older ones) but some other commonly used and proven ciphers such as ...
RocketNuts's user avatar
  • 1,387
0 votes
1 answer
182 views

Is this cumbersome strategy to produce a ridiculously strong password valid?

I'm writing something where somebody wants to have a ridiculously strong password for a file and yet be sure that he will always be able to reconstruct it. The way I have thought of this might be a ...
Nicola's user avatar
  • 369
3 votes
2 answers
785 views

Is it possible to identify a Serpent encryption key in memory?

It has been shown that AES keys that are in use can be identified in memory. This identification relies on discovering expected round keys in memory that are contained within the key schedule. My ...
learnerX's user avatar
  • 687
7 votes
1 answer
318 views

How does Twofish avoid weak keys if it uses key-dependent S-boxes?

From section 7.2.2 of the Twofish paper, the four S-boxes for the 128-bit cipher are generated with: $$\begin{align} s_0(x) &= q_1[q_0[q_0[x] \oplus s_{0,0}] \oplus s_{1,0}]\\ s_1(x) &= q_0[...
forest's user avatar
  • 15.4k
2 votes
2 answers
485 views

How secure is a system that retrieves encrypted private keys from a public database?

The system in question is one with multiple users. Each user has a password associated with their account, and each user owns several public-private keypairs. A user's private keys are encrypted using ...
ExecutionByFork's user avatar
10 votes
3 answers
3k views

Twofish fails Dieharder test

I've tested Twofish (256 bit) as follows. A lengthy pseudorandom sequence was generated and used as a key. Plaintext phrases 000000000..00, ...
Stepan's user avatar
  • 221
3 votes
2 answers
2k views

Is there a real purpose to use Twofish, Serpent or Threefish instead of AES?

I am wondering if other ciphers like Serpent or Twofish or even Threefish have really an use in real life, because AES seems to be very efficient in most situations. But for example TrueCrypt or ...
daralim's user avatar
  • 37
0 votes
1 answer
201 views

Block Ciphers with encryption speed similar to AES

What all block ciphers can achieve encryption speed similar/near to AES on general purpose computers with AES-NI enabled and disabled. Camellia seems to be near to AES, and Twofish seems to be much ...
crypt's user avatar
  • 2,449
2 votes
1 answer
190 views

How is Twofish flattening the result of Reed-Solomon MDS matrix multiplication into a 32-bit result?

I have trouble understanding how Reed-Solomon coding can produce same number of output bits than the input was. Twofish uses this technique. I've read the paper, but still can't quite understand how ...
Sam_hai's user avatar
  • 23
1 vote
3 answers
747 views

CSPRNG made out of Block Cipher running in CTR Mode?

From Definition of CSPRNG, it has two characteristics It satisfies the next-bit test. It withstands 'state compromise extensions' - part of all of the state being compromised does not allow for ...
crypt's user avatar
  • 2,449
1 vote
1 answer
976 views

Key strenth in Cipher cascades (Veracrypt)

Disclaimer : basic crypto knowledge So this is a question specificly about veracrypt , but theoreticly applies to any other encryption software which supports cipher cascades . So if you use a ...
Richard R. Matthews's user avatar
2 votes
1 answer
9k views

how secure is Twofish really?

So I heard that Twofish is much more secure than AES, because it is not vulnerable to bruteforce and only supports 256 bit. Also I heard that is not vulnerable to most side channel attacks. And ...
Richard R. Matthews's user avatar
0 votes
1 answer
1k views

Cryptographic algorithms compromised and alternatives?

After Edward Snowden's release of top secret information we have seen clues that the NIST certified crypto-algorithms like AES might be compromised. Although not as fast as AES, we prefer Twofish ...
NetCoder's user avatar
1 vote
1 answer
252 views

How secure is AES in a critical situation?

So this one is a tinfoil-hat question. It is 99 % theoretical. So we assume that I am someone who stores highly confidential information. Maybe super secret stolen goverment stuff. And I get caught ...
Richard R. Matthews's user avatar

15 30 50 per page