A Study of Twofish Algorithm
- Aparna. K
- Jyothy Solomon
- Harini . M
- Indhumathi . V
Twofish, cryptography, Steganography, AES, cipher text, Feistel Network
Twofish is a well known encryption algorithm commonly used in cryptography and steganography. Twofish algorithm is derived from Blowfish algorithm. Twofish is a 128-bit block cipher that accepts a variable length key up to 256 bits. The cipher is a 16-round Feistel network with a bijective function made up of four key dependent 8-by-8 bit S-boxes, a fixed 4-by-4 maximum distance seperable matrix, a pseudo Hadamard transform, bitwise rotations, and a carefully designed key schedule. A fully optimized implementation encrypts on a Intel core i5 at 17.8 clock cycles per byte, and an8-bit smart card implementation encrypts at 1660 clock cycle per byte. The design of both the round function and the key schedule permits a wide variety of tradeoffs between speed, software size, key setup time, gate count and memory.
Aparna. K, Jyothy Solomon, Harini . M, Indhumathi . V. "A Study of Twofish Algorithm".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.4, Issue 2, pp.148-150, URL :https://rjwave.org/ijedr/papers/IJEDR1602023.pdf
Volume 4 Issue 2
Pages. 148-150