Paper Title

A Study of Twofish Algorithm

Authors

  • Aparna. K
  • Jyothy Solomon
  • Harini . M
  • Indhumathi . V

Keywords

Twofish, cryptography, Steganography, AES, cipher text, Feistel Network

Abstract

Twofish is a well known encryption algorithm commonly used in cryptography and steganography. Twofish algorithm is derived from Blowfish algorithm. Twofish is a 128-bit block cipher that accepts a variable length key up to 256 bits. The cipher is a 16-round Feistel network with a bijective function made up of four key dependent 8-by-8 bit S-boxes, a fixed 4-by-4 maximum distance seperable matrix, a pseudo Hadamard transform, bitwise rotations, and a carefully designed key schedule. A fully optimized implementation encrypts on a Intel core i5 at 17.8 clock cycles per byte, and an8-bit smart card implementation encrypts at 1660 clock cycle per byte. The design of both the round function and the key schedule permits a wide variety of tradeoffs between speed, software size, key setup time, gate count and memory.

Article Type

Published

How To Cite

Aparna. K, Jyothy Solomon, Harini . M, Indhumathi . V. "A Study of Twofish Algorithm".INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH ISSN:2321-9939, Vol.4, Issue 2, pp.148-150, URL :https://rjwave.org/ijedr/papers/IJEDR1602023.pdf

Issue

Volume 4 Issue 2 

Pages. 148-150

Article Preview