This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
A Study of Twofish Algorithm
Authors
  Aparna. K,  Jyothy Solomon,  Harini . M,  Indhumathi . V
Abstract
Twofish is a well known encryption algorithm commonly used in cryptography and steganography. Twofish algorithm is derived from Blowfish algorithm. Twofish is a 128-bit block cipher that accepts a variable length key up to 256 bits. The cipher is a 16-round Feistel network with a bijective function made up of four key dependent 8-by-8 bit S-boxes, a fixed 4-by-4 maximum distance seperable matrix, a pseudo Hadamard transform, bitwise rotations, and a carefully designed key schedule. A fully optimized implementation encrypts on a Intel core i5 at 17.8 clock cycles per byte, and an8-bit smart card implementation encrypts at 1660 clock cycle per byte. The design of both the round function and the key schedule permits a wide variety of tradeoffs between speed, software size, key setup time, gate count and memory.
Keywords- Twofish, cryptography, Steganography, AES, cipher text, Feistel Network
Publication Details
Unique Identification Number - IJEDR1602023Page Number(s) - 148-150Pubished in - Volume 4 | Issue 2 | April 2016DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  Aparna. K,  Jyothy Solomon,  Harini . M,  Indhumathi . V,   "A Study of Twofish Algorithm", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.4, Issue 2, pp.148-150, April 2016, Available at :http://www.ijedr.org/papers/IJEDR1602023.pdf
Article Preview
|
|
||||||
|