REVIEW - The twofish encryption algorithm - a 128-bit block cipher


The twofish encryption algorithm

a 128-bit block cipher


Bruce Schneier



Wiley (1999)




Francis Glassborow


October 1999



If you want to find out about Twofish, read this book.

In the USA, the National Institute for Standards and Technology (NIST) have been looking for a replacement for the now ageing Data Encryption Standard algorithm (DES). I suspect that they thought when DES was first introduced that it would last for most of their lifetimes. However the increasing computing power available to even the private citizen makes the days of DES providing acceptable security very much numbered.

The process instigated by NIST to find AES (Advanced Encryption Standard) is a multi-round one in which candidates are eliminated and the remainder have time to refine their work. The Twofish Encryption Algorithm is one of the contenders.

As a lot hangs on becoming the successful candidate, each team spends much time trying to find weaknesses in their rivals algorithms. This is actually a desirable feature of this competition because the ultimate winner needs to be robust against attacks from hardware a couple of orders of magnitude faster than anything available today. Even the hint of a route to successfully cracking a cipher needs to be known. Ultimately other criteria will also be taken into account including the ready availability of software and experience in using the algorithm.

If you want to find out about Twofish, read this book. If you want a copy of its implementation in C go to Do not bother with this book if you are not competent in the theory of encryption algorithms.

Book cover image courtesy of Open Library.

Your Privacy

By clicking "Accept Non-Essential Cookies" you agree ACCU can store non-essential cookies on your device and disclose information in accordance with our Privacy Policy and Cookie Policy.

Current Setting: Non-Essential Cookies REJECTED

By clicking "Include Third Party Content" you agree ACCU can forward your IP address to third-party sites (such as YouTube) to enhance the information presented on this site, and that third-party sites may store cookies on your device.

Current Setting: Third Party Content EXCLUDED

Settings can be changed at any time from the Cookie Policy page.