Statements (62)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:blockade
|
gptkbp:availability |
open source
|
gptkbp:available_in |
public domain
|
gptkbp:block |
128 bits
|
gptkbp:cipher_mode |
supports various modes of operation
|
gptkbp:cryptanalysis |
resistant to differential and linear cryptanalysis
|
gptkbp:cryptographic_strength |
strong against differential and linear cryptanalysis
|
gptkbp:designed_by |
gptkb:Bruce_Schneier
|
gptkbp:designed_for |
high security and performance
|
gptkbp:developed_by |
gptkb:Counterpane_Labs
|
gptkbp:has_programs |
gptkb:crypt
|
https://www.w3.org/2000/01/rdf-schema#label |
Twofish
|
gptkbp:input_output |
128 bits
|
gptkbp:invention |
not patented
|
gptkbp:is |
not patented
used in various applications used in secure web applications used in secure messaging applications a well-known algorithm in the field of cryptography a finalist in the AES competition a popular choice for file encryption a successor to Blowfish a symmetric encryption algorithm a versatile encryption method a widely studied cipher an alternative to AES in some applications considered secure against known attacks implemented in many cryptographic libraries used in Io T security solutions used in cloud storage encryption used in database encryption solutions used in digital rights management (DRM) systems used in disk encryption software used in mobile device encryption used in secure backup solutions used in secure email applications used in secure file transfer protocols a recommended algorithm for secure data transmission used in VPNs and secure communications |
gptkbp:is_adopted_by |
NIST for AES competition
|
gptkbp:is_compared_to |
gptkb:AES
|
gptkbp:is_implemented_in |
software and hardware
|
gptkbp:key |
128, 192, or 256 bits
|
gptkbp:key_schedule |
complex key schedule
|
gptkbp:notable_feature |
flexible key length
|
gptkbp:performance |
fast on 32-bit processors
|
gptkbp:published_in |
gptkb:1998
|
gptkbp:related_to |
gptkb:crypt
gptkb:AES_competition |
gptkbp:resolution |
128 bits
|
gptkbp:rounds |
gptkb:16
|
gptkbp:security |
high
|
gptkbp:structure |
Feistel network
|
gptkbp:successor |
gptkb:Blowfish
|
gptkbp:used_in |
encryption applications
|
gptkbp:uses |
Feistel network
key whitening |
gptkbp:uses_key_schedule |
key-dependent S-boxes
|
gptkbp:bfsParent |
gptkb:Gnu_PG_1.4.36
gptkb:Gnu_PG_1.4.71 gptkb:Gnu_PG_1.4.74 |
gptkbp:bfsLayer |
6
|