Twofish

GPTKB entity

Statements (62)
Predicate Object
gptkbp:instance_of gptkb:blockade
gptkbp:availability open source
gptkbp:available_in public domain
gptkbp:block 128 bits
gptkbp:cipher_mode supports various modes of operation
gptkbp:cryptanalysis resistant to differential and linear cryptanalysis
gptkbp:cryptographic_strength strong against differential and linear cryptanalysis
gptkbp:designed_by gptkb:Bruce_Schneier
gptkbp:designed_for high security and performance
gptkbp:developed_by gptkb:Counterpane_Labs
gptkbp:has_programs gptkb:crypt
https://www.w3.org/2000/01/rdf-schema#label Twofish
gptkbp:input_output 128 bits
gptkbp:invention not patented
gptkbp:is not patented
used in various applications
used in secure web applications
used in secure messaging applications
a well-known algorithm in the field of cryptography
a finalist in the AES competition
a popular choice for file encryption
a successor to Blowfish
a symmetric encryption algorithm
a versatile encryption method
a widely studied cipher
an alternative to AES in some applications
considered secure against known attacks
implemented in many cryptographic libraries
used in Io T security solutions
used in cloud storage encryption
used in database encryption solutions
used in digital rights management (DRM) systems
used in disk encryption software
used in mobile device encryption
used in secure backup solutions
used in secure email applications
used in secure file transfer protocols
a recommended algorithm for secure data transmission
used in VPNs and secure communications
gptkbp:is_adopted_by NIST for AES competition
gptkbp:is_compared_to gptkb:AES
gptkbp:is_implemented_in software and hardware
gptkbp:key 128, 192, or 256 bits
gptkbp:key_schedule complex key schedule
gptkbp:notable_feature flexible key length
gptkbp:performance fast on 32-bit processors
gptkbp:published_in gptkb:1998
gptkbp:related_to gptkb:crypt
gptkb:AES_competition
gptkbp:resolution 128 bits
gptkbp:rounds gptkb:16
gptkbp:security high
gptkbp:structure Feistel network
gptkbp:successor gptkb:Blowfish
gptkbp:used_in encryption applications
gptkbp:uses Feistel network
key whitening
gptkbp:uses_key_schedule key-dependent S-boxes
gptkbp:bfsParent gptkb:Gnu_PG_1.4.36
gptkb:Gnu_PG_1.4.71
gptkb:Gnu_PG_1.4.74
gptkbp:bfsLayer 6