Statements (44)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:block |
128 bits
|
gptkbp:cryptanalysis |
resistant to differential cryptanalysis
resistant to linear cryptanalysis |
gptkbp:designed_by |
gptkb:Bruce_Schneier
|
gptkbp:has_programs |
symmetric key encryption
|
https://www.w3.org/2000/01/rdf-schema#label |
Twofish encryption
|
gptkbp:input_output |
64 bytes
|
gptkbp:is_implemented_in |
software and hardware
|
gptkbp:is_standardized_by |
gptkb:NIST
|
gptkbp:key |
128, 192, or 256 bits
|
gptkbp:key_schedule |
gptkb:complex
|
gptkbp:license |
public domain
|
gptkbp:notable_feature |
high throughput
easy to implement flexible design supports multiple platforms variable key length used in secure messaging used in VPNs used in disk encryption used in cloud storage encryption used in secure communications high security margin good performance on large devices good performance on small devices suitable for hardware implementation suitable for software implementation used in database encryption used in email encryption used in file encryption |
gptkbp:performance |
gptkb:fast
|
gptkbp:related_to |
gptkb:Blowfish
|
gptkbp:resolution |
64 bytes
|
gptkbp:rounds |
gptkb:16
|
gptkbp:security |
high
|
gptkbp:structure |
Feistel network
|
gptkbp:successor |
gptkb:AES
|
gptkbp:used_in |
cryptographic applications
|
gptkbp:uses |
substitution-permutation network
|
gptkbp:year_established |
gptkb:1998
|
gptkbp:bfsParent |
gptkb:Kee_Pass_1.x
gptkb:Kee_Pass_2.x |
gptkbp:bfsLayer |
6
|