This text describes Twofish, an algorithm meeting the requirements put forth by the NIST (National Institute of Standards and Technology) for the Advanced Encryption Standard. It also describes the design goals for Twofish, and the building blocks and general design of the cipher.
"synopsis" may belong to another edition of this title.
The first and only guide to one of today′s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8–bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at:
∗ All aspects of Twofish′s design and anatomy
∗ Twofish performance and testing results
∗ Step–by–step instructions on how to use it in your systems
∗ Complete source code, in C, for implementing Twofish
On the companion Web site you′ll find:
∗ A direct link to Counterpane Systems for updates on Twofish
∗ A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium
For updates on Twofish and the AES process, visit these sites:
∗ www.wiley.com/compbooks/schneier
∗ www.counterpane.com
∗ www.nist.gov/aes
Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier
Bruce Schneier is "one of the world s foremost security experts" (Wired) and the best-selling author of thirteen books. He speaks and writes regularly for major media venues, and his newsletter and blog reach more than 250,000 people worldwide. He is a Fellow at the Berkman Center for Internet and Society at Harvard Law School and the CTO of Resilient Systems, Inc.
"About this title" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want