1234567891011121314151617181920212223242526272829303132333435363738394041424344454647 |
- <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
- "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
- <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
- <head>
- <meta http-equiv="content-type" content="text/html; charset=utf-8" />
- <title>VeraCrypt - Free Open source disk encryption with strong security for the Paranoid</title>
- <meta name="description" content="VeraCrypt is free open-source disk encryption software for Windows, Mac OS X and Linux. In case an attacker forces you to reveal the password, VeraCrypt provides plausible deniability. In contrast to file encryption, data encryption performed by VeraCrypt is real-time (on-the-fly), automatic, transparent, needs very little memory, and does not involve temporary unencrypted files."/>
- <meta name="keywords" content="encryption, security"/>
- <link href="styles.css" rel="stylesheet" type="text/css" />
- </head>
- <body>
- <div>
- <a href="Documentation.html"><img src="VeraCrypt128x128.png" alt="VeraCrypt"/></a>
- </div>
- <div id="menu">
- <ul>
- <li><a href="Home.html">Home</a></li>
- <li><a href="/code/">Source Code</a></li>
- <li><a href="Downloads.html">Downloads</a></li>
- <li><a class="active" href="Documentation.html">Documentation</a></li>
- <li><a href="Donation.html">Donate</a></li>
- <li><a href="https://sourceforge.net/p/veracrypt/discussion/" target="_blank">Forums</a></li>
- </ul>
- </div>
- <div>
- <p>
- <a href="Documentation.html">Documentation</a>
- <img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
- <a href="Encryption%20Algorithms.html">Encryption Algorithms</a>
- <img src="arrow_right.gif" alt=">>" style="margin-top: 5px">
- <a href="Twofish.html">Twofish</a>
- </p></div>
- <div class="wikidoc">
- <h1>Twofish</h1>
- <div style="text-align:left; margin-top:19px; margin-bottom:19px; padding-top:0px; padding-bottom:0px">
- <p>Designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson; published in 1998. It uses a 256-bit key and 128-bit block and operates in XTS mode (see the section
- <a href="Modes%20of%20Operation.html"><em>Modes of Operation</em></a>). Twofish was one of the AES finalists. This cipher uses key- dependent S-boxes. Twofish may be viewed as a collection of 2128 different cryptosystems,
- where 128 bits derived from a 256-bit key control the selection of the cryptosystem [4]. In [13], the Twofish team asserts that key-dependent S-boxes constitute a form of security margin against unknown attacks [4].</p>
- <p> </p>
- <p><a href="Cascades.html" style="text-align:left; color:#0080c0; text-decoration:none; font-weight:bold.html">Next Section >></a></p>
- </div>
- </div><div class="ClearBoth"></div></body></html>
|