The Twofish Encryption Algorithm - A 128-Bit Block Cipher (1999)
Front Cover Book Details
Author
Bruce Schneier
John Kelsey
Doug Whiting
David Wagner
Chris Hall
Niels Ferguson
Genre Cryptology
Publication Date 1999
Format Hardcover (250 x mm)
Publisher John Wiley & Sons
Language English
Plot
Back Cover Copy
The first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at:

All aspects of Twofish’s design and anatomy
Twofish performance and testing results
Step-by-step instructions on how to use it in your systems
Complete source code, in C, for implementing Twofish
On the companion Web site you’ll find:
A direct link to Counterpane Systems for updates on Twofish
A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium
For updates on Twofish and the AES process, visit these sites:
www.wiley.com/compbooks/schneier
www.counterpane.com
www.nist.gov/aes
Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier

About the Author
BRUCE SCHNEIER is President of Counterpane Systems, a worldwide cryptography and information security consulting firm. A world-renowned expert on computer cryptography, Mr. Schneier is the inventor of Blowfish, a cryptography method built into more than 100 commercial products which continues unbroken. He is also the author of the bestselling Applied Crypto-graphy (also available from Wiley). J. JOHN KELSEY, DAVID WAGNER, CHRIS HALL, and NIELS FERGUSON are well-known cryptographers and Counterpane consultants. DOUG WHITING is a security scientist with Hi/fn, a company specializing in compression technology.

From the Publisher
A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: all aspects of Twofish's design and anatomy, twofish performance and testing results, step-by-step instructions on how to use it in your systems, and complete source code, in C, for implementing Twofish.

Annotation
In 1997, the National Institute of Standards (NIST) launched a search for the Advanced Encryption Standard (AES), which is expected to replace currently used encryption algorithms. The Twofish encryption algorithm was one of the fifteen accepted in the first round of evaluations. Geared toward cryptography professionals, this guide is written by the team that developed Twofish. It details its design, use and cryptanalysis.
Personal Details
Collection Status Not In Collection
Store Border's
Location quarto
Purchase Price $60.00
Purchase Date 2000
Condition Fine
Index 456
Owner Paulo Mendes
Read It No
Links URL
Collection # 90115
Product Details
LoC Classification QA76.9.A25 T85 1999
Dewey 005.8/2 21
ISBN 0471353817
Edition 01
Printing 1
Paper Type acid-free
Country USA
Cover Price $60.00
Nr of Pages 202
First Edition Yes
Rare No
Notes
Includes bibliographical references (p. [131]-142) and index.