50
Used, New, and Out of Print Books - We Buy and Sell - Powell's Books
Cart |
|  my account  |  wish list  |  help   |  800-878-7323
Hello, | Login
MENU
  • Browse
    • New Arrivals
    • Bestsellers
    • Featured Preorders
    • Award Winners
    • Audio Books
    • See All Subjects
  • Used
  • Staff Picks
    • Staff Picks
    • Picks of the Month
    • Bookseller Displays
    • 50 Books for 50 Years
    • 25 Best 21st Century Sci-Fi & Fantasy
    • 25 PNW Books to Read Before You Die
    • 25 Books From the 21st Century
    • 25 Memoirs to Read Before You Die
    • 25 Global Books to Read Before You Die
    • 25 Women to Read Before You Die
    • 25 Books to Read Before You Die
  • Gifts
    • Gift Cards & eGift Cards
    • Powell's Souvenirs
    • Journals and Notebooks
    • socks
    • Games
  • Sell Books
  • Blog
  • Events
  • Find A Store

Don't Miss

  • Scientifically Proven Sale
  • Staff Top Fives of 2022
  • Best Books of 2022
  • Powell's Author Events
  • Oregon Battle of the Books
  • Audio Books

Visit Our Stores


Powell's Staff: New Literature in Translation: December 2022 and January 2023 (0 comment)
It may be a new year, this may be a list of new books, but our love for literature in translation hasn’t changed at all, and we are so pleased to be enthusiastically recommending these recent releases. On this list, you’ll find a Spanish novel where controversy swirls around a Coca-Cola billboard...
Read More»
  • Kelsey Ford: From the Stacks: J. M. Ledgard's Submergence (0 comment)
  • Kelsey Ford: Five Book Friday: Year of the Rabbit (1 comment)

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##

Twofish Encryption Algorithm A 128 Bit Block Cipher

by Bruce Schneier
Twofish Encryption Algorithm A 128 Bit Block Cipher

  • Comment on this title
  • Synopses & Reviews

ISBN13: 9780471353812
ISBN10: 0471353817
Condition: Standard


All Product Details

View Larger ImageView Larger Images
Ships free on qualified orders.
Add to Cart
$33.00
List Price:$55.00
Used Hardcover
Ships in 1 to 3 days
Add to Wishlist
QtyStore
1Local Warehouse

Synopses & Reviews

Publisher Comments

The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at:

* All aspects of Twofish's design and anatomy

* Twofish performance and testing results

* Step-by-step instructions on how to use it in your systems

* Complete source code, in C, for implementing Twofish

On the companion Web site you'll find:

* A direct link to Counterpane Systems for updates on Twofish

* A link to the National Institute of Science and Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium

For updates on Twofish and the AES process, visit these sites:

* www.wiley.com/compbooks/schneier

* www.counterpane.com

* www.nist.gov/aes

Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier

Synopsis

This book contains all the details about Twofish, a new information scrambling security code invented by a team led by Bruce Schneier. Twofish is among the top 5 of 15 sophisticated encoding formulas being considered by the U.S. Department of Commerce National Institute of Standards and Technology (NIST) to replace the current standard DES (Data Encryption Standard), which is too weak and slow for today's computing power. The winning method will become the new U.S. security standard for the 21(st) century; NIST will announce the winner from the submissions in early 2001.

Description

Includes bibliographical references (p. [131]-142) and index.

About the Author

BRUCE SCHNEIER is President of Counterpane Systems, a worldwide cryptography and information security consulting firm. A world-renowned expert on computer cryptography, Mr. Schneier is the inventor of Blowfish, a cryptography method built into more than 100 commercial products which continues unbroken. He is also the author of the bestselling Applied Cryptography (also available from Wiley). JOHN KELSEY, DAVID WAGNER, CHRIS HALL, and NIELS FERGUSON are well-known cryptographers and Counterpane consultants. DOUG WHITING is a security scientist with Hi/fn, a company specializing in compression technology.

Table of Contents

Twofish Design Goals.

Twofish Building Blocks.

Twofish.

Performance of Twofish.

Twofish Design Philosophy.

The Design of Twofish.

Design of the Twofish Key Schedule.

Cryptanalysis of Twofish.

Using Twofish.

Historical Remarks.

Conclusions and Further Work.

References.

Index.


3 1

What Our Readers Are Saying

Share your thoughts on this title!
Average customer rating 3 (1 comments)

`
silviani.rumagit , May 11, 2010
I want like to study twofish

Was this comment helpful? | Yes | No

report this comment




Product Details

ISBN:
9780471353812
Binding:
Hardcover
Publisher:
JOHN WILEY & SONS
Pages:
208
Height:
9.53 in.
Width:
7.65 in.
Thickness:
.67 in.
Number of Units:
1
Copyright Year:
1999
UPC Code:
2800471353814
Author:
Bruce Schneier
Author:
Niels Ferguson
Author:
David Wagner
Author:
Doug Whiting
Author:
John Kelsey
Subject:
Computer algorithms
Subject:
Data encryption.
Subject:
Data encryption (computer science)
Subject:
Computer security

Ships free on qualified orders.
Add to Cart
$33.00
List Price:$55.00
Used Hardcover
Ships in 1 to 3 days
Add to Wishlist
QtyStore
1Local Warehouse
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
  • Twitter
  • Facebook
  • Pinterest
  • Instagram

  • Help
  • Guarantee
  • My Account
  • Careers
  • About Us
  • Security
  • Wish List
  • Partners
  • Contact Us
  • Shipping
  • Transparency ACT MRF
  • Sitemap
  • © 2023 POWELLS.COM Terms

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##