This text describes Twofish, an algorithm meeting the requirements put forth by the NIST (National Institute of Standards and Technology) for the Advanced Encryption Standard. It also describes the design goals for Twofish, and the building blocks and general design of the cipher.
Bruce Schneier is the Yoda of crpytography and information security, if you've heard him there's no need to ask anyone else. This book would probably only appeal to the genuinely avid crypto fan, its Greek to anyone else. It is a thorough exposition of the making of the Twofish cypher, the latest attempt to secure information as absolutely as possible. You must be well versed in cryptography to get anything out of the work.
A important book to decipher
Published by Thriftbooks.com User , 23 years ago
This book is not a how-to-do thing. You will learn why this cypher was created, how it was created it all the details. Not an introductory book. But very worth to who ever want to enter modern applied cryptographic field.
Official Discription by the people that developed it.
Published by Thriftbooks.com User , 25 years ago
This is the official discription of the Twofish encryption algorithm by the people that developed it. The book gives the direct discription of what they have done, *PLUS* the reasons behind the choices that they made, and the considerations that were involved. The book has a readable style, and covers this algorithm in greater detail than I've ever seen one covered before. This book is a must for anyone planning to implement the algorithm.This book assumes that you know something of Cryptography, it would not be a good introduction to that topic. (However the main author's book "Applied Cryptography" serves that function well)
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.