Skip to main content

Twofish on Smart Cards

  • Conference paper
Book cover Smart Card Research and Applications (CARDIS 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1820))

Abstract

Twofish is a 128-bit block cipher with a 128-, 192-, or 256-bit key. The algorithm was designed with smart cards in mind, and can be implemented on 8-bit CPUs with only 60 bytes of RAM. A variety of implementation options allows Twofish to encrypt and decrypt quicker if more RAM is available.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.: Crypto in Europe — Markets, Law, and Policy. In: Dawson, E.P., Golić, J.D. (eds.) Cryptography: Policy and Algorithms 1995. LNCS, vol. 1029, pp. 75–90. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  2. Ferguson, N.: Upper bounds on differential characteristics in Twofish, Twofish Technical Report #1, Counterpane Systems (August 1998)

    Google Scholar 

  3. Gemplus, corporate presentation slides (1998)

    Google Scholar 

  4. Handschuh, H., Paillier, P.: Smart Card Coprocessors for Public-Key Cryptography. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol. 1820. Springer, Heidelberg (2000)

    Google Scholar 

  5. Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Side Channel Cryptanalysis of Product Ciphers. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 97–110. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  6. Kocher, P.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)

    Google Scholar 

  7. Kocher, P.: Differential Power Analysis, available online from http://www.cryptography.com/dpa/

  8. National Institute of Standards and Technology, Announcing Development of a Federal Information Standard for Advanced Encryption Standard. Federal Register 62(1), 93–94 (1997)

    Google Scholar 

  9. National Institute of Standards and Technology, Announcing Request for Candidate Algorithm Nominations for the Advanced Encryption Standard (AES) Federal Register 62(117), 48051–48058 (1997)

    Google Scholar 

  10. NIST, AES website, http://www.nist.gob/aes/

  11. Naccache, D., M’Raihi, D.: Cryptographic Smart Cards. IEEE Micro, pp. 14–24 (June 1996)

    Google Scholar 

  12. Naccache, D., M’Raihi, D.: Arithmetic Co-processors for Smart Cards: The State of the Art. In: Proceeings 1996 CARDIS Smart Card Research and Advanced Applications, CWI, pp. 39–58 (1996)

    Google Scholar 

  13. Rivest, R.: RC6 Presentation, In: First AES Candidate Conference, place, date (get this data)

    Google Scholar 

  14. Schneier, B.: The Twofish Encryption Algorithm. Dr. Dobbs Journal 23(12), 30–38 (1998)

    Google Scholar 

  15. Seuss: It One Fish, Two Fish, Red Fish, Blue Fish, Beginner Books (1960)

    Google Scholar 

  16. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Twofish: A 128-Bit Block Cipher. NIST AES Proposal, June 15 (1998)

    Google Scholar 

  17. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: On the Twofish Key Schedule. In: Proceedings of the 1998 SAC Conference. Springer, Heidelberg (1998) (to appear)

    Google Scholar 

  18. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: The Twofish Encryption Algorithm. Springer, Heidelberg (1999)

    Google Scholar 

  19. Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N.: Performance Comparison of the AES Submissions (to appear)

    Google Scholar 

  20. Schneier, B., Whiting, D.: Fast Software Encryption: Designing Encryption Algorithms for Optimal Speed on the Intel Pentium Processor. In: Fast Software Encryption, 4th International Workshop Proceedings, pp. 242–259. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  21. Whiting, D., Schneier, B.: Improved Twofish Implementations, Twofish Technical Report #3, Counterpane Systems (to appear)

    Google Scholar 

  22. Whiting, D., Wagner, D.: Empirical Verification of Twofish Key Uniqueness Properties, Twofish Technical Report #2, Counterpane Systems (September 22 1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schneier, B., Whiting, D. (2000). Twofish on Smart Cards. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_25

Download citation

  • DOI: https://doi.org/10.1007/10721064_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67923-3

  • Online ISBN: 978-3-540-44534-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics