Abstract
Twofish is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we briefly review the structure of Twofish, and then discuss the key schedule of Twofish, and its resistance to attack. We close with some open questions on the security of Twofish’s key schedule.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Anonymous, “this looked like it might be interesting,” sci.crypt Usenet posting, 9 Aug 1995.
I. Ben-Aroya and E. Biham, “Differential Cryptanalysis of Lucifer,” Advances in Cryptology — CRYPTO’ 93 Proceedings, Springer-Verlag, 1994, pp. 187–199.
E. Biham, “New Types of Cryptanalytic Attacks Using Related Keys,” Journal of Cryptology, v. 7, n. 4, 1994, pp. 229–246.
E. Biham, “On Matsui’s Linear Cryptanalysis,” Advances in Cryptology — EUROCRYPT’ 94 Proceedings, Springer-Verlag, 1995, pp. 398–412.
J. Daemen, R. Govaerts, and J. Vandewalle, “Weak Keys for IDEA,” Advances in Cryptology — EUROCRYPT’ 93 Proceedings, Springer-Verlag, 1994, pp. 159–167.
J. Daemen, R. Govaerts, and J. Vandewalle, “A New Approach to Block Cipher Design,” Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 18–32.
P. Hawkes, “Differential-Linear Weak Key Classes of IDEA,” Advances in Cryptology — EUROCRYPT’ 98 Proceedings, Springer-Verlag, 1998, pp. 112–126.
J. Kelsey, B. Schneier, and D. Wagner, “Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES,” Advances in Cryptology — CRYPTO’ 96 Proceedings, Springer-Verlag, 1996, pp. 237–251.
J. Kelsey, B. Schneier, and D. Wagner, “Related-Key Cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA,” Information and Communications Security, First International Conference Proceedings, Springer-Verlag, 1997, pp. 203–207.
National Institute of Standards and Technology, “Announcing Development of a Federal Information Standard for Advanced Encryption Standard,” Federal Register, v. 62, n. 1, 2 Jan 1997, pp. 93–94.
National Institute of Standards and Technology, “Announcing Request for Candidate Algorithm Nominations for the Advanced Encryption Standard (AES),” Federal Register, v. 62, n. 117, 12 Sep 1997, pp. 48051–48058.
D. Wagner, “Cryptanalysis of S-1,” sci.crypt Usenet posting, 27 Aug 1995.
G. Yuval, “Reinventing the Travois: Encrytion/MAC in 30 ROM Bytes,” Fast Software Encryption, 4th International Workshop Proceedings, Springer-Verlag, 1997, pp. 205–209.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, C., Ferguson, N. (1999). On the Twofish Key Schedule. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_3
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive