Table of Contents
Introduction to Twofish
Background Information
Basic Features
Overall structure
The F Function
The G Function
Key Generation
Me, Mo and S
The h Function
Permutation q0 and q1
Design issues - Confusion and Diffusion
General Performance
Performance Comparison
Diffusion performance
Security
Conclusions
|
Author: Margaret Martonosi
|