The Twofish Encryption Algorithm: A 128Bit Block Cipher

The Twofish Encryption Algorithm: A 128Bit Block Cipher

In Stock
SKU: SONG0471353817
Brand: Wiley
Condition: Used
Regular price$64.55
Quantity
Add to wishlist
Add to compare
Sold by Ergodebooks, an authorized reseller.

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

The First And Only Guide To One Of Today'S Most Important New Cryptography Algorithms The Twofish Encryption Algorithm A Symmetric Block Cipher That Accepts Keys Of Any Length, Up To 256 Bits, Twofish Is Among The New Encryption Algorithms Being Considered By The National Institute Of Science And Technology (Nist) As A Replacement For The Des Algorithm. Highly Secure And Flexible, Twofish Works Extremely Well With Large Microprocessors, 8Bit Smart Card Microprocessors, And Dedicated Hardware. Now From The Team Who Developed Twofish, This Book Provides You With Your First Detailed Look At:* All Aspects Of Twofish'S Design And Anatomy* Twofish Performance And Testing Results* Stepbystep Instructions On How To Use It In Your Systems* Complete Source Code, In C, For Implementing Twofishon The Companion Web Site You'Ll Find:* A Direct Link To Counterpane Systems For Updates On Twofish* A Link To The National Institute Of Science And Technology (Nist) For Ongoing Information About The Competing Technologies Being Considered For The Advanced Encryption Standard (Aes) For The Next Millenniumfor Updates On Twofish And The Aes Process, Visit These Sites:* Www.Wiley.Com/Compbooks/Schneier* Www.Counterpane.Com* Www.Nist.Gov/Aeswiley Computer Publishing Timely.Practical.Reliable Visit Our Web Site At Www.Wiley.Com/Compbooks/ Visit The Companion Web Site At Www.Wiley.Com/Compbooks/Schneier

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

  • Q: What is the size of the book? A: The book measures seven point six four inches in length, zero point six eight inches in width, and nine point six five inches in height.
  • Q: How many pages does this book have? A: The book contains two hundred eight pages, providing a comprehensive guide to the Twofish encryption algorithm.
  • Q: What type of binding does this book have? A: This book features a hardcover binding, which offers durability and protection for long-term use.
  • Q: How do I implement the Twofish algorithm in my systems? A: You can follow the step-by-step instructions provided in the book to successfully implement the Twofish algorithm in your systems.
  • Q: Is this book suitable for beginners in cryptography? A: Yes, this book is suitable for beginners, as it provides detailed explanations of the Twofish algorithm and its applications.
  • Q: Can I use Twofish on a smart card microprocessor? A: Yes, Twofish is designed to work effectively with eight-bit smart card microprocessors, among other hardware.
  • Q: How should I store this book to keep it in good condition? A: Store the book in a cool, dry place away from direct sunlight to preserve its condition and prevent wear.
  • Q: Is this book safe for children? A: Yes, the content is technical and focused on cryptography, making it more suitable for older students and adults rather than young children.
  • Q: What should I do if the book arrives damaged? A: If the book arrives damaged, you should contact the seller for a return or exchange according to their return policy.
  • Q: Does this book include source code examples? A: Yes, the book provides complete source code in C for implementing the Twofish algorithm, making it practical for developers.
  • Q: Who is the author of this book? A: The book is authored by John Kelsey, one of the developers of the Twofish encryption algorithm.
  • Q: What is the main topic of this book? A: The book covers the Twofish encryption algorithm, a symmetric block cipher known for its high security and flexibility.
  • Q: Is there a companion website for additional resources? A: Yes, there is a companion website that offers updates on Twofish and links to related resources from NIST.
  • Q: What is the target audience for this book? A: The target audience includes professionals and students interested in cryptography and secure systems design.
  • Q: Are there any performance results included in the book? A: Yes, the book includes performance and testing results for the Twofish algorithm, providing insights into its efficiency.

Recently Viewed