Bestselling and bargain books: Cryptography
|
|
Books -> Cryptography
The Twofish Encryption Algorithm: A 128-Bit Block Cipher
 |
by:
Schneier, Bruce
Kelsey, John
Whiting, Doug
Wagner, David
Hall, Chris
Ferguson, Niels
|
Publisher: Wiley
Published: March 22, 1999
ISBN: 0471353817
Format:Hardcover
Pages:208
|
Read More, Buy It
|
Book Description
From the Back Cover The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption
algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and
dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at:
All aspects of Twofish's design and anatomy Twofish performance and testing results Step-by-step instructions on how to
use it in your systems Complete source code, in C, for implementing Twofish
On the companion Web site you'll find:
A direct link to Counterpane Systems for updates on Twofish A link to the National Institute of Science and Technology
(NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium
For updates on Twofish and the AES process, visit these sites:
www.wiley.com/compbooks/schneier www.counterpane.com www.nist.gov/aes
Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier
Product Description: The first and only guide to one of today's most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption
algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES algorithm. Highly secure and flexible, Twofish works extremely well with large microprocessors, 8-bit smart card microprocessors, and
dedicated hardware. Now from the team who developed Twofish, this book provides you with your first detailed look at: * All aspects of Twofish's design and anatomy * Twofish performance and testing results * Step-by-step instructions on how
to use it in your systems * Complete source code, in C, for implementing Twofish On the companion Web site you'll find: * A direct link to Counterpane Systems for updates on Twofish * A link to the National Institute of Science and
Technology (NIST) for ongoing information about the competing technologies being considered for the Advanced Encryption Standard (AES) for the next millennium For updates on Twofish and the AES process, visit these sites: *
www.wiley.com/compbooks/schneier * www.counterpane.com * www.nist.gov/aes Wiley Computer Publishing Timely.Practical.Reliable Visit our Web site at www.wiley.com/compbooks/ Visit the companion Web site at www.wiley.com/compbooks/schneier
Read More, Buy It
|
|