Skip to main content

Questions tagged [threefish]

A family of tweakable symmetric block-cipher algorithms with 256, 512 and 1024 bit block and key sizes.

2 votes
1 answer
122 views

When you have a tweakable block cipher such as Threefish and your objective is full disk encryption: Is XTS mode unnecessary? Do you just use the block-length data address (sector + offset, etc) as ...
user2684562's user avatar
4 votes
1 answer
184 views

chacha20 has 20 rounds and even that is somewhat deceptive because the rounds alternate between columns and diagonals such that you need 2 rounds to involve the entire state. However if you compare it ...
Unlordship's user avatar
1 vote
1 answer
128 views

When comparing Speck to Threefish's Mix: The difference is that Threefish uses multiple rotation constants and only a single word is rotated in contrast to Speck which uses the same rotations every ...
SusieL's user avatar
  • 11
3 votes
1 answer
172 views

The Threefish tweak block cipher has a fixed size tweak (128 bits) and three different possible key/block sizes (256/512/1024 bits). The MCOE on-line authenticated encryption mode presents three ...
cookiecipher's user avatar
1 vote
1 answer
95 views

The MCOE mode provides a really nice way to implement a nonce-misuse resistant AEAD and is based on an arbitrary tweak block cipher. A specific requirement of the tweak block cipher is that the data ...
cookiecipher's user avatar
9 votes
1 answer
3k views

I haven't seen Threefish widely used. For example, I've seen Twofish used in file encryption software, even though it was not standardized, but I've never seen Threefish. Are there security issues?
nitchan's user avatar
  • 147
1 vote
2 answers
460 views

I have to develop a program using a "secret" locally stored encoded program for a school project. For this I have to decipher the code on the fly to use it. The project recommend the use of ...
Job Valère's user avatar
1 vote
1 answer
2k views

If I understood correctly, some symmetric ciphers such as AES, Camellia, ChaCha are implemented in OpenSSL (along with several older ones) but some other commonly used and proven ciphers such as ...
RocketNuts's user avatar
  • 1,397
1 vote
2 answers
588 views

I have read a few papers on tweakable ciphers (didn't understand them well, though) and looked at many of the questions and answers on this exchange: What is a tweakable block cipher, Tweakable Block ...
Red Book 1's user avatar
  • 1,035
3 votes
2 answers
3k views

I am wondering if other ciphers like Serpent or Twofish or even Threefish have really an use in real life, because AES seems to be very efficient in most situations. But for example TrueCrypt or ...
daralim's user avatar
  • 37
0 votes
2 answers
235 views

Imagine the following situation: you have a tweakable block cipher you have a plain text block you have a cipher text block you have the key which was used to encrypt the plain text block I have these ...
Aemyl's user avatar
  • 165
0 votes
1 answer
811 views

I want to know how the Threefish cipher can be used to encrypt and decrypt. I tried to find out by searching the Internet but can't find a concrete answer. The only answers are theoretical in nature ...
MUHAMMAD SHOAIB's user avatar
-1 votes
1 answer
206 views

What is the difference between lightweight tweakable block cipher and tweakable block cipher? For example, lightweight tweakable block cipher is SKINNY family, and tweakable block cipher is Threefish ...
Petr's user avatar
  • 3
5 votes
4 answers
9k views

I found some App in the Google Store, and there were features only for the PRO version: Threefish 1024-bit and SHACAL-2 512-bit. Meantime, AES-256 was available in the free version of app. So I ...
Chosenman's user avatar
  • 163
8 votes
5 answers
23k views

The title of this thread pretty much sums up what I'm asking: what is the best encryption to use out of the three — Blowfish, Twofish, or Threefish?
Fumerian Gaming's user avatar

15 30 50 per page