Womens Blowfish.

Navigation menu

Blowfish (cipher)
AES was first published in , and no successful cryptanalysis attacks have been made since its inception. This website stores cookies on your computer to improve the website experience and improve our personalized services to you. This point should be taken in consideration for implementations with a different number of rounds, as even though it increases security against an exhaustive attack, it weakens the security guaranteed by the algorithm. Blowfish was the direct predecessor to Twofish. Introduction to Blowfish Blowfish is a keyed , symmetric cryptographic block cipher designed by Bruce Schneier in and placed in the public domain. Decryption is exactly the same as encryption, except that P1, P2, …, P18 are used in the reverse order. To find out more about these cookies and our privacy processes please see our privacy policy.

Your Answer


Blowfish is also one of the fastest block ciphers in public use, making it ideal for a product like SplashID that functions on a wide variety of processors found in mobile phones as well as in notebook and desktop computers. Schneier designed Blowfish as a general-purpose algorithm, intended as a replacement for the aging DES and free of the problems associated with other algorithms.

Notable features of the design include key-dependent S-boxes and a highly complex key schedule. Blowfish has a bit block size and a key length of anywhere from 32 bits to bits.

It is a round Feistel cipher and uses large key-dependent S-boxes. The diagram to the left shows the action of Blowfish. Each line represents 32 bits. The algorithm keeps two subkey arrays: The S-boxes accept 8-bit input and produce bit output. One entry of the P-array is used every round, and after the final round, each half of the data block is XORed with one of the two remaining unused P-entries. The diagram to the right shows Blowfish's F-function.

The function splits the bit input into four eight-bit quarters, and uses the quarters as input to the S-boxes. AES was first published in , and no successful cryptanalysis attacks have been made since its inception.

Blowfish was designed by Bruce Schneier, a man commonly known as the father of encryption. While two modern successors, Twofish and Threefish, are available, the fact that Blowfish is still widely used and has yet to be broken is a testament to its resiliency. AES bit encryption allows for a quicker synchronization of files to the cloud and comes with the distinction of being the industry standard.

The Anchor solution offers best-in-class military-grade security, a robust set of features and admin controls, and end-user ease-of-use that businesses operating in the cloud need. To offer Anchor to your clients, request a demo today. This website stores cookies on your computer to improve the website experience and improve our personalized services to you. To find out more about these cookies and our privacy processes please see our privacy policy.

Here is what I would pose to you A potential attacker who wants to decrypt your file is not going to sit there and come up with a theoretical set of keys that can be used and then do a brute force attack that can take months. Instead he is going to exploit something else, such as attacking your server hardware, reverse engineering your assembly to see the key, trying to find some config file that has the key in it, or maybe blackmailing your friend to copy a file from your computer. Those are going to be where you are most vulnerable, not the algorithm.

A talented cryptanalyst simply gets more "bang for the buck" finding a flaw in AES then it does for the much less know and used twofish. Obscurity provides no protection in encryption. More bodies looking, studying, probing, attacking an algorithm is always better. You want the most "vetted" algorithm possible and right now that is AES. If an algorithm isn't subject to intense and continual scrutiny you should place a lower confidence of it's strength.

Sure twofish hasn't been compromised. Is that because of the strength of the cipher or simply because not enough people have taken a close look The algorithm choice probably doesn't matter that much. I'd use AES since it's been better researched. What's much more important is choosing the right operation mode and key derivation function. You might want to take a look at the TrueCrypt format specification for inspiration if you want fast random access. If you don't need random access than XTS isn't the optimal mode, since it has weaknesses other modes don't.

And you might want to add some kind of integrity check or message authentication code too. Both algorithms AES and twofish are considered very secure. This has been widely covered in other answers. However, since AES is much widely used now in , it has been specifically hardware-accelerated in several platforms such as ARM and x While not significantly faster than twofish before hardware acceleration, AES is now much faster thanks to the dedicated CPU instructions.

I know this answer violates the terms of your question, but I think the correct answer to your intent is simply this: Minor differences in the performance of most well regarded algorithms cryptographically and chronologically are overwhelmed by a few extra bits of a key.

Thank you for your interest in this question. Because it has attracted low-quality or spam answers that had to be removed, posting an answer now requires 10 reputation on this site the association bonus does not count. Would you like to answer one of these unanswered questions instead? Blowfish is more than a decade old, i think you mean aes vs twofish You are right, I could have asked that.

Fortunatly Jerry sumed up the topic great for me. Rook The older the better is the rule of thumb for security algorithms. New algorithms are for people, who are concerned more about performance than security.


Leave a Reply

Blowfish was designed in by Bruce Schneier as a fast, free alternative to existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. That is why I said "most well regarded algorithms". If you consider Blowfish bit inferior to AES bit, you would have to agree that Blowfish bit blows AES bit out the water. Equally, key generation and management is just as important. If your key is "password" it really doesn't matter at all what algorithm you use. Blowfish is capable of strong encryption and can use key sizes up to 56 bytes (a bit key). The key must be a multiple of 8 bytes (up to a maximum of 56).