Your IP:Unknown

·

Your Status: Unknown

Skip to main content


Twofish encryption: What is it and how does it work?

Twofish is seen as one of the most secure encryption algorithms in the world, even more robust than AES — so why is AES the leading standard today? In this article, we’ll examine what Twofish is, how it works, and where it is used today.

Mar 24, 2024

9 min read

encrypted message

What is Twofish encryption?

The Twofish encryption algorithm is an open source symmetric key block cipher developed for the 1997 National Institute of Standards and Technology (NIST) competition to determine the successor to the aging Data Encryption Standard (DES). Twofish was the brainchild of Bruce Schneier, John Kelsey, Chris Hall, Niels Ferguson, David Wagner, and Doug Whiting.

As the name suggests, Twofish is based on Blowfish, an earlier block cipher designed by Schneier. While Blowfish has never been cracked officially, its 64-bit block size was deemed insufficient by the NIST for security. This prompted Schneier’s team to base Twofish around 128-bit blocks and make a number of important improvements.

Twofish ultimately lost the 1997 competition to Rijndael, which became known as the Advanced Encryption Standard (AES) and went on to dominate the cryptography space in the coming decades. However, unlike many encryption algorithms of the era, Twofish didn’t just fade into history — due the cipher’s open source nature and exceptional security, it continues to be used to this day.

Key features of the Twofish algorithm

Twofish stands out from the other accepted encryption algorithms in several ways. We have summarized the key features of the Twofish algorithm below for your convenience:

  • High block size. Twofish has a block size of 128 bits, making it very resistant to brute force attacks.
  • S-boxes. Twofish uses pre-computed, key-dependent substitution boxes (S-boxes) to obscure the relationship between the encryption/decryption key and the ciphertext. Each S-box consists of three 8-by-8 bit fixed permutations.
  • Feistel network. Twofish is based on the Feistel network structure, just like DES and Blowfish before it. This structure involves dividing input data into equal blocks, then processing each block through multiple encryption rounds. According to Schneier, the Feistel network was chosen because it was thoroughly studied and understood — the developers deliberately chose not to tamper with the formula to avoid introducing vulnerabilities.
  • Complex key schedule. Compared to other encryption algorithms, Twofish has a relatively complex key schedule (the algorithm for deriving round keys from the main key during iterative encryption processes). Twofish encryption always goes through 16 rounds, which makes it resistant to cryptanalysis techniques like related-key attacks and slide attacks.
  • Inherent flexibility. Like AES, Twofish can accept keys of 128, 192, and 256 bits in length, making it suitable for a wide range of security operations. In addition, Twofish is designed to be able to trade key setup time or ROM and RAM for encryption speed, optimizing performance based on the resources it has access to.
  • Open source. The creators of Twofish declined to patent the encryption algorithm — as a result, Twofish has passed into the public domain. There is now a thriving community of developers using Twofish in their work.

How does Twofish encryption work?

Like all encryption algorithms, Twofish takes plaintext information (raw data that represents the true values entered, such as the text in a message) and turns it into ciphertext (encrypted data that appears as garbled nonsense). Here is what the Twofish encryption process looks like:

  1. 1.When a message is entered, Twofish first breaks the plaintext into equal 128-bit blocks. These 128-bit blocks are then further divided into 32-bit parts.
  2. 2.Each 32-bit part undergoes input whitening technique using subkeys generated from the main key. To make the following processes clearer, we’ll call these whitened parts R0, R1, R2, and R3.
  3. 3.Twofish can now proceed to encrypt the data in rounds. This is what a single Twofish round looks like:
    1. 1.Each round begins with the F function, which uses the leftmost 32-bit box values (in this case, R0 and R1) to encrypt the rightmost 32-bit boxes (R2 and R3):
      • First, Twofish rotates R1 left by 8 bits, yielding RL1.
      • Then, Twofish takes R0 and RL1 and breaks each up into four-byte sections.
      • Each 4-byte section is processed through a different key-dependent S-box.
      • The outputs of these S-boxes are combined back into two 32-bit parts using a Maximum Distance Separable (MDS) matrix. The result of R0 is T0, while the result of RL1 is T1.
      • T0 and T1 are combined using a Pseudo-Hadamard Transform (PHT), which functions like a mixer. This produces a single value, which is replicated twice and combined with two different round keys (based on the key schedule) to yield F0 and F1.
    2. 2.After the F function is complete, F0 is first XORed to R2 and then rotated right by one bit. We’ll call the result C2 because it takes the position of R2.
    3. 3.F1 is XORed to R3, but the result is rotated by one bit to the left. This yields C3, which takes the position of R3.
    4. 4.While we used R0 and R1 values for the F function, we do not replace them at this point. Instead of the original R0, R1, R2, and R3, we now have R0, R1, C2, and C3.
    5. 5.At the end of the round, C2 and C3 switch places with R0 and R1, resulting in the order of C2, C3, R0, and R1. This means that in the next round, C2 and C3 will be subject to the F function and modify the original R0 and R1.
  4. 4.Twofish repeats this process until it has gone through 16 rounds of encryption.
  5. 5.The resulting 32-bits are subjected to output whitening (again, using subkeys generated from the main key) and combined to produce a 128-bit block of ciphertext.
  6. 6.The 128-bit ciphertext blocks are put together to produce the encrypted message.

Main advantages and disadvantages of Twofish encryption

The main advantage of Twofish is its robust security. Twofish has withstood many cryptanalysis attempts over the years, proving that it is capable of protecting even highly sensitive data. Based purely on computational complexity, Twofish is theoretically more resistant to cryptanalysis than AES, the reigning encryption standard.

This added complexity unfortunately means that Twofish is slower than many encryption algorithms in its weight class. As such, the biggest disadvantage of Twofish is speed, particularly on low-power devices or apps with limited resources. In such hardware and software environments, the computational overhead of Twofish may noticeably impact operations.

Comparing Twofish to other encryption algorithms

To better understand the advantages and disadvantages of Twofish, let’s compare it to two other popular encryption algorithms — its chief competitor AES and its predecessor Blowfish.

Twofish vs AES

Twofish and AES both made it to the finals of the 1997 NIST competition, but ultimately, AES was chosen as the future of cybersecurity. In the end, victory was decided by one thing — speed. The future encryption standard would have to deal with continuous streams of data, so even nanosecond delays could quickly add up to interfere with communications.

The gulf between the two further increased when AMD and Intel began making processors with hardware acceleration for AES. On most modern devices that use AMD or Intel chipsets, AES is orders of magnitude faster than Twofish.

While in theory Twofish is more secure than AES (for instance, it uses 16 rounds for encryption rather than 10, 12, or 14 in AES), this added security doesn’t have much practical effect — both encryption algorithms would take so long to crack that the supercomputers performing the calculations would turn to dust before they were finished.

Twofish vs Blowfish

In many ways, Twofish is simply a more advanced version of Blowfish. Bruce Scheneir intended Twofish to become Blowfish’s successor, just like AES replaced DES, but history proved otherwise — Blowfish is even more popular than Twofish today, although the disparity is likely the result of Blowfish simply being out for longer.

Blowfish is faster than many modern encryption algorithms (including Twofish), making it popular for bulk encryption and password storage. Furthermore, despite using only 64-bit blocks for encryption, Blowfish has not been cracked yet. That doesn’t mean it’s completely safe, however — for example, the small block size may be exploited by birthday attacks. As a result, Schneier recommends using Twofish instead for its enhanced security.

Examples of Twofish encryption in use

By leveraging its inherent flexibility and security in areas where speed is not essential, the Twofish encryption algorithm has managed to carve out a niche for itself. Here are some popular applications of Twofish:

  • Password managers. Twofish is a natural fit for password storage solutions. First, password managers prize security above all else, taking advantage of Twofish’s complex key schedule and S-blocks. Second, the fact that password managers are only used to access credentials means that the slower speed of Twofish isn’t as noticeable.
  • Virtual private networks. Some virtual private networks (VPNs) use Twofish to encrypt your internet connection, although the top brands typically prefer AES-256 due to the latter’s speed. Ultimately, the choice of encryption algorithm depends on many factors, including the provider’s own infrastructure and the VPN protocol used.
  • OpenPGP (Pretty Good Privacy). PGP is a tool for electronically signing and encrypting files, directions, and emails. True to its name, OpenPGP is an open source standard that helps implement PGP in software. One popular OpenPGP implementation that uses Twofish is the GNU Privacy Guard (GnuPG), which focuses on user communications data.
  • TrueCrypt. TrueCrypt was a free file encryption tool that used Twofish and other secure ciphers to protect data. The original TrueCrypt was officially discontinued in 2014, although an independent audit in 2015 determined that there were no significant flaws with the software. VeraCrypt, one of TrueCrypt’s successors, also uses TwoFish encryption in its operations.

Like what you’re reading?

Get the latest stories and announcements from NordVPN

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

We won’t spam and you will always have the choice to unsubscribe

FAQ


author petras png

Petras Borisovas

Petras Borisovas takes his online privacy and internet security seriously. When not fending off attempts to intrude into his private life, Peter enjoys sci-fi, gaming, and collecting odd bits of trivia.