Crypt Overview

Data encryption software (Cryptography)

Compris Intelligence GmbH offers Twofish, the most promising candidate for the new US standard AES (Advanced Encryption Standard) for block cyphers. Twofish which was designed by a team around the crypto expert Bruce Schneier and is supposed to replace the DES (Data Encryption Standard) algorithm which roots back in the seventies. Twofish works with just a single key for encryption and decryption. For key exchange the RSA method for public key Cryptography is used in the Compris Intelligence GmbH implementation.

Known encryption methods with public keys are very slow. This is why the fast block cyphering/encryption methods are used and only their keys will be exchanged through a public key method.

Characteristics

Typical values

Speed

Compression/decompression

(independent of the key length)

Pentium II – 400 MHz

 

 

10 MB/second

Speed comparison

(basis: Twofish, 256-bit-key, 16 rounds, 8 cycles):

    • RC5-32/16 (256-bit key, 32 r.., 16 cycles)
    • DES (56-bit-key, 16 rounds., 8 cycles)
    • Triple-DES (112-bit key., 48 r.., 24 cycles)
    • IDEA (128-bit-key, 8 rounds, 8 cycles)

Percent worse as Twofish

    • 37%
    • 137%
    • 541%
    • 309%

Memory demand

10 kB data, 270 kB code size

Technology

Feistel network with 16 rounds (bijective function made up of 4 key dependent 8x8 bit S-boxes, as well as additional matrices and encryption functions)

Mathematical security / effort needed for cracking with a 256 bit key length

approx. 1010 years

Best successful crypto attack

5 (of 16) rounds of a Feistel network with 222,5 (= 6 million) known input plain texts with an expense of 251 (= 2,3 * 1015). Computational effort rises exponentially with each additional Feistel network

Supported key lengths

all lengths <= 256 bits, in particular: 128 bit, 192 bit, 256 bit

Key exchange

with RSA method for public key-cryptography (up to 4096 bits key length)

Type of the method

block cyphering with secure key exchange

Minimal data length

16 bytes (smaller data lengths can be brought to that minimal length by adding random data)

Operating systems

P>MS-Windows 95/98/NT, Unix (Linux, Solaris); MacOS in planning; others upon request

Common combinations

    1. with steganography program like SubiText (after encryption)
    2. with any kind of data compression program (before and sometimes after encryption)

Features / advantages:

    • developed in the USA by a research team around crypto guru Bruce Schneier
    • can be integrated in any kind of network environment or as a component in applications
    • newest, most secure and unpatented technology
    • additional RSA component with key management (to secure the key exchange for Twofish)
    • encoding speed, time for key-specific calculations, code size, RAM consumption (main memory), ROM consumption (for example on a smart card) or amount of gates on a chip can be varied or rather traded off against each other. Increasing one of these values goes along with a worsening of one or more of the other values.
    • method can be implemented on a Smartcard with less than 64 bytes of RAM and even less than 1400 Bytes of ROM; as a hardware solution less than 14000 gates will be needed

Available programming components

Price

    • Software development kit (SDK) with English / German documentation (unlimited number of copies allowed)
    • Above SDK with RSA component and key management (in north America a license is needed, otherwise freely useable)
    • Services of integration in software or of integration in networks
    • $100,-
    • $300,-

    • $75,- per hour

 

 

Abbreviations

Abbreviation

Meaning

AES

Advanced Encryption Standard; adoption in the year 2001 by NIST (US National Institute of Standards and Technology): Rijndael

DES

Data Encryption Standard; block cypher; from the seventies

kB

kilobyte; 210 Bytes = 1024 Bytes = 213 Bits

MB

Megabyte; 220 Bytes = 223 Bits

RSA

The public key encryption method named after their developers Rivest, Shamir and Adleman

SDK

Software development kit



 
 

Address

Compris Intelligence GmbH
Rheingönheimer Str. 79
67065 Ludwigshafen am Rhein
Germany
phone: (+49) 0700-COMPRISTel (0700-26677478)
fax: (+49) 0700-COMPRISFax (0700-26677473)

Internet: www.compris.com
e-mail:products@compris.com



Information &Questions: products@compris.com



www.compris.com  | Crypt  | Contact/Map  | About Compris Intelligence GmbH