Crypt Overview

Data encryption software (Cryptography)

Compris Intelligence GmbH offers Twofish, the most promising candidate for the new US standard AES (Advanced Encryption Standard) for block cyphers. Twofish which was designed by a team around the crypto expert Bruce Schneier and is supposed to replace the DES (Data Encryption Standard) algorithm which roots back in the seventies. Twofish works with just a single key for encryption and decryption. For key exchange the RSA method for public key Cryptography is used in the Compris Intelligence GmbH implementation.

Known encryption methods with public keys are very slow. This is why the fast block cyphering/encryption methods are used and only their keys will be exchanged through a public key method.


Typical values



(independent of the key length)

Pentium II – 400 MHz



10 MB/second

Speed comparison

(basis: Twofish, 256-bit-key, 16 rounds, 8 cycles):

    • RC5-32/16 (256-bit key, 32 r.., 16 cycles)
    • DES (56-bit-key, 16 rounds., 8 cycles)
    • Triple-DES (112-bit key., 48 r.., 24 cycles)
    • IDEA (128-bit-key, 8 rounds, 8 cycles)

Percent worse as Twofish

    • 37%
    • 137%
    • 541%
    • 309%

Memory demand

10 kB data, 270 kB code size


Feistel network with 16 rounds (bijective function made up of 4 key dependent 8x8 bit S-boxes, as well as additional matrices and encryption functions)

Mathematical security / effort needed for cracking with a 256 bit key length

approx. 1010 years

Best successful crypto attack

5 (of 16) rounds of a Feistel network with 222,5 (= 6 million) known input plain texts with an expense of 251 (= 2,3 * 1015). Computational effort rises exponentially with each additional Feistel network

Supported key lengths

all lengths <= 256 bits, in particular: 128 bit, 192 bit, 256 bit

Key exchange

with RSA method for public key-cryptography (up to 4096 bits key length)

Type of the method

block cyphering with secure key exchange

Minimal data length

16 bytes (smaller data lengths can be brought to that minimal length by adding random data)

Operating systems

P>MS-Windows 95/98/NT, Unix (Linux, Solaris); MacOS in planning; others upon request

Common combinations

    1. with steganography program like SubiText (after encryption)
    2. with any kind of data compression program (before and sometimes after encryption)

Features / advantages:

    • developed in the USA by a research team around crypto guru Bruce Schneier
    • can be integrated in any kind of network environment or as a component in applications
    • newest, most secure and unpatented technology
    • additional RSA component with key management (to secure the key exchange for Twofish)
    • encoding speed, time for key-specific calculations, code size, RAM consumption (main memory), ROM consumption (for example on a smart card) or amount of gates on a chip can be varied or rather traded off against each other. Increasing one of these values goes along with a worsening of one or more of the other values.
    • method can be implemented on a Smartcard with less than 64 bytes of RAM and even less than 1400 Bytes of ROM; as a hardware solution less than 14000 gates will be needed

Available programming components


    • Software development kit (SDK) with English / German documentation (unlimited number of copies allowed)
    • Above SDK with RSA component and key management (in north America a license is needed, otherwise freely useable)
    • Services of integration in software or of integration in networks
    • $100,-
    • $300,-

    • $75,- per hour







Advanced Encryption Standard; adoption in the year 2001 by NIST (US National Institute of Standards and Technology): Rijndael


Data Encryption Standard; block cypher; from the seventies


kilobyte; 210 Bytes = 1024 Bytes = 213 Bits


Megabyte; 220 Bytes = 223 Bits


The public key encryption method named after their developers Rivest, Shamir and Adleman


Software development kit



Compris Intelligence GmbH
Rheingönheimer Str. 79
67065 Ludwigshafen am Rhein
phone: (+49) 0700-COMPRISTel (0700-26677478)
fax: (+49) 0700-COMPRISFax (0700-26677473)


Information &Questions:  | Crypt  | Contact/Map  | About Compris Intelligence GmbH