Schneier on Security
A blog covering security and security technology.
« NSA Acronyms |
| Demands from Law Enforcement for Google Data »
October 25, 2011
Twofish Mentioned in Thriller Novel
I've been told that the Twofish encryption algorithm is mentioned in the book Abuse of Power, in the first paragraph of Chapter 3. Did the terrorists use it? Did our hero break it? I am unlikely to read it; can someone scan the page for me.
EDITED TO ADD (10/25): Google Books has it:
The line was picked up after three rings. The cell phones were encrypted using a Twofish algorithm and a 4096-bit Diffie-Hellman key exchange.
No one would be listening in.
Posted on October 25, 2011 at 12:58 PM
• 27 Comments
To receive these entries once a month by e-mail, sign up for the Crypto-Gram Newsletter.
Unfortunately, if Michael Savage's program were encrypted with ten different twofish keys, I'm afraid the hate will still leak out of the ciphertext.
Regarding encrypting a physical product, I'm sure we'll see that happen soon, in the form of copy protection against 3D printers. You will probably see a DRM path between PC and printer, and of course, scrambling of physical objects to make them harder to scan a 3D model.
"[A] Twofish algorithm"?
Indeed. Surely it should be The Twofish algorithm.
That's the trouble with putting crypto in a thriller. You have to know what you're talking about.
Case in point: Digital Fortress by Dan Brown. One or two teensy-weensy mistakes! Although I did enjoy it when hyper-intelligent Susan Fletcher almost fell out of her chair with surprise.
Schneier.com is a personal website. Opinions expressed are not necessarily those of BT.