Products that Use Twofish
This list is a compilation of encryption products that use the Twofish encryption algorithm. Counterpane has not verified that Twofish has been implemented properly, nor have we evaluated the security of these products. Readers are cautioned that there is more to creating a secure product than having a secure algorithm; for details read the essays Why Cryptography is Harder Than it Looks and Security Pitfalls in Cryptography. The listing of a product here is not an endorsement in any way. Some settling of contents may have occured during shipping. Keep off the grass.
Advanced Encryption Package Professional
File encryption software for Windows. Supports Blowfish, Twofish, AES, and other algorithms.
An Internet messenger program.
Steganography with a selection of algorithms, including Blowfish and Twofish.
Bouncy Castle Crypto APIs
A Java implementation of cryptographic algorithms, including Blowfish and Twofish. The package contains a light-weight API suitable for use in any environment, with the additional infrastructure to conform the algorithms to the JCE framework.
Calendar software for Windows that uses Twofish to encrypt all data.
.NET cryptographic library.
C++ cryptographic library.
A C# encryption library.
Cryptex Privacy Vault
A personal data vault for the Android operating system. Uses Twofish, Threefish, and Skein.
A free set of cryptographic extensions for Java, including both Blowfish and Twofish.
The CyberAngel Security Software
Secure virtual drive software for Windows.
File and e-mail encryption, compatible with any mailer application and file type.
dlb (Digital Lecture Board) by Lehrstuhl Praktische Informatik IV, University of Mannheim
A network whiteboard system.
Drag’n’Crypt Ultra by Hans Joachim Schlingensief
File encryption for Windows.
FiveLoaves by Brian Aberle
Free, open-source secure connectivity software.
A free, open-source archiver with console and GUI versions for both Windows and Linux.
FoxTrot by Roth Systems
An HTTP server designed as a professional application server. With FoxTrot you can execute SQL commands directly from the browser’s Address line. Allows secure transactions using Twofish.
The Gnu Privacy Guard is a full replacement for PGP that supports Blowfish and Twofish as well as many other algorithms.
GSM mobile phones with published source.
Cloud storage with available client-side Twofish encryption.
Strong authentication software. Uses 256-bit Twofish with static and dynamic 3072-bit Diffie-Hellman key exchanges to protect its intermodule communication traffic.
A free, open-source password manager.
LSH by Niels Möller
A free replacement for SSH2.
A replacement for crypt(1), released under the GNU General Public License. Supports both Blowfish and Twofish.
Novell SUSE Linux Enterprise
Uses Blowfish for password encryption and Twofish for encrypted partitions.
Password Creator Professional by Michael Koszenski
Uses Twofish to store lists of randomly generated passwords.
A password database originally designed by Bruce Schneier—now an open source project. For Windows, with a Linux version in beta.
An open-source archive file creator and extractor. Offers a choice of encryption algorithms, including Blowfish and Twofish.
Encryption solutions including a software development kit and disk, e-mail, and network file encryption applications.
PhotoEncrypt by ZXN Corporation
An encrypted image database that uses both Blowfish and Twofish.
XPDFViewer by Frank Siegert
X-PDFBrowser allows any file to be embedded into a PDF file as an attachment. Twofish is used for the optional content encryption modes. Freeware for personal and edu use.
File encryption for Windows.
Secure Information Courier, SecExMail, and SecExFile by Bytefusion
Secure Information Courier allows visitors to your website to send secure e-mail to your organization. SecExMail provides transparent e-mail encryption, while SecExFile provides one-click file encryption.
SecurePad by NeuralAbyss Software
Offers a secure alternative to Windows’ Notepad and WordPad. Uses Blowfish and Twofish along with several other algorithms.
SQL 2000 DBA Toolkit
A free toolkit with encryption and decryption XPs and key management.
Managed file transfer software for Windows, Linux, Solaris, IBM z/OS, and AIX.
A a collection of security related components and routines for Delphi, Kylix and C++Builder.
A free and open source Twofish implementation for AVR devices.
Free open-source disk encryption software, which can create a virtual encrypted disk within a file and mount it as a real disk. It can also encrypt an entire hard disk partition or storage device such as USB memory stick. Provides two-level plausible deniability, in case the user is forced by an adversary to reveal the passphrase. Supported encryption algorithms: AES-256, Blowfish, CAST-128, Serpent, Triple DES, Twofish, and cascades of these.
Turbo Sim Toolkit Adapter by Bladox
A mobile phone accessory bringing user applications and removable memory card capability to any GSM mobile phone.
An encryption and decryption wrapper for .NET applications.
See also the list of products that use Blowfish.
Sidebar photo of Bruce Schneier by Joe MacInnis.