Talk:Threefish

Page contents not supported in other languages.
Source: Wikipedia, the free encyclopedia.
WikiProject iconMathematics Low‑priority
WikiProject icon
WikiProject iconTechnology
WikiProject iconThis article is within the scope of WikiProject Technology, a collaborative effort to improve the coverage of technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
WikiProject iconElectronics Low‑importance
WikiProject iconThis article is part of WikiProject Electronics, an attempt to provide a standard approach to writing articles about electronics on Wikipedia. If you would like to participate, you can choose to edit the article attached to this page, or visit the project page, where you can join the project and see a list of open tasks. Leave messages at the project talk page
LowThis article has been rated as Low-importance on the project's importance scale.
WikiProject iconBusiness Low‑importance
WikiProject iconThis article is within the scope of WikiProject Business, a collaborative effort to improve the coverage of business articles on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
LowThis article has been rated as Low-importance on the project's importance scale.

Origin

The reference link states ""The Skein Hash Function Family". The paper in which Threefish was introduced.". The paper itself says "Dividing up our design [using Threefish] makes Skein easier to understand, analyze, and prove properties about. The underlying Threefish algorithm draws upon years of knowledge of block cipher design and analysis."

It doesn't sound like this paper 'introduced it' when it talks about Threefish already existing and being reviewed for 'years'. --Zom-B (talk) 05:40, 23 October 2014 (UTC)[reply]

No, they're talking about "years of knowledge of block cipher design", not years of knowledge about Threefish. -- intgr [talk] 07:48, 23 October 2014 (UTC)[reply]

Speck related to Threefish

Was Speck derived from Threefish? I don't see any sources on the Speck page nor this page claiming that the NSA derived it from Threefish.66.133.113.102 (talk) 17:54, 22 September 2016 (UTC)[reply]

Rewrite the Security section

The State of the security of the threefish cipher refers to cryptoanalysis of the first or second version of the threefish proposal. However during the NIST competetion in 2010, the developers were allowed to tweak their algorithm and this has happened to threefish several times. Source: https://www.schneier.com/academic/skein/ (Errata Section)

The last (final?) version of the threefish algorithm has a completely different security state. Also see: https://crypto.stackexchange.com/questions/11725/has-threefish-successfully-been-attacked-practically-or-theoretically

Version 1.3 of Skein/Threefish: www.skein-hash.info/sites/default/files/skein1.3.pdf

I feel like someone with a better understanding of crypto should rewrite this section. — Preceding unsigned comment added by Shedo22 (talkcontribs) 21:57, 22 September 2016 (UTC)[reply]