|WikiProject Cryptography / Computer science|
The reference link states ""The Skein Hash Function Family". The paper in which Threefish was introduced.". The paper itself says "Dividing up our design [using Threefish] makes Skein easier to understand, analyze, and prove properties about. The underlying Threefish algorithm draws upon years of knowledge of block cipher design and analysis."
- No, they're talking about "years of knowledge of block cipher design", not years of knowledge about Threefish. -- intgr [talk] 07:48, 23 October 2014 (UTC)
Rewrite the Security section
The State of the security of the threefish cipher refers to cryptoanalysis of the first or second version of the threefish proposal. However during the NIST competetion in 2010, the developers were allowed to tweak their algorithm and this has happened to threefish several times. Source: https://www.schneier.com/academic/skein/ (Errata Section)
The last (final?) version of the threefish algorithm has a completely different security state. Also see: https://crypto.stackexchange.com/questions/11725/has-threefish-successfully-been-attacked-practically-or-theoretically
Version 1.3 of Skein/Threefish: www.skein-hash.info/sites/default/files/skein1.3.pdf