Wie ich schon erwähnt habe: Bruce Schneier ist einer der Krypto-Gurus überhaupt. Der weiß, was er tut. Und von ihm wurde PasswordSafe ursprünglich entwickelt.
Was die verwendeten Algorithmen angeht (an denen er maßgeblich [Twofish] oder ausschließlich [Blowfish] beteiligt war):
Cryptanalysis of Blowfish
There is no effective cryptanalysis of Blowfish known publicly as of 2006, although the 64-bit block size is now considered too short, because encrypting more than 232 data blocks can begin to leak information about the plaintext due to a birthday attack. Despite this, Blowfish seems thus far to be secure. While the short block size does not pose any serious concerns for routine consumer applications like e-mail, Blowfish may not be suitable in situations where large plaintexts must be encrypted, as in data archival.
In 1996, Serge Vaudenay found a known-plaintext attack requiring 28r + 1 known plaintexts to break, where r is the number of rounds. Moreover, he also found a class of weak keys that can be detected and broken by the same attack with only 24r + 1 known plaintexts. This attack cannot be used against the full 16-round Blowfish; Vaudenay used a reduced-round variant of Blowfish. Vincent Rijmen, in his Ph.D. thesis, introduced a second-order differential attack that can break four rounds and no more. There remains no known way to break the full 16 rounds, apart from a brute-force search.
In 2005, Dieter Schmidt investigated the Blowfish key schedule and noted that the subkeys for the third and fourth round are independent of the first 64 bits of the user key [1].
Quelle:
http://en.wikipedia.org/wiki/Blowfish_%28cipher%29
As of 2005, there is no known attack on Twofish more efficient than brute force key search.
Quelle: http://en.wikipedia.org/wiki/Twofish