Popular Books:
Crypt::CBC Padding Option Tests
A tutorial example is provided to how different Crypt::CBC padding options behave. The 'standard' (PKCS#5) padding option seems to be the best. 2022-10-01, ∼242🔥, 0💬
References
List of reference materials used in this book, Blowfish Cipher Tutorials - Herong's Tutorial Examples. 2022-10-01, ∼237🔥, 0💬
Crypt::CBC Encryption Verification
A tutorial example is provided to verify Crypt::CBC against the Blowfish CBC test vector published at www.schneier.com. 2022-10-01, ∼220🔥, 0💬
Blowfish CBC 2-Block Test Vectors
A tutorial Perl example is provided to show how to build a table of test vectors for Blowfish algorithm in CBC mode on 2-block (16-byte) plaintext messages. 2022-10-01, ∼213🔥, 0💬
Crypt::ECB Encryption Test Cases
Test cases are provided to run Crypt::ECB with Crypt::Blowfish and no padding. Secret key must be between 8 bytes and 56 bytes long. 2022-10-01, ∼203🔥, 0💬
Performing CFB Operation Manually
This section provides a tutorial example on how to perform CFB operation manually using the standard Blowfish block cipher (or ECB mode) and an XOR function. 2022-10-01, ∼200🔥, 0💬
Efficient Form of the Blowfish Algorithm
A more efficient form of the Blowfish Algorithm is presented with the 16-round loop expanded inline to avoid the 'Swap' step. 2022-10-01, ∼196🔥, 0💬
Crypt::Blowfish Behavior Tests
A tutorial Perl example is provided to show how to verify behaviors of Crypt::Blowfish module on different sizes of secret keys and plaintext messages. 2022-10-01, ∼196🔥, 0💬
Crypt::ECB Encryption with No Padding
A tutorial example is provided to show how to use Crypt::ECB to perform encryption with no padding. The plaintext must be multiples of 8-byte blocks. 2022-09-07, ∼281🔥, 1💬
Blowfish Cipher Encryption Algorithm
The Blowfish cipher algorithm is presented based on the algorithm designer Bruce Schneier's technical paper. Blowfish cipher is 16-round and 64-bit block cipher. 2021-06-17, ∼507🔥, 1💬
💬 2021-06-17 Potato: Where did the name blowfish originate from?
Popular Posts:
This book is a collection of notes and tutorial examples written by the author while he was learning...
This section provides a tutorial Java program, DESSubkeysTest.java, to illustrate how DES key schedu...
This section describes DES decryption algorithm - identical to the encryption algorithm step by step...
A tutorial example is provided on how to download and install Microsoft .NET Framework 4.6.1 SDK, wh...
This section provides a tutorial on how to modify the Perl CGI test script, printenv.pl, and run it ...