Popular Books:
Ways to Control Secret Key and IV
A quick explanation of different Blowfish cipher operation modes and different ways to control the secret key and the IV: literal key, salted key and random key. 2022-10-01, ∼398🔥, 0💬
Crypt::Blowfish Verification with Test Vectors
A tutorial Perl example is provided to show how to verify the Crypt::Blowfish module with standard Blowfish 16-round algorithm test vectors. 2022-10-01, ∼362🔥, 0💬
Installing Crypt::Blowfish 2.14 with ActivePerl
A tutorial is provided to show how to install Crypt-Blowfish 2.14 module originally developed by A.M. Kuchling with ActivePerl 5.18 on Windows. 2022-10-01, ∼357🔥, 0💬
"bf-cbc" Encryption Verification
A tutorial example is provided to verify OpenSSL 'enc -bf-cbc' command against the Blowfish CBC test vector published at www.schneier.com. 2022-10-01, ∼351🔥, 0💬
Blowfish Test Vectors with 16-Byte Keys
A tutorial Perl example is provided to show how to build a table of test vectors with Crypt::Blowfish with 128-bit (16-byte) secret keys. 2023-10-28, ∼347🔥, 1💬
💬 2023-10-28 Jeremy Gemegah: pardon me, I am a bit confused, what is the size of the sub keys?
About This Book
This section provides some detailed information about this book - Blowfish Cipher Tutorials - Herong's Tutorial Examples. 2022-10-01, ∼338🔥, 0💬
Crypt::ECB Encryption with No Padding
A tutorial example is provided to show how to use Crypt::ECB to perform encryption with no padding. The plaintext must be multiples of 8-byte blocks. 2022-09-07, ∼327🔥, 1💬
First 8336 Fractional Hex Digits of PI
The first 8336 hexadecimal digits of the fractional portion of constant PI, 3.1415927.... These hexadecimal digits are needed to construct Sub-keys and S-Boxes. 2022-10-01, ∼321🔥, 0💬
Crypt::CBC Salted Key Test Cases
Some test cases are provided to run Crypt::CBC with the salted key option. Passphrase can have any length. But salt must be 8 bytes long. 2022-10-01, ∼319🔥, 0💬
What Is Crypt::Blowfish
A quick introduction is provided for the Crypt::Blowfish Perl module, which can be used to perform encryption and decryption on a single cipher block of 64 bits. 2022-10-01, ∼310🔥, 0💬
Popular Posts:
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group pr...
This chapter provides tutorial notes and example codes on using certificates in Firefox. Topics incl...
This section provides a tutorial example showing that space character ' ' is not allowed in cookie v...
This section describes Sun's JDBC-ODBC Bridge driver and its features.
This section provides information on handling Chinese character string literals in Big5 encoding.