GCIPHER(1) GNOME GCIPHER(1)NAME
gcipher - a simple encryption tool
SYNOPSIS
gcipher
gcipher [CIPHEROPTIONS]... [INPUT] [OUTPUT]
gcipher [CIPHEROPTIONS]... -p PROXIEDHOST PROXIEDPORT LISTENINGPORT
CIPHEROPTIONS:
(-c | -C) CIPHER [-k KEY]
"-" may be used for either INPUT or OUTPUT to represent STDIN or STDOUT respectively.
EXAMPLES
Show the GUI:
gcipher
Encrypt a file using the Gie cipher:
gcipher -c Gie inputfile outputfile
Decrypt STDIN and output to STDOUT using Rot13:
gcipher -C Rot -k 13
Listen on port 1027 and act as a proxy for port 1028 on gnu.org. Decrypt the data coming from gnu.org and encrypt data going to gnu.org
using Vigenere with key linux:
gcipher -c Vigenere -k linux -p gnu.org 1028 1027
DESCRIPTION
This is a simple encryption tool to work with home-grown encryption algorithms. It can run as either a GUI, a command-line application, or
a network proxy.
-c CIPHER
encrypt using the given cipher
-C CIPHER
decrypt using the given cipher
-k KEY set the key for the previous cipher
-p PROXIEDHOST PROXIEDPORT LISTENINGPORT
act as a network proxy
CIPHERS
Gie a simple cipher doable by hand; no key is required
Caesar Julius Caesar's code; no key is required
Rot linear rotation; the amount of the rotation is given by the key which must be a number in the range [0, 25]
Vigenere
a version of ROT that uses a private key; the key must be made of lower-case letters
FILES
.gcipher/plugins
See plugins/README in a source distribution for more instructions on creating new plugins.
AUTHOR
Written by Shannon -jj Behrens.
REPORTING BUGS
Report bugs to <jjinux@yahoo.com>.
COPYRIGHT
Copyright (C) 2003 Shannon -jj Behrens.
This is open source software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A
PARTICULAR PURPOSE.
gcipher 1.0 June 2003 GCIPHER(1)
Check Out this Related Man Page
Blowfish(3) User Contributed Perl Documentation Blowfish(3)NAME
Crypt::Blowfish - Perl Blowfish encryption module
SYNOPSIS
use Crypt::Blowfish;
my $cipher = new Crypt::Blowfish $key;
my $ciphertext = $cipher->encrypt($plaintext);
my $plaintext = $cipher->decrypt($ciphertext);
You probably want to use this in conjunction with
a block chaining module like Crypt::CBC.
DESCRIPTION
Blowfish is capable of strong encryption and can use key sizes up to 56 bytes (a 448 bit key). You're encouraged to take advantage of the
full key size to ensure the strongest encryption possible from this module.
Crypt::Blowfish has the following methods:
blocksize()
keysize()
encrypt()
decrypt()
FUNCTIONS
blocksize
Returns the size (in bytes) of the block cipher.
Crypt::Blowfish doesn't return a key size due to its ability to use variable-length keys. More accurately, it shouldn't, but it does
anyway to play nicely with others.
new
my $cipher = new Crypt::Blowfish $key;
This creates a new Crypt::Blowfish BlockCipher object, using $key, where $key is a key of "keysize()" bytes (minimum of eight bytes).
encrypt
my $cipher = new Crypt::Blowfish $key;
my $ciphertext = $cipher->encrypt($plaintext);
This function encrypts $plaintext and returns the $ciphertext where $plaintext and $ciphertext must be of "blocksize()" bytes. (hint:
Blowfish is an 8 byte block cipher)
decrypt
my $cipher = new Crypt::Blowfish $key;
my $plaintext = $cipher->decrypt($ciphertext);
This function decrypts $ciphertext and returns the $plaintext where $plaintext and $ciphertext must be of "blocksize()" bytes. (hint:
see previous hint)
EXAMPLE
my $key = pack("H16", "0123456789ABCDEF"); # min. 8 bytes
my $cipher = new Crypt::Blowfish $key;
my $ciphertext = $cipher->encrypt("plaintex"); # SEE NOTES
print unpack("H16", $ciphertext), "
";
PLATFORMS
Please see the README document for platforms and performance
tests.
NOTES
The module is capable of being used with Crypt::CBC. You're encouraged to read the perldoc for Crypt::CBC if you intend to use this module
for Cipher Block Chaining modes. In fact, if you have any intentions of encrypting more than eight bytes of data with this, or any other
block cipher, you're going to need some type of block chaining help. Crypt::CBC tends to be very good at this. If you're not going to
encrypt more than eight bytes, your data must be exactly eight bytes long. If need be, do your own padding. "