Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

crypt::blowfish(3) [suse man page]

Blowfish(3)						User Contributed Perl Documentation					       Blowfish(3)

NAME
Crypt::Blowfish - Perl Blowfish encryption module SYNOPSIS
use Crypt::Blowfish; my $cipher = new Crypt::Blowfish $key; my $ciphertext = $cipher->encrypt($plaintext); my $plaintext = $cipher->decrypt($ciphertext); You probably want to use this in conjunction with a block chaining module like Crypt::CBC. DESCRIPTION
Blowfish is capable of strong encryption and can use key sizes up to 56 bytes (a 448 bit key). You're encouraged to take advantage of the full key size to ensure the strongest encryption possible from this module. Crypt::Blowfish has the following methods: blocksize() keysize() encrypt() decrypt() FUNCTIONS
blocksize Returns the size (in bytes) of the block cipher. Crypt::Blowfish doesn't return a key size due to its ability to use variable-length keys. More accurately, it shouldn't, but it does anyway to play nicely with others. new my $cipher = new Crypt::Blowfish $key; This creates a new Crypt::Blowfish BlockCipher object, using $key, where $key is a key of "keysize()" bytes (minimum of eight bytes). encrypt my $cipher = new Crypt::Blowfish $key; my $ciphertext = $cipher->encrypt($plaintext); This function encrypts $plaintext and returns the $ciphertext where $plaintext and $ciphertext must be of "blocksize()" bytes. (hint: Blowfish is an 8 byte block cipher) decrypt my $cipher = new Crypt::Blowfish $key; my $plaintext = $cipher->decrypt($ciphertext); This function decrypts $ciphertext and returns the $plaintext where $plaintext and $ciphertext must be of "blocksize()" bytes. (hint: see previous hint) EXAMPLE
my $key = pack("H16", "0123456789ABCDEF"); # min. 8 bytes my $cipher = new Crypt::Blowfish $key; my $ciphertext = $cipher->encrypt("plaintex"); # SEE NOTES print unpack("H16", $ciphertext), " "; PLATFORMS
Please see the README document for platforms and performance tests. NOTES
The module is capable of being used with Crypt::CBC. You're encouraged to read the perldoc for Crypt::CBC if you intend to use this module for Cipher Block Chaining modes. In fact, if you have any intentions of encrypting more than eight bytes of data with this, or any other block cipher, you're going to need some type of block chaining help. Crypt::CBC tends to be very good at this. If you're not going to encrypt more than eight bytes, your data must be exactly eight bytes long. If need be, do your own padding. "" as a null byte is perfectly valid to use for this. SEE ALSO
Crypt::CBC, Crypt::DES, Crypt::IDEA Bruce Schneier, Applied Cryptography, 1995, Second Edition, published by John Wiley & Sons, Inc. COPYRIGHT
The implementation of the Blowfish algorithm was developed by, and is copyright of, A.M. Kuchling. Other parts of the perl extension and module are copyright of Systemics Ltd ( http://www.systemics.com/ ). Code revisions, updates, and standalone release are copyright 1999-2010 W3Works, LLC. AUTHOR
Original algorithm, Bruce Shneier. Original implementation, A.M. Kuchling. Original Perl implementation, Systemics Ltd. Current maintenance by W3Works, LLC. Current revision and maintainer: Dave Paris <amused@pobox.com> perl v5.12.1 2010-03-04 Blowfish(3)

Check Out this Related Man Page

Crypt::Eksblowfish::Blowfish(3pm)			User Contributed Perl Documentation			 Crypt::Eksblowfish::Blowfish(3pm)

NAME
Crypt::Eksblowfish::Blowfish - Blowfish block cipher via Eksblowfish engine SYNOPSIS
use Crypt::Eksblowfish::Blowfish; $block_size = Crypt::Eksblowfish::Blowfish->blocksize; $key_size = Crypt::Eksblowfish::Blowfish->keysize; $cipher = Crypt::Eksblowfish::Blowfish->new($key); $block_size = $cipher->blocksize; $ciphertext = $cipher->encrypt($plaintext); $plaintext = $cipher->decrypt($ciphertext); $p_array = $cipher->p_array; $s_boxes = $cipher->s_boxes; if($cipher->is_weak) { ... DESCRIPTION
An object of this type encapsulates a keyed instance of the Blowfish block cipher, ready to encrypt and decrypt. Blowfish is a symmetric cipher algorithm designed by Bruce Schneier in 1993. It operates on 64-bit blocks, and takes a variable-length key from 32 bits (4 octets) to 448 bits (56 octets) in increments of 8 bits (1 octet). This implementation of Blowfish uses an encryption engine that was originally implemented in order to support Eksblowfish, which is a variant of Blowfish modified to make keying particularly expensive. See Crypt::Eksblowfish for that variant; this class implements the original Blowfish. CLASS METHODS
Crypt::Eksblowfish::Blowfish->blocksize Returns 8, indicating the Blowfish block size of 8 octets. This method may be called on either the class or an instance. Crypt::Eksblowfish::Blowfish->keysize Returns 0, indicating that the key size is variable. This situation is handled specially by "Crypt::CBC". CONSTRUCTOR
Crypt::Eksblowfish::Blowfish->new(KEY) Performs key setup on a new instance of the Blowfish algorithm, returning the keyed state. The KEY may be any length from 4 octets to 56 octets inclusive. You may occasionally come across an alleged Blowfish key that is outside this length range, and so is rejected by this constructor. Blowfish can internally process a key of any octet length up to 72 octets, and some implementations don't enforce the official length restrictions. If it is necessary for compatibility, a key of out-of-range length can be processed by Crypt::Eksblowfish::Uklblowfish. METHODS
$cipher->blocksize Returns 8, indicating the Blowfish block size of 8 octets. This method may be called on either the class or an instance. $cipher->encrypt(PLAINTEXT) PLAINTEXT must be exactly eight octets. The block is encrypted, and the ciphertext is returned. $cipher->decrypt(CIPHERTEXT) CIPHERTEXT must be exactly eight octets. The block is decrypted, and the plaintext is returned. $cipher->p_array $cipher->s_boxes These methods extract the subkeys from the keyed cipher. This is not required in ordinary operation. See the superclass Crypt::Eksblowfish::Subkeyed for details. $cipher->is_weak This method checks whether the cipher has been keyed with a weak key. It may be desired to avoid using weak keys. See the superclass Crypt::Eksblowfish::Subkeyed for details. SEE ALSO
Crypt::Eksblowfish, Crypt::Eksblowfish::Subkeyed, Crypt::Eksblowfish::Uklblowfish, <http://www.schneier.com/blowfish.html> AUTHOR
Eksblowfish guts originally by Solar Designer (solar at openwall.com). Modifications and Perl interface by Andrew Main (Zefram) <zefram@fysh.org>. COPYRIGHT
Copyright (C) 2006, 2007, 2008, 2009, 2010 Andrew Main (Zefram) <zefram@fysh.org> The original Eksblowfish code (in the form of crypt()) from which this module is derived is in the public domain. It may be found at <http://www.openwall.com/crypt/>. LICENSE
This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself. perl v5.14.2 2011-11-15 Crypt::Eksblowfish::Blowfish(3pm)
Man Page