Popular Books:
Ways to Control Secret Key and IV
A quick explanation of different Blowfish cipher operation modes and different ways to control the secret key and the IV: literal key, salted key and random key. 2022-10-01, ∼373🔥, 0💬
"bf-cbc" Encryption Verification
A tutorial example is provided to verify OpenSSL 'enc -bf-cbc' command against the Blowfish CBC test vector published at www.schneier.com. 2022-10-01, ∼330🔥, 0💬
Installing Crypt::Blowfish 2.14 with ActivePerl
A tutorial is provided to show how to install Crypt-Blowfish 2.14 module originally developed by A.M. Kuchling with ActivePerl 5.18 on Windows. 2022-10-01, ∼328🔥, 0💬
Crypt::Blowfish Verification with Test Vectors
A tutorial Perl example is provided to show how to verify the Crypt::Blowfish module with standard Blowfish 16-round algorithm test vectors. 2022-10-01, ∼324🔥, 0💬
First 8336 Fractional Hex Digits of PI
The first 8336 hexadecimal digits of the fractional portion of constant PI, 3.1415927.... These hexadecimal digits are needed to construct Sub-keys and S-Boxes. 2022-10-01, ∼296🔥, 0💬
About This Book
This section provides some detailed information about this book - Blowfish Cipher Tutorials - Herong's Tutorial Examples. 2022-10-01, ∼289🔥, 0💬
What Is Crypt::Blowfish
A quick introduction is provided for the Crypt::Blowfish Perl module, which can be used to perform encryption and decryption on a single cipher block of 64 bits. 2022-10-01, ∼284🔥, 0💬
Crypt::CBC Salted Key Test Cases
Some test cases are provided to run Crypt::CBC with the salted key option. Passphrase can have any length. But salt must be 8 bytes long. 2022-10-01, ∼280🔥, 0💬
Crypt::ECB Auto Padding
Padding option is described for the Crypt::ECB encryption process. It offers only 1 padding option called PADDING_AUTO, which uses the standard PKCS#5 algorithm. 2022-10-01, ∼270🔥, 0💬
Secret Key Padding and Truncation
A tutorial example is provided to show you how OpenSSL 'enc' apply padding or truncation to get a 16-byte secret key from the value specified in the '-K' option. 2022-10-01, ∼265🔥, 0💬
Proof of Blowfish Cipher Algorithm
A proof is provided to show that the Blowfish decryption algorithm will give us back the original plaintext. 2022-10-01, ∼262🔥, 0💬
Secret Keys with Repeating Pattern
Tutorial examples are provided to show that secret keys with a repeating pattern will result the same ciphertext for the same given plaintext. 2022-10-01, ∼261🔥, 0💬
Popular Posts:
This section describes how to connect to a DSN (Data Source Name) with JDBC-ODBC Bridge.
This section describes commands and options supported by the 'adb' tool. The 'adb help' command can ...
Want to know when is the 2018 Chinese New Year day? Look for free Chinese calendars for 2018? Chines...
When is the Chinese Qingming Festival? How is it celebrated? What are the traditions? The 1st day of...
This section provides a tutorial example on how to convert binary data file to hex numbers - Bin2Hex...