Popular Books:
Ways to Control Secret Key and IV
A quick explanation of different Blowfish cipher operation modes and different ways to control the secret key and the IV: literal key, salted key and random key. 2022-10-01, ∼369🔥, 0💬
"bf-cbc" Encryption Verification
A tutorial example is provided to verify OpenSSL 'enc -bf-cbc' command against the Blowfish CBC test vector published at www.schneier.com. 2022-10-01, ∼328🔥, 0💬
Installing Crypt::Blowfish 2.14 with ActivePerl
A tutorial is provided to show how to install Crypt-Blowfish 2.14 module originally developed by A.M. Kuchling with ActivePerl 5.18 on Windows. 2022-10-01, ∼324🔥, 0💬
Crypt::Blowfish Verification with Test Vectors
A tutorial Perl example is provided to show how to verify the Crypt::Blowfish module with standard Blowfish 16-round algorithm test vectors. 2022-10-01, ∼321🔥, 0💬
First 8336 Fractional Hex Digits of PI
The first 8336 hexadecimal digits of the fractional portion of constant PI, 3.1415927.... These hexadecimal digits are needed to construct Sub-keys and S-Boxes. 2022-10-01, ∼293🔥, 0💬
About This Book
This section provides some detailed information about this book - Blowfish Cipher Tutorials - Herong's Tutorial Examples. 2022-10-01, ∼289🔥, 0💬
Crypt::CBC Salted Key Test Cases
Some test cases are provided to run Crypt::CBC with the salted key option. Passphrase can have any length. But salt must be 8 bytes long. 2022-10-01, ∼275🔥, 0💬
Crypt::ECB Auto Padding
Padding option is described for the Crypt::ECB encryption process. It offers only 1 padding option called PADDING_AUTO, which uses the standard PKCS#5 algorithm. 2022-10-01, ∼270🔥, 0💬
What Is Crypt::Blowfish
A quick introduction is provided for the Crypt::Blowfish Perl module, which can be used to perform encryption and decryption on a single cipher block of 64 bits. 2022-10-01, ∼269🔥, 0💬
Secret Key Padding and Truncation
A tutorial example is provided to show you how OpenSSL 'enc' apply padding or truncation to get a 16-byte secret key from the value specified in the '-K' option. 2022-10-01, ∼265🔥, 0💬
Proof of Blowfish Cipher Algorithm
A proof is provided to show that the Blowfish decryption algorithm will give us back the original plaintext. 2022-10-01, ∼259🔥, 0💬
Secret Keys with Repeating Pattern
Tutorial examples are provided to show that secret keys with a repeating pattern will result the same ciphertext for the same given plaintext. 2022-10-01, ∼259🔥, 0💬
Popular Posts:
This section describes the native-to-ASCII encoding converter 'native2ascii' and its options. Non-AS...
This section provides a quick description of SOAP Encoding and samples of serializing simple and com...
This section provides a tutorial example on how to use Google Chrome as an XML file browser. Chrome ...
This section provides a tutorial example on how to locate the RDP server certificate in the 'Remote ...
The 24 Solar Terms The 24 solar terms is a gross name of the system that comprises of 12 ...