Popular Books:
Crypt::CBC Salted Key Test Cases
Some test cases are provided to run Crypt::CBC with the salted key option. Passphrase can have any length. But salt must be 8 bytes long. 2022-10-01, ∼252🔥, 0💬
Proof of Blowfish Cipher Algorithm
A proof is provided to show that the Blowfish decryption algorithm will give us back the original plaintext. 2022-10-01, ∼248🔥, 0💬
Secret Keys with Repeating Pattern
Tutorial examples are provided to show that secret keys with a repeating pattern will result the same ciphertext for the same given plaintext. 2022-10-01, ∼246🔥, 0💬
Crypt::CBC Padding Option Tests
A tutorial example is provided to how different Crypt::CBC padding options behave. The 'standard' (PKCS#5) padding option seems to be the best. 2022-10-01, ∼244🔥, 0💬
References
List of reference materials used in this book, Blowfish Cipher Tutorials - Herong's Tutorial Examples. 2022-10-01, ∼239🔥, 0💬
Crypt::CBC Encryption Verification
A tutorial example is provided to verify Crypt::CBC against the Blowfish CBC test vector published at www.schneier.com. 2022-10-01, ∼220🔥, 0💬
Blowfish CBC 2-Block Test Vectors
A tutorial Perl example is provided to show how to build a table of test vectors for Blowfish algorithm in CBC mode on 2-block (16-byte) plaintext messages. 2022-10-01, ∼215🔥, 0💬
Crypt::ECB Encryption Test Cases
Test cases are provided to run Crypt::ECB with Crypt::Blowfish and no padding. Secret key must be between 8 bytes and 56 bytes long. 2022-10-01, ∼203🔥, 0💬
Performing CFB Operation Manually
This section provides a tutorial example on how to perform CFB operation manually using the standard Blowfish block cipher (or ECB mode) and an XOR function. 2022-10-01, ∼201🔥, 0💬
Crypt::Blowfish Behavior Tests
A tutorial Perl example is provided to show how to verify behaviors of Crypt::Blowfish module on different sizes of secret keys and plaintext messages. 2022-10-01, ∼198🔥, 0💬
Efficient Form of the Blowfish Algorithm
A more efficient form of the Blowfish Algorithm is presented with the 16-round loop expanded inline to avoid the 'Swap' step. 2022-10-01, ∼196🔥, 0💬
Popular Posts:
This section provides a tutorial example to illustrate how RSA public key encryption algorithm works...
This section describes the elliptic curve, E(0,7), also named as secp256k1, and the subgroup paramet...
Want to know when is the 2036 Chinese New Year day? Look for free Chinese calendars for 2036? Chines...
This section provides a tutorial example on how to install Tomcat server on a local macOS system. It...
This section provides a thought experiment to help understanding the second assumption of the specia...