Crypt::Blowfish man page on Pidora

Man page or keyword search:  
man Server   31170 pages
apropos Keyword Search (all sections)
Output format
Pidora logo
[printable version]

Blowfish(3)	      User Contributed Perl Documentation	   Blowfish(3)

NAME
       Crypt::Blowfish - Perl Blowfish encryption module

SYNOPSIS
	 use Crypt::Blowfish;
	 my $cipher = new Crypt::Blowfish $key;
	 my $ciphertext = $cipher->encrypt($plaintext);
	 my $plaintext	= $cipher->decrypt($ciphertext);

DESCRIPTION
       Blowfish is capable of strong encryption and can use key sizes up to 56
       bytes (a 448 bit key).  You're encouraged to take advantage of the full
       key size to ensure the strongest encryption possible from this module.

       Crypt::Blowfish has the following methods:

	blocksize()
	keysize()
	encrypt()
	decrypt()

FUNCTIONS
       blocksize
	   Returns the size (in bytes) of the block cipher.

	   Crypt::Blowfish doesn't return a key size due to its ability to use
	   variable-length keys. (well, more accurately, it won't as of 2.09
	   .. for now, it does.	 expect that to change)

       new
		   my $cipher = new Crypt::Blowfish $key;

	   This creates a new Crypt::Blowfish BlockCipher object, using $key,
	   where $key is a key of "keysize()" bytes (minimum of eight bytes).

       encrypt
		   my $cipher = new Crypt::Blowfish $key;
		   my $ciphertext = $cipher->encrypt($plaintext);

	   This function encrypts $plaintext and returns the $ciphertext where
	   $plaintext and $ciphertext must be of "blocksize()" bytes.  (hint:
	   Blowfish is an 8 byte block cipher)

       decrypt
		   my $cipher = new Crypt::Blowfish $key;
		   my $plaintext = $cipher->decrypt($ciphertext);

	   This function decrypts $ciphertext and returns the $plaintext where
	   $plaintext and $ciphertext must be of "blocksize()" bytes.  (hint:
	   see previous hint)

EXAMPLE
	       my $key = pack("H16", "0123456789ABCDEF");  # min. 8 bytes
	       my $cipher = new Crypt::Blowfish $key;
	       my $ciphertext = $cipher->encrypt("plaintex");  # SEE NOTES
	       print unpack("H16", $ciphertext), "\n";

PLATFORMS
	       Please see the README document for platforms and performance
	       tests.

NOTES
       The module is capable of being used with Crypt::CBC.  You're encouraged
       to read the perldoc for Crypt::CBC if you intend to use this module for
       Cipher Block Chaining modes.  In fact, if you have any intentions of
       encrypting more than eight bytes of data with this, or any other block
       cipher, you're going to need some type of block chaining help.
       Crypt::CBC tends to be very good at this.  If you're not going to
       encrypt more than eight bytes, your data must be exactly eight bytes
       long.  If need be, do your own padding. "\0" as a null byte is
       perfectly valid to use for this.	 Additionally, the current maintainer
       for Crypt::Blowfish may or may not release Crypt::CBC_R which replaces
       the default 'RandomIV' initialization vector in Crypt::CBC with a
       random initialization vector.  (to the limits of /dev/urandom and
       associates)  In either case, please email amused@pobox.com for
       Crypt::CBC_R.

SEE ALSO
       Crypt::CBC, Crypt::DES, Crypt::IDEA

       Bruce Schneier, Applied Cryptography, 1995, Second Edition, published
       by John Wiley & Sons, Inc.

COPYRIGHT
       The implementation of the Blowfish algorithm was developed by, and is
       copyright of, A.M. Kuchling.

       Other parts of the perl extension and module are copyright of Systemics
       Ltd ( http://www.systemics.com/ ).

       Code revisions, updates, and standalone release are copyright 1999-2001
       W3Works, LLC.

AUTHOR
       Original algorithm, Bruce Shneier.  Original implementation, A.M.
       Kuchling.  Original Perl implementation, Systemics Ltd.	Current
       maintenance by W3Works, LLC.

       Current revision and maintainer:	 Dave Paris <amused@pobox.com>

perl v5.14.0			  2005-12-02			   Blowfish(3)
[top]

List of man pages available for Pidora

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net