Software Index
Linux Software Security Tools  

The Blowfish cipher

download download home home   report broken
important software information
company name:
Olaf Titz
license: Freeware
minimum requirements: No special requirements.
functional limitations:
The Blowfish cipher description
The Blowfish cipher in C and i386 assembler.

In cryptography, Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites and encryption products. While no effective cryptanalysis of Blowfish has been found to date, more attention is now given to block ciphers with a larger block size, such as AES or Twofish.

Schneier designed Blowfish as a general-purpose algorithm, intended as a replacement for the aging DES and free of the problems associated with other algorithms. At the time, many other designs were proprietary, encumbered by patents or kept as government secrets. Schneier has stated that, "Blowfish is unpatented, and will remain so in all countries. The algorithm is hereby placed in the public domain, and can be freely used by anyone.". Webseiten der INKA-Nutzer. Publisher of The Blowfish cipher, Author of The Blowfish cipher i386. The Blowfish cipher in C and i386 assembler. In cryptography, Blowfish is a keyed, symmetric block cipher, designed in 1993 by Bruce Schneier and included in a large number of cipher suites
Similar software
phpass (Popularity: ) : phpass is a portable PHP password hashing framework.

This is a portable public domain password hashing framework for use in PHP applications. It is meant to work with PHP 3 and above, and it has actually been tested with PHP 3.0.18, ...

pam_tcb (Popularity: ) : pam_tcb is an alternative to shadow. The tcb package contains core components of our tcb suite implementing the alternative password shadowing scheme on Owl.

It is being made available separately from Owl primarily for use by other distributions. Note that you ...

pam_userpass (Popularity: ) : PAM has traditionally assumed that services doing authentication have the ability to interact with the user. Unfortunately, this isn't true for services that implement non-interactive and/or fixed protocols, such as FTP and POP3.

This is typically worked around by making the ...

passwdqc (Popularity: ) : pam_passwdqc is a simple password strength checking module for PAM-aware password changing programs, such as passwd.

In addition to checking regular passwords, it offers support for passphrases and can provide randomly generated ones. All features are optional and can be (re-)configured ...

Secret Squirrel (Popularity: ) : Secret Squirrel project is a password manager.

Secret Squirrel is a basic password management application written in Java.

It uses Blowfish and SHA-384, performs password generation using the Java secure random object (fully configurable), and supports password groups. Michael Eddington - Publisher ...

Secure Storage service for the gLite middleware (Popularity: ) : Secure Storage service for the gLite middleware project provides users with a set of tools to store in a secure way and in an encrypted format confidential data (e.g. medical or financial data) on the grid storage elements.

The data stored ...

Trfcrypt (Popularity: ) : trfcrypt is an add-on package to the tcl-extension trf. It provides the encryption functionality which was removed from the base package to allow its inclusion on the Tcl/Tk CDROM without violating US export control laws on cryptography.

The C API is ...

Bcrypt (Popularity: ) : Bcrypt project is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well.

In addition to providing 448-bit encryption, Bcrypt overwrites input files with random garbage.. Bcrypt - ...

CyaSSL (Popularity: ) : CyaSSL package is a fast, dual-licensed implementation of SSL for embedded and small footprint devices. It includes SSL client libraries and an SSL server implementation.

CyaSSL supports multiple APIs including an OpenSSL compatibility interface. TLS 1.1 is supported along with cipher ...

OpenSS7 (Popularity: ) : OpenSS7 is an opensource development project to provide robust and GPL'ed SS7 stack for Linux and other UN*X operation systems.

Perhaps we should have called it LinuxSS7, or SS7-For-The-Common-Man, or SS7-For-The-Rest-Of-Us, but we're kinda attached to the name OpenSS7 as this ...

Truecrypt mount/unmount scripts (Popularity: ) : Truecrypt mount/unmount scripts contains two .sh files for mounting and unmounting truecrypt partitions with some dialogues. When mounting a password is asked and when unmounting both normal and forced mounting is supported, asking the user what to do in each ...
tarmill (Popularity: ) : tarmill project is a tar file compression/encryption program.

This is a program to compress and encrypt tar archives. Each archive member is handled separately, so damage in the middle of the archive does not render the rest of the archive unusable ...

User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Similar scripts
Encrypt using numbers Caesar cipher (Popularity: ) : Encrypt using the Caesar Cipher
Substitution Cipher encoder and decoder (Popularity: ) : This function uses frequency analysis to attack and decode messagesencoded using a /substitution cipher/ which exchanges each letter of thealphabet for another. Unlike the famous "Caesar Shift" cipher, which"shifts" the letters of the alphabet along by a certain amount, givingjust ...
Character/ symbol frequency distribution analaysis on vintage ciphers (Popularity: ) : The objective is to demonstrate character/ symbol frequency distribution analysis (reference to the English language) on 2 vintage ciphers, namely Caesar cipher (a mono-alphabetic substitution cipher) and the Vigenere cipher (a poly-alphabetic substitution cipher).Under the symbol frequency distribution analysis, the ...
AES encryption (Popularity: ) : In short, here's what this module does:For site owners:This module can provide you with readable passwords. Some users will be able to see other users passwords in plain text if they have a role with the permission to do so.For ...
JEnigma (Popularity: ) : JEnigma is a java API to implement the Enigma cipher, as used by the Enigma encryption machine.
Cipher Block Encryption (Popularity: ) : This cipher encryption starts by buffering the message to be encrypted, then separating the buffered string into equal numbered blocks, a random number is then generated and used along with the key to encrypt each block simultaneously, thus speeding up ...
Crypt::Blowfish (Popularity: ) : Crypt::Blowfish provides Blowfish block cipher enion.:Cry
JSch for Security Systems (Popularity: ) : It can be integrated into any Java program and provide a connection to a sshd server and use port forwarding, X11 forwarding, file transfer, etc.It can automatically encrypt, authenticate, and compress transmitted data.Here are some key features of "JSch":dlTE JSch ...
A5/1 cipher (Popularity: ) : The code generates binary sequence of a given length and then writes it to a .txt file. the sequence generated is random in nature and this cipher was used in GSM for 2 decades
1 Click Encrypt (Popularity: ) : This program gives cost effective security solutions to generate your own cipher key to protect all your important files, documents and data. This '1 Click Encrypt' program employs Gamma, AES, GHOST, Blowfish cryptographic algorithms for encrytping and decrypting documents and ...
Rate me
supported os's
stats
downloads 17
version i386
size in Kb 10
popularity   
1213/1272475
user rating 0/10
our rating 0 Stars
share info
Recommend The Blowfish cipher
Report spyware
New Software
Popular Software
Latest Reviews