|Description:||Implements Blowfish cryptographic algorithm. Among the routines supplied are key initialization, the encoding of any amount of text (in a string) into a list of codes, and the decoding of such a list back into plain text. In addition, one routine is supplied that, when called, resets the subkey lists to some arbitrary initial value (the digits of Pi) so that no-one can use the subkeys to encode or decode messages in your name.|
|Author:||Michael Kuyumcu |
|Downloaded file size:||124526 bytes|
|Size on calculator:||29 KB|
|User rating:||Not yet rated (you must be logged in to vote)|
|File date:||2007/08/04 19:04:15|
|Site update history:||2007/08/04: Added to site|
| Length Date Time Name|
-------- ---- ---- ----
28928 07-21-07 18:53 BF06.hp
27890 07-21-07 18:54 BF06.txt
149683 07-21-07 19:11 Blowfish_06_doc.pdf
206501 3 files
No comments at this time.
You must be logged in to add your own comment.