.\" -*- mode: troff; coding: utf-8 -*- .\" Automatically generated by Pod::Man 5.01 (Pod::Simple 3.43) .\" .\" Standard preamble: .\" ======================================================================== .de Sp \" Vertical space (when we can't use .PP) .if t .sp .5v .if n .sp .. .de Vb \" Begin verbatim text .ft CW .nf .ne \\$1 .. .de Ve \" End verbatim text .ft R .fi .. .\" \*(C` and \*(C' are quotes in nroff, nothing in troff, for use with C<>. .ie n \{\ . ds C` "" . ds C' "" 'br\} .el\{\ . ds C` . ds C' 'br\} .\" .\" Escape single quotes in literal strings from groff's Unicode transform. .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" .\" If the F register is >0, we'll generate index entries on stderr for .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index .\" entries marked with X<> in POD. Of course, you'll have to process the .\" output yourself in some meaningful fashion. .\" .\" Avoid warning from groff about undefined register 'F'. .de IX .. .nr rF 0 .if \n(.g .if rF .nr rF 1 .if (\n(rF:(\n(.g==0)) \{\ . if \nF \{\ . de IX . tm Index:\\$1\t\\n%\t"\\$2" .. . if !\nF==2 \{\ . nr % 0 . nr F 2 . \} . \} .\} .rr rF .\" ======================================================================== .\" .IX Title "Crypt::Eksblowfish 3pm" .TH Crypt::Eksblowfish 3pm 2024-03-07 "perl v5.38.2" "User Contributed Perl Documentation" .\" For nroff, turn off justification. Always turn off hyphenation; it makes .\" way too many mistakes in technical documents. .if n .ad l .nh .SH NAME Crypt::Eksblowfish \- the Eksblowfish block cipher .SH SYNOPSIS .IX Header "SYNOPSIS" .Vb 1 \& use Crypt::Eksblowfish; \& \& $block_size = Crypt::Eksblowfish\->blocksize; \& \& $cipher = Crypt::Eksblowfish\->new(8, $salt, $key); \& \& $block_size = $cipher\->blocksize; \& $ciphertext = $cipher\->encrypt($plaintext); \& $plaintext = $cipher\->decrypt($ciphertext); \& \& $p_array = $cipher\->p_array; \& $s_boxes = $cipher\->s_boxes; \& if($cipher\->is_weak) { ... .Ve .SH DESCRIPTION .IX Header "DESCRIPTION" An object of this type encapsulates a keyed instance of the Eksblowfish block cipher, ready to encrypt and decrypt. .PP Eksblowfish is a variant of the Blowfish cipher, modified to make the key setup very expensive. ("Eks" stands for "expensive key schedule".) This doesn't make it significantly cryptographically stronger, but is intended to hinder brute-force attacks. It also makes it unsuitable for any application requiring key agility. It was designed by Niels Provos and David Mazieres for password hashing in OpenBSD. See Crypt::Eksblowfish::Bcrypt for the hash algorithm. See Crypt::Eksblowfish::Blowfish for the unmodified Blowfish cipher. .PP Eksblowfish is a parameterised (family-keyed) cipher. It takes a cost parameter that controls how expensive the key scheduling is. It also takes a family key, known as the "salt". Cost and salt parameters together define a cipher family. Within each family, a key determines an encryption function in the usual way. See Crypt::Eksblowfish::Family for a way to encapsulate an Eksblowfish cipher family. .SH "CLASS METHODS" .IX Header "CLASS METHODS" .IP Crypt::Eksblowfish\->blocksize 4 .IX Item "Crypt::Eksblowfish->blocksize" Returns 8, indicating the Eksblowfish block size of 8 octets. This method may be called on either the class or an instance. .SH CONSTRUCTOR .IX Header "CONSTRUCTOR" .IP "Crypt::Eksblowfish\->new(COST, SALT, KEY)" 4 .IX Item "Crypt::Eksblowfish->new(COST, SALT, KEY)" Performs key setup on a new instance of the Eksblowfish algorithm, returning the keyed state. The KEY may be any length from 1 octet to 72 octets inclusive. The SALT is a family key, and must be exactly 16 octets. COST is an integer parameter controlling the expense of keying: the number of operations in key setup is proportional to 2^COST. All three parameters influence all the subkeys; changing any of them produces a different encryption function. .Sp Due to the mandatory family-keying parameters (COST and SALT), this constructor does not match the interface expected by \f(CW\*(C`Crypt::CBC\*(C'\fR and similar crypto plumbing modules. To use Eksblowfish with them it is necessary to have an object that encapsulates a cipher family and provides a constructor that takes only a key argument. That facility is supplied by \f(CW\*(C`Crypt::Eksblowfish::Family\*(C'\fR. .SH METHODS .IX Header "METHODS" .ie n .IP $cipher\->blocksize 4 .el .IP \f(CW$cipher\fR\->blocksize 4 .IX Item "$cipher->blocksize" Returns 8, indicating the Eksblowfish block size of 8 octets. This method may be called on either the class or an instance. .ie n .IP $cipher\->encrypt(PLAINTEXT) 4 .el .IP \f(CW$cipher\fR\->encrypt(PLAINTEXT) 4 .IX Item "$cipher->encrypt(PLAINTEXT)" PLAINTEXT must be exactly eight octets. The block is encrypted, and the ciphertext is returned. .ie n .IP $cipher\->decrypt(CIPHERTEXT) 4 .el .IP \f(CW$cipher\fR\->decrypt(CIPHERTEXT) 4 .IX Item "$cipher->decrypt(CIPHERTEXT)" CIPHERTEXT must be exactly eight octets. The block is decrypted, and the plaintext is returned. .ie n .IP $cipher\->p_array 4 .el .IP \f(CW$cipher\fR\->p_array 4 .IX Item "$cipher->p_array" .PD 0 .ie n .IP $cipher\->s_boxes 4 .el .IP \f(CW$cipher\fR\->s_boxes 4 .IX Item "$cipher->s_boxes" .PD These methods extract the subkeys from the keyed cipher. This is not required in ordinary operation. See the superclass Crypt::Eksblowfish::Subkeyed for details. .ie n .IP $cipher\->is_weak 4 .el .IP \f(CW$cipher\fR\->is_weak 4 .IX Item "$cipher->is_weak" This method checks whether the cipher has been keyed with a weak key. It may be desired to avoid using weak keys. See the superclass Crypt::Eksblowfish::Subkeyed for details. .SH "SEE ALSO" .IX Header "SEE ALSO" Crypt::Eksblowfish::Bcrypt, Crypt::Eksblowfish::Blowfish, Crypt::Eksblowfish::Family, Crypt::Eksblowfish::Subkeyed, .SH AUTHOR .IX Header "AUTHOR" Eksblowfish guts originally by Solar Designer (solar at openwall.com). .PP Modifications and Perl interface by Andrew Main (Zefram) . .SH COPYRIGHT .IX Header "COPYRIGHT" Copyright (C) 2006, 2007, 2008, 2009, 2010, 2011 Andrew Main (Zefram) .PP The original Eksblowfish code (in the form of \fBcrypt()\fR) from which this module is derived is in the public domain. It may be found at . .SH LICENSE .IX Header "LICENSE" This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself.