Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

crypt::rijndael(3pm) [debian man page]

Rijndael(3pm)						User Contributed Perl Documentation					     Rijndael(3pm)

NAME
Crypt::Rijndael - Crypt::CBC compliant Rijndael encryption module SYNOPSIS
use Crypt::Rijndael; # keysize() is 32, but 24 and 16 are also possible # blocksize() is 16 $cipher = Crypt::Rijndael->new( "a" x 32, Crypt::Rijndael::MODE_CBC() ); $cipher->set_iv($iv); $crypted = $cipher->encrypt($plaintext); # - OR - $plaintext = $cipher->decrypt($crypted); DESCRIPTION
This module implements the Rijndael cipher, which has just been selected as the Advanced Encryption Standard. keysize Returns the keysize, which is 32 (bytes). The Rijndael cipher actually supports keylengths of 16, 24 or 32 bytes, but there is no way to communicate this to "Crypt::CBC". blocksize The blocksize for Rijndael is 16 bytes (128 bits), although the algorithm actually supports any blocksize that is any multiple of our bytes. 128 bits, is however, the AES-specified block size, so this is all we support. $cipher = Crypt::Rijndael->new( $key [, $mode] ) Create a new "Crypt::Rijndael" cipher object with the given key (which must be 128, 192 or 256 bits long). The additional $mode argument is the encryption mode, either "MODE_ECB" (electronic codebook mode, the default), "MODE_CBC" (cipher block chaining, the same that "Crypt::CBC" does), "MODE_CFB" (128-bit cipher feedback), "MODE_OFB" (128-bit output feedback), or "MODE_CTR" (counter mode). ECB mode is very insecure (read a book on cryptography if you dont know why!), so you should probably use CBC mode. $cipher->set_iv($iv) This allows you to change the initial value vector used by the chaining modes. It is not relevant for ECB mode. $cipher->encrypt($data) Encrypt data. The size of $data must be a multiple of "blocksize" (16 bytes), otherwise this function will croak. Apart from that, it can be of (almost) any length. $cipher->decrypt($data) Decrypts $data. Encryption modes Use these constants to select the cipher type: MODE_CBC - Cipher Block Chaining MODE_CFB - Cipher feedback MODE_CTR - Counter mode MODE_ECB - Electronic cookbook mode MODE_OFB - Output feedback MODE_PCBC - ignore this one for now :) SEE ALSO
Crypt::CBC, http://www.csrc.nist.gov/encryption/aes/ BUGS
Should EXPORT or EXPORT_OK the MODE constants. AUTHOR
Currently maintained by brian d foy, "<bdfoy@cpan.org>". Original code by Rafael R. Sevilla. The Rijndael Algorithm was developed by Vincent Rijmen and Joan Daemen, and has been selected as the US Government's Advanced Encryption Standard. SOURCE
This code is in Github: git://github.com/briandfoy/crypt-rijndael.git LICENSE
This software is licensed under the Lesser GNU Public License. See the included COPYING file for details. perl v5.14.2 2009-12-10 Rijndael(3pm)

Check Out this Related Man Page

Blowfish(3pm)						User Contributed Perl Documentation					     Blowfish(3pm)

NAME
Crypt::Blowfish - Perl Blowfish encryption module SYNOPSIS
use Crypt::Blowfish; my $cipher = new Crypt::Blowfish $key; my $ciphertext = $cipher->encrypt($plaintext); my $plaintext = $cipher->decrypt($ciphertext); You probably want to use this in conjunction with a block chaining module like Crypt::CBC. DESCRIPTION
Blowfish is capable of strong encryption and can use key sizes up to 56 bytes (a 448 bit key). You're encouraged to take advantage of the full key size to ensure the strongest encryption possible from this module. Crypt::Blowfish has the following methods: blocksize() keysize() encrypt() decrypt() FUNCTIONS
blocksize Returns the size (in bytes) of the block cipher. Crypt::Blowfish doesn't return a key size due to its ability to use variable-length keys. More accurately, it shouldn't, but it does anyway to play nicely with others. new my $cipher = new Crypt::Blowfish $key; This creates a new Crypt::Blowfish BlockCipher object, using $key, where $key is a key of "keysize()" bytes (minimum of eight bytes). encrypt my $cipher = new Crypt::Blowfish $key; my $ciphertext = $cipher->encrypt($plaintext); This function encrypts $plaintext and returns the $ciphertext where $plaintext and $ciphertext must be of "blocksize()" bytes. (hint: Blowfish is an 8 byte block cipher) decrypt my $cipher = new Crypt::Blowfish $key; my $plaintext = $cipher->decrypt($ciphertext); This function decrypts $ciphertext and returns the $plaintext where $plaintext and $ciphertext must be of "blocksize()" bytes. (hint: see previous hint) EXAMPLE
my $key = pack("H16", "0123456789ABCDEF"); # min. 8 bytes my $cipher = new Crypt::Blowfish $key; my $ciphertext = $cipher->encrypt("plaintex"); # SEE NOTES print unpack("H16", $ciphertext), " "; PLATFORMS
Please see the README document for platforms and performance tests. NOTES
The module is capable of being used with Crypt::CBC. You're encouraged to read the perldoc for Crypt::CBC if you intend to use this module for Cipher Block Chaining modes. In fact, if you have any intentions of encrypting more than eight bytes of data with this, or any other block cipher, you're going to need some type of block chaining help. Crypt::CBC tends to be very good at this. If you're not going to encrypt more than eight bytes, your data must be exactly eight bytes long. If need be, do your own padding. "" as a null byte is perfectly valid to use for this. SEE ALSO
Crypt::CBC, Crypt::DES, Crypt::IDEA Bruce Schneier, Applied Cryptography, 1995, Second Edition, published by John Wiley & Sons, Inc. COPYRIGHT
The implementation of the Blowfish algorithm was developed by, and is copyright of, A.M. Kuchling. Other parts of the perl extension and module are copyright of Systemics Ltd ( http://www.systemics.com/ ). Code revisions, updates, and standalone release are copyright 1999-2010 W3Works, LLC. AUTHOR
Original algorithm, Bruce Shneier. Original implementation, A.M. Kuchling. Original Perl implementation, Systemics Ltd. Current maintenance by W3Works, LLC. Current revision and maintainer: Dave Paris <amused@pobox.com> perl v5.14.2 2010-03-04 Blowfish(3pm)
Man Page