Clear questions and runnable code get the best and fastest answer |
|
PerlMonks |
comment on |
( [id://3333]=superdoc: print w/replies, xml ) | Need Help?? |
Very bad recommendation. You added padding, but you're neither salting nor chaining. You are seriously undermining the encryption by using it directly instead of using Crypt::CBC. By avoiding Crypt::CBC, you're actually making the code longer and much more complex, risking the addition of errors and making it harder to maintain. It's not just speculative either. You added a bug. Any input matching /\x00\n?\z/ cannot be encoded. Blowfish is a secure algorithm, but like all algorithms, they're only secure when used properly. In reply to Re^2: Crypt Blowfish
by ikegami
|
|