I know on SuSE's linux distribution, they use Blowfish as their optional higher security password encryption. Here is a simple example( there are also PP PurePerl version of Blowfish , although it is probably slow.)
#!/usr/bin/perl
# by Tachyon
use Crypt::Blowfish;
use Crypt::CBC;
$KEY = 'GNUisnotUnix'; # Blowfish will take 56 bytes (448 bits) of ke
+y
my $cipher = new Crypt::CBC( $KEY, 'Blowfish' );
my $enc = encrypt('Hello World');
my $dec = decrypt($enc);
print "$enc\n$dec\n";
sub decrypt { defined $_[0] ? $cipher->decrypt_hex($_[0]) : '' }
sub encrypt { defined $_[0] ? $cipher->encrypt_hex($_[0]) : '' }
__END__
Although I agree with the sentiment that you are not negligent using MD5, since it takes alot of cpu power to crack MD5, and the spy-guys have easier ways to get your passwords if they really want them. They keep it a big secret how they do it, but it's pretty easy, and even Blowfish won't help you against them.
Posts are HTML formatted. Put <p> </p> tags around your paragraphs. Put <code> </code> tags around your code and data!
Titles consisting of a single word are discouraged, and in most cases are disallowed outright.
Read Where should I post X? if you're not absolutely sure you're posting in the right place.
Please read these before you post! —
Posts may use any of the Perl Monks Approved HTML tags:
- a, abbr, b, big, blockquote, br, caption, center, col, colgroup, dd, del, details, div, dl, dt, em, font, h1, h2, h3, h4, h5, h6, hr, i, ins, li, ol, p, pre, readmore, small, span, spoiler, strike, strong, sub, summary, sup, table, tbody, td, tfoot, th, thead, tr, tt, u, ul, wbr
You may need to use entities for some characters, as follows. (Exception: Within code tags, you can put the characters literally.)
| |
For: |
|
Use: |
| & | | & |
| < | | < |
| > | | > |
| [ | | [ |
| ] | | ] |
Link using PerlMonks shortcuts! What shortcuts can I use for linking?
See Writeup Formatting Tips and other pages linked from there for more info.