hello;
have you checked that your blowfish encryption/decryption
are functioning correctly re: messages of different
lengths? the reason i suggest this is that is is easy to
use blowfish but different schemes have different methods
of implementing the 'end block' problem; these can
sometimes cause problems; at least they did when i implemented blowfish (:-)) to check if this is the case,
just send a set of messages containing a consecutive
range of bytes, and examine the results with od -c
or something to ensure the implementor of blowfish
has done his/her job properly.
hoping this helps,
kh.