Crypt::CipherSaber - Perl module implementing CipherSaber encryption. |
Crypt::CipherSaber - Perl module implementing CipherSaber encryption.
use Crypt::CipherSaber; my $cs = Crypt::CipherSaber->new('my pathetic secret key');
my $coded = $cs->encrypt('Here is a secret message for you'); my $decoded = $cs->decrypt($coded);
# encrypt from and to a file open(INFILE, 'secretletter.txt') or die "Can't open infile: $!"; open(OUTFILE, '>secretletter.cs1') or die "Can't open outfile: $!"; binmode(INFILE); binmode(OUTFILE); $cs->fh_crypt(\*INFILE, \*OUTFILE, 1);
# decrypt from and to a file open(INFILE, 'secretletter.cs1') or die "Can't open infile: $!"; open(OUTFILE, '>secretletter.txt') or die "Can't open outfile: $!"; binmode(INFILE); binmode(OUTFILE); $cs->fh_crypt(\*INFILE, \*OUTFILE);
The Crypt::CipherSaber module implements CipherSaber encryption, described at http://ciphersaber.gurus.com. It is simple, fairly speedy, and relatively secure algorithm based on RC4.
Encryption and decryption are done based on a secret key, which must be shared with all intended recipients of a message.
Note that the encrypted message may contain unprintable characters, as it uses the extended ASCII character set (valid numbers 0 through 255).
The decrypted message may also contain unprintable characters, as the CipherSaber encryption scheme can handle binary files with fair ease. If this is important to you, be sure to treat the results correctly.
rand()
function), you may do so
separately, passing it to this method directly. The IV must be a ten-byte
string consisting of characters from the extended ASCII set.
This is generally only useful for encryption, although you may extract the first ten characters of an encrypted message and pass them in yourself. You might as well call decrypt(), though. The more random the IV, the stronger the encryption tends to be. On some operating systems, you can read from /dev/random. Other approaches are the Math::TrulyRandom module, or compressing a file, removing the headers, and compressing it again.
binmode()
, this is your responsibility. It is also your
responsibility to close the files.
You may also pass in an optional third parameter, an IV. There are three
possibilities here. If you pass no IV, fh_crypt()
will pull the first ten
bytes from *INPUT and use that as an IV. This corresponds to decryption. If
you pass in an IV of your own (generally ten digits, but more than one digits
as the code is now), it will use your own IV when encrypting the file. If you
pass in the value '1', it will generate a new, random IV for you. This
corresponds to an encryption.
Copyright (C) 2000 - 2001 chromatic
This library is free software; you can redistribute it and/or modify it under the same terms as Perl itself.
chromatic <chromatic@wgz.org>
thanks to jlp for testing, moral support, and never fearing the icky details and to the fine folks at http://perlmonks.org
Additional thanks to Olivier Salaun and the Sympa project (http://www.sympa.org) for testing.
the CipherSaber home page at http://ciphersaber.gurus.com
perl(1), rand().
Crypt::CipherSaber - Perl module implementing CipherSaber encryption. |