Blowfish
E845867
Blowfish is a symmetric-key block cipher designed by Bruce Schneier, known for its speed and simplicity, and widely used in various encryption applications.
Statements (48)
| Predicate | Object |
|---|---|
| instanceOf |
block cipher
ⓘ
symmetric-key algorithm ⓘ |
| advantage | no known practical attacks on full-round cipher with full key space ⓘ |
| bcryptBasedOn | Blowfish key schedule ⓘ |
| blockSize | 64 bits ⓘ |
| cipherStructure | Feistel network NERFINISHED ⓘ |
| commonUse |
VPN and network protocols in older deployments
ⓘ
file encryption in legacy applications ⓘ password hashing in some systems ⓘ |
| countryOfOrigin |
United States of America
ⓘ
surface form:
United States
|
| designer | Bruce Schneier NERFINISHED ⓘ |
| designGoal |
fast software encryption
ⓘ
public domain availability ⓘ simple implementation ⓘ |
| disadvantage |
inadequate block size for high-volume modern applications
ⓘ
slow key setup compared to encryption speed ⓘ |
| encryptionType | symmetric ⓘ |
| firstPublicationVenue | Fast Software Encryption (FSE) 1993 NERFINISHED ⓘ |
| implementationEase | suitable for compact software implementations ⓘ |
| introducedInYear | 1993 ⓘ |
| keyScheduleComplexity | computationally expensive ⓘ |
| keySizeMaximum | 448 bits ⓘ |
| keySizeMinimum | 32 bits ⓘ |
| keySizeVariable | true ⓘ |
| license | public domain ⓘ |
| modeOfOperationSupport |
CBC
ⓘ
CFB ⓘ CTR ⓘ ECB NERFINISHED ⓘ OFB ⓘ |
| numberOfRounds | 16 ⓘ |
| numberOfSBoxes | 4 ⓘ |
| optimizedFor | 32-bit processors ⓘ |
| pArraySize | 18 32-bit subkeys ⓘ |
| publication | Applied Cryptography by Bruce Schneier NERFINISHED ⓘ |
| recommendedForNewSystems | false ⓘ |
| relatedAlgorithm | bcrypt NERFINISHED ⓘ |
| roundFunctionType | key-dependent S-box based function ⓘ |
| sBoxEntrySize | 32 bits ⓘ |
| standardizationStatus | not an official NIST standard ⓘ |
| status | widely deployed legacy cipher ⓘ |
| successorAlgorithm |
AES
NERFINISHED
ⓘ
Serpent NERFINISHED ⓘ Threefish NERFINISHED ⓘ Twofish NERFINISHED ⓘ |
| usesSBoxes | true ⓘ |
| usesSubkeys | true ⓘ |
| vulnerability | small 64-bit block size leads to birthday attacks on large data volumes ⓘ |
Referenced by (3)
Full triples — surface form annotated when it differs from this entity's canonical label.