Crypt::Blowfish_PP only provides means of encrypting and decrypting 8-byte blocks. Being able to encrypt and decrypt blocks is just part of "encryption".
- Were you just passing random length strings to encrypt? You need padding.
- Were you planning on encrypting every block with the same key? You need chaining.
- Were you planning on encrypting every conversation with the same key? You need salting.
Crypt::CBC is a facility to provide padding, chaining and salting.
That still leaves
- key management, (How do you give the key to both hosts? How does each host protect the key? How do you know the protection works? What happens when the protection fails? Until when is the key valid? What happens if the key is compromised? etc.)
- algorithm management, (How do you know Blowfish is still secure? What happens when Blowfish is not secure? How do you know the implementation is secure? What happens when the implementation is no longer secure? etc.),
- ...
And that's just to protect the data in transit.
-
Are you posting in the right place? Check out Where do I post X? to know for sure.
-
Posts may use any of the Perl Monks Approved HTML tags. Currently these include the following:
<code> <a> <b> <big>
<blockquote> <br /> <dd>
<dl> <dt> <em> <font>
<h1> <h2> <h3> <h4>
<h5> <h6> <hr /> <i>
<li> <nbsp> <ol> <p>
<small> <strike> <strong>
<sub> <sup> <table>
<td> <th> <tr> <tt>
<u> <ul>
-
Snippets of code should be wrapped in
<code> tags not
<pre> tags. In fact, <pre>
tags should generally be avoided. If they must
be used, extreme care should be
taken to ensure that their contents do not
have long lines (<70 chars), in order to prevent
horizontal scrolling (and possible janitor
intervention).
-
Want more info? How to link
or How to display code and escape characters
are good places to start.
|