[66708] in Cypherpunks
Re: WARNING: This Message Actually Contains a Question Reguarding Crypto!
daemon@ATHENA.MIT.EDU (=?ISO-8859-1?Q?J=FCri_Kaljundi?=)
Sat Sep 28 10:50:05 1996
Date: Sat, 28 Sep 1996 17:35:03 +0300 (EET DST)
From: =?ISO-8859-1?Q?J=FCri_Kaljundi?= <jk@stallion.ee>
Reply-To: =?ISO-8859-1?Q?J=FCri_Kaljundi?= <jk@stallion.ee>
To: "William H. Geiger III" <whgiii@amaranth.com>
Cc: cypherpunks@toad.com
In-Reply-To: <199609241649.LAA22238@mailhub.amaranth.com>
Tue, 24 Sep 1996, William H. Geiger III wrote:
> I just recently downloaded copies of Blowfish & Ghost.
>=20
> Does anyone have any experiance with these two algorithims?
>=20
> Does anyone know how they are using Blowfish and why?
A program called F-Secure Desktop for Windows 3.x and Windows 95 is using
Blowfish with 256-bit keys. It is meant for encrypting the files on your
hard disk and it works nicely together with Windows File Manager or
Windows95 shell. I would say it is one of the best strong and easy to use
HD encryption programs (only that it costs $$).
It is manufactured by Datafellows, who is also distributing F-Secure SSH.
You can download the demo version at http://www.datafellows.com/f-secure/
Why they are using it: may be because it is fast on Intel Pentium and
Pentium Pro processors, as discussed in Applied Cryptography?=20
J=FCri Kaljundi
AS Stallion
jk@stallion.ee