1bcrypt(1)                   General Commands Manual                  bcrypt(1)
2
3
4

NAME

6       bcrypt - blowfish file encryption
7

SYNOPSIS

9       bcrypt [-orc][-sN] file ...
10

DESCRIPTION

12       bcrypt encrypts and decrypts files using the blowfish algorithm.
13
14       Encrypted  files  will  be  saved with an extension of .bfe.  Any files
15       ending in .bfe will be assumed to be encrypted  with  bcrypt  and  will
16       attempt  to  decrypt them. Any other input files will be encrypted.  If
17       more than one type of file is given,  bcrypt  will  process  all  files
18       which are the same as the first filetype given.
19
20       By  default, bcrypt will compress input files before encryption, remove
21       input files after they are processed (assuming they are processed  suc‐
22       cessfully)  and  overwrite input files with random data to prevent data
23       recovery.
24
25       Passphrases may be between 8  and  56  characters.  Regardless  of  the
26       passphrase size, the key is hashed internally to 448 bits - the largest
27       keysize supported by the blowfish algorithm. However, it is still  wise
28       to use a strong passphrase.
29

OPTIONS

31       -o     print output to standard out. Implies -r.
32
33       -c     DO NOT compress files before encryption.
34
35       -r     DO NOT remove input files after processing
36
37       -sN    How  many times to overwrite input files with random data before
38              deleting.  The default number of overwrites is  3.  Use  -s0  to
39              disable this feature. No effect if -r is supplied.
40

NOTES

42       The -o ,-r ,and -c options each have the opposite effects if the appro‐
43       priate settings are altered from the defaults in config.h. To determine
44       what  effect  each of these have on your system, run bcrypt without any
45       options.
46
47       Encrypted files should be compatible between most systems.  Binary com‐
48       patibility has been tested on all supported systems. There is a list of
49       supported systems in the README file that was included with this  soft‐
50       ware.
51

BUGS

53       Probably.  If you find that it will not compile and run on your system,
54       or that encrypted files are not compatible with  other  platforms,  its
55       probably  because  I  don't  have  access  to the platform in question.
56       Patches or access to an unsupported machine are welcome.
57

AUTHOR

59       johnny shelley
60              <jshelley@cahaus.com>, <jshelley@ictransnet.com>
61

DISTRIBUTION

63       bcrypt includes Paul Kocher's implementation of the blowfish algorithm.
64       The  version distributed with bcrypt has been altered. Original sources
65       are available from http://www.counterpane.com/bfsh-koc.zip
66
67
68
69version 1.1                    10 September 2002                     bcrypt(1)
Impressum