1bcrypt(1) General Commands Manual bcrypt(1)
2
3
4
6 bcrypt - blowfish file encryption
7
9 bcrypt [-orc][-sN] file ...
10
12 bcrypt encrypts and decrypts files using the blowfish algorithm.
13
14 Encrypted files will be saved with an extension of .bfe. Any files
15 ending in .bfe will be assumed to be encrypted with bcrypt and will
16 attempt to decrypt them. Any other input files will be encrypted. If
17 more than one type of file is given, bcrypt will process all files
18 which are the same as the first filetype given.
19
20 By default, bcrypt will compress input files before encryption, remove
21 input files after they are processed (assuming they are processed suc‐
22 cessfully) and overwrite input files with random data to prevent data
23 recovery.
24
25 Passphrases may be between 8 and 56 characters. Regardless of the
26 passphrase size, the key is hashed internally to 448 bits - the largest
27 keysize supported by the blowfish algorithm. However, it is still wise
28 to use a strong passphrase.
29
31 -o print output to standard out. Implies -r.
32
33 -c DO NOT compress files before encryption.
34
35 -r DO NOT remove input files after processing
36
37 -sN How many times to overwrite input files with random data before
38 deleting. The default number of overwrites is 3. Use -s0 to
39 disable this feature. No effect if -r is supplied.
40
42 The -o ,-r ,and -c options each have the opposite effects if the appro‐
43 priate settings are altered from the defaults in config.h. To determine
44 what effect each of these have on your system, run bcrypt without any
45 options.
46
47 Encrypted files should be compatible between most systems. Binary com‐
48 patibility has been tested on all supported systems. There is a list of
49 supported systems in the README file that was included with this soft‐
50 ware.
51
53 Probably. If you find that it will not compile and run on your system,
54 or that encrypted files are not compatible with other platforms, its
55 probably because I don't have access to the platform in question.
56 Patches or access to an unsupported machine are welcome.
57
59 johnny shelley
60 <jshelley@cahaus.com>, <jshelley@ictransnet.com>
61
63 bcrypt includes Paul Kocher's implementation of the blowfish algorithm.
64 The version distributed with bcrypt has been altered. Original sources
65 are available from http://www.counterpane.com/bfsh-koc.zip
66
67
68
69version 1.1 10 September 2002 bcrypt(1)