Implements Blowfish cryptographic algorithm. Among the routines supplied are key initialization, the encoding of any amount of text (in a string) into a list of codes, and the decoding of such a list back into plain text. In addition, one routine is supplied that, when called, resets the subkey lists to some arbitrary initial value (the digits of Pi) so that no-one can use the subkeys to encode or decode messages in your name. |