2018-03-22 15:51:09 +01:00
|
|
|
package Crypt::Cipher::SAFER_SK64;
|
|
|
|
|
|
|
|
### BEWARE - GENERATED FILE, DO NOT EDIT MANUALLY!
|
|
|
|
|
|
|
|
use strict;
|
|
|
|
use warnings;
|
2018-03-22 15:54:03 +01:00
|
|
|
our $VERSION = '0.058_002';
|
2018-03-22 15:51:09 +01:00
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
use base qw(Crypt::Cipher);
|
2018-03-22 15:51:09 +01:00
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
sub blocksize { Crypt::Cipher::blocksize('SAFER_SK64') }
|
|
|
|
sub keysize { Crypt::Cipher::keysize('SAFER_SK64') }
|
|
|
|
sub max_keysize { Crypt::Cipher::max_keysize('SAFER_SK64') }
|
|
|
|
sub min_keysize { Crypt::Cipher::min_keysize('SAFER_SK64') }
|
|
|
|
sub default_rounds { Crypt::Cipher::default_rounds('SAFER_SK64') }
|
2018-03-22 15:51:09 +01:00
|
|
|
|
|
|
|
1;
|
|
|
|
|
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
Crypt::Cipher::SAFER_SK64 - Symmetric cipher SAFER_SK64, key size: 64 bits (Crypt::CBC compliant)
|
2018-03-22 15:51:09 +01:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
### example 1
|
|
|
|
use Crypt::Mode::CBC;
|
|
|
|
|
|
|
|
my $key = '...'; # length has to be valid key size for this cipher
|
|
|
|
my $iv = '...'; # 16 bytes
|
|
|
|
my $cbc = Crypt::Mode::CBC->new('SAFER_SK64');
|
|
|
|
my $ciphertext = $cbc->encrypt("secret data", $key, $iv);
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
### example 2 (slower)
|
2018-03-22 15:51:09 +01:00
|
|
|
use Crypt::CBC;
|
|
|
|
use Crypt::Cipher::SAFER_SK64;
|
|
|
|
|
|
|
|
my $key = '...'; # length has to be valid key size for this cipher
|
|
|
|
my $iv = '...'; # 16 bytes
|
|
|
|
my $cbc = Crypt::CBC->new( -cipher=>'Cipher::SAFER_SK64', -key=>$key, -iv=>$iv );
|
|
|
|
my $ciphertext = $cbc->encrypt("secret data");
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
This module implements the SAFER_SK64 cipher. Provided interface is compliant with L<Crypt::CBC|Crypt::CBC> module.
|
|
|
|
|
|
|
|
B<BEWARE:> This module implements just elementary "one-block-(en|de)cryption" operation - if you want to
|
|
|
|
encrypt/decrypt generic data you have to use some of the cipher block modes - check for example
|
|
|
|
L<Crypt::Mode::CBC|Crypt::Mode::CBC>, L<Crypt::Mode::CTR|Crypt::Mode::CTR> or L<Crypt::CBC|Crypt::CBC> (which will be slower).
|
|
|
|
|
|
|
|
=head1 METHODS
|
|
|
|
|
|
|
|
=head2 new
|
|
|
|
|
|
|
|
$c = Crypt::Cipher::SAFER_SK64->new($key);
|
|
|
|
#or
|
|
|
|
$c = Crypt::Cipher::SAFER_SK64->new($key, $rounds);
|
|
|
|
|
|
|
|
=head2 encrypt
|
|
|
|
|
|
|
|
$ciphertext = $c->encrypt($plaintext);
|
|
|
|
|
|
|
|
=head2 decrypt
|
|
|
|
|
|
|
|
$plaintext = $c->decrypt($ciphertext);
|
|
|
|
|
|
|
|
=head2 keysize
|
|
|
|
|
|
|
|
$c->keysize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64->keysize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64::keysize;
|
|
|
|
|
|
|
|
=head2 blocksize
|
|
|
|
|
|
|
|
$c->blocksize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64->blocksize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64::blocksize;
|
|
|
|
|
|
|
|
=head2 max_keysize
|
|
|
|
|
|
|
|
$c->max_keysize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64->max_keysize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64::max_keysize;
|
|
|
|
|
|
|
|
=head2 min_keysize
|
|
|
|
|
|
|
|
$c->min_keysize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64->min_keysize;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64::min_keysize;
|
|
|
|
|
|
|
|
=head2 default_rounds
|
|
|
|
|
|
|
|
$c->default_rounds;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64->default_rounds;
|
|
|
|
#or
|
|
|
|
Crypt::Cipher::SAFER_SK64::default_rounds;
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
=over
|
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
=item * L<CryptX|CryptX>, L<Crypt::Cipher>
|
2018-03-22 15:51:09 +01:00
|
|
|
|
2018-03-22 15:54:03 +01:00
|
|
|
=item * L<https://en.wikipedia.org/wiki/SAFER>
|
2018-03-22 15:51:09 +01:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=cut
|