From: =?ISO-8859-1?Q?J=FCri_Kaljundi?= <jk@stallion.ee>
To: “William H. Geiger III” <whgiii@amaranth.com>
Message Hash: 3d48e42774a756fb6eb9ead1bbcf81efb0886087c19b41415c68edba1ae4d769
Message ID: <Pine.GSO.3.93.960928172435.22940D-100000@nebula>
Reply To: <199609241649.LAA22238@mailhub.amaranth.com>
UTC Datetime: 1996-09-28 16:34:01 UTC
Raw Date: Sun, 29 Sep 1996 00:34:01 +0800
From: =?ISO-8859-1?Q?J=FCri_Kaljundi?= <jk@stallion.ee>
Date: Sun, 29 Sep 1996 00:34:01 +0800
To: "William H. Geiger III" <whgiii@amaranth.com>
Subject: Re: WARNING: This Message Actually Contains a Question Reguarding Crypto!
In-Reply-To: <199609241649.LAA22238@mailhub.amaranth.com>
Message-ID: <Pine.GSO.3.93.960928172435.22940D-100000@nebula>
MIME-Version: 1.0
Content-Type: text/plain
Tue, 24 Sep 1996, William H. Geiger III wrote:
> I just recently downloaded copies of Blowfish & Ghost.
>
> Does anyone have any experiance with these two algorithims?
>
> Does anyone know how they are using Blowfish and why?
A program called F-Secure Desktop for Windows 3.x and Windows 95 is using
Blowfish with 256-bit keys. It is meant for encrypting the files on your
hard disk and it works nicely together with Windows File Manager or
Windows95 shell. I would say it is one of the best strong and easy to use
HD encryption programs (only that it costs $$).
It is manufactured by Datafellows, who is also distributing F-Secure SSH.
You can download the demo version at http://www.datafellows.com/f-secure/
Why they are using it: may be because it is fast on Intel Pentium and
Pentium Pro processors, as discussed in Applied Cryptography?
Jüri Kaljundi
AS Stallion
jk@stallion.ee
Return to September 1996
Return to ““William H. Geiger III” <whgiii@amaranth.com>”