Please enable JavaScript to view this site.

A-Shell Consolidated Reference

Added to A-Shell, August 2016

xcall BLOFSH, opcode(=1), impure, key

xcall BLOFSH, opcode(=2), impure, cleartext, ciphertext

xcall BLOFSH, opcode(=3), impure, ciphertext, cleartext

BLOFSH implements the Blowfish encryption algorithm. It is used to encrypt or decrypt data in memory using a variable length key of 32 to 448 bits.

Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and made available to the world for royalty-free use. See the Blowfish entry at Wikipedia for more information.

Parameters

opcode  (Num)  [in]

1 to load the key, 2 to encrypt, 3 to decrypt

impure (BLOB, 4168)  [in/out]

A block of 4168 bytes which must be provided to the subroutine for its use as a work area. Do not modify it between calls.

key (BLOB)  [in]

A variable containing your encryption key. The mapped size of key determines the length of the encryption key, which can be from 4 to 56 bytes—i.e. 32 to 448 bits. Note being a symmetric cipher, the same key is used for encryption and decryption. Obviously you should generate an unpredictable key and store it securely.

cleartext (BLOB)  [in/out]

An area containing or overlaying the clear data. For opcode 2 (encrypt), this is the source; for opcode 3 (decrypt), it is the destination. The size in bytes must be divisible by 4, and must match the ciphertext size. You can use an overlay or an assignment to up-size your actual clear text field. For example, to encrypt a string 29 bytes long, you might map it as follows:

map1 cleartext$,s,29

map1 cleartext,x,32,@cleartext$

 

ciphertext (BLOB)  [in/out]

An area containing or overlaying the encrypted data. Restrictions and comments given for cleartext apply here as well.

 

u  Example

 

Comments

When encrypting string fields, you can copy to/from the original (S format) field and the cleartext / ciphertext (X format) fields. But when encrypting numeric fields or structures, you must use the overlay method shown above. In all cases, you must save the entire ciphertext variable, not just the number of bytes in the actual data. In the example above, the actual data is only 43 bytes but the encrypted data is 48 bytes long, i.e rounded up to the next multiple of 8 bytes.

To generate truly unpredictable keys, see Random Number Generators. To avoid saving the key, you may be able to use some fixed function based on inputs unique to the situation—file #, customer #, ppn, etc.—to produce the seed from which you then can generate and later regenerate a pseudo-random sequence.

If you are exporting your application which encrypts or contains encrypted data, you may want to check your country's regulations. The US has loosened its requirements but there are still situations where Blowfish encryption with keys longer than 56 bits may be restricted.

See Also