Implementing blowfish cyphor.

03/03/2013 05:57 .Xori^#1
Hey everyone! I've been sitting here for hours attempting to convert my 5017 to accept blowfish. Some guidance and or help would be muchly be appreciated.

Anyone ever done this?
03/03/2013 06:45 Spirited#2
Well, I do have a wiki in my signature. It contains the cipher implementations from public sources. There's also CptSky's cipher library which is amazing. I'm sure you can search the forum for that. As far as the implementation, Blowfish is only one of two algorithms in place. As any normal cipher, Blowfish accepts a key and an iv. TQ uses the DH Key Exchange to get a secure, unique key to use in Blowfish. Before it can get the key though, it needs to use the Blowfish cipher to encrypt the exchange data, which is where the iv comes in. The IV can be found in the client. If you open it in Notepad and search for "TQClient", the key will be to the right of that (more or less). There are public sources that have it implemented. Try looking into those sources and seeing how they do it as well. Cheers.
03/03/2013 09:50 .Xori^#3
Quote:
Originally Posted by Fаng View Post
Well, I do have a wiki in my signature. It contains the cipher implementations from public sources. There's also CptSky's cipher library which is amazing. I'm sure you can search the forum for that. As far as the implementation, Blowfish is only one of two algorithms in place. As any normal cipher, Blowfish accepts a key and an iv. TQ uses the DH Key Exchange to get a secure, unique key to use in Blowfish. Before it can get the key though, it needs to use the Blowfish cipher to encrypt the exchange data, which is where the iv comes in. The IV can be found in the client. If you open it in Notepad and search for "TQClient", the key will be to the right of that (more or less). There are public sources that have it implemented. Try looking into those sources and seeing how they do it as well. Cheers.
Thanks again Fang! I'm going to continue to experiment and learn off this until I fully understand the way of the auth and encrypt system.
03/03/2013 14:13 CptSky#4
Best explanation I've seen for the moment of the CO2 cryptography system :
[Only registered and activated users can see links. Click Here To Register...]

All CO2 ciphers implemented in C# without using OpenSSL :
[Only registered and activated users can see links. Click Here To Register...]