Products that Use Blowfish
This list is a compilation of encryption products that use the Blowfish encryption algorithm. Counterpane has not verified that Blowfish has been implemented properly, nor have we evaluated the security of these products. Readers are cautioned that there is more to creating a secure product than having a secure algorithm; for details read the essays Why Cryptography is Harder Than it Looks and Security Pitfalls in Cryptography. The listing of a product here is not an endorsement in any way. Some settling of contents may have occurred during shipping. Keep off the grass.
File and Disk Encryption
- Advanced Encryption Package Professional
- Ashampoo WinOptimizer
- CuteCipher for Mac
- Cypher Millennium
- Sentry 2020
- 1Password (Mac, iPhone)
- Access Manager (Windows)
- AntiSnoop Password Dropper (Windows)
- Java PasswordSafe (Windows, Mac, Linux)
- KeyRing Mini (OS/2)
- MyPasswordSafe (Linux)
- Password Store (Palm OS)
- Password Wallet (Windows, Mac, iPhone, Palm OS)
- Passwords Plus (Windows, Mac, Palm OS)
- SBOX (Windows)
- SplashID (Windows, Mac, iPhone)
- Web Confidential (Windows, Mac, Palm OS)
- Yaps (Palm OS)
A free, open-source archiver with console and GUI versions for both Windows and Linux.
A free, open-source archive file creator and extractor, capable of reading a wide variety of archive file formats. For Windows and Linux.
Backup for Workgroups
Backup software for networked Windows computers.
Continuous, off-site backup from any platform to any platform.
An online backup service.
Automatic backup software for Windows.
IASO Backup Manager
Hybrid cloud backup and disaster recovery.
Windows software that backs up data to secure servers and network drives.
Mozy Online Backup
An online backup service.
Encryped backup to local drives, network paths, FTP sites, and E-Mail addresses.
A cross-platform backup and recovery suite.
Provides remote backup over phone lines, encrypting the data with Blowfish.
A backup component for Delphi.
BlowFish Encryption Plug-in for FileMaker® Pro
Allows Filemaker Pro users to add Blowfish encryption to their database products.
Encryption software for SQL Server, MSDE, Access and other databases.
An Internet database access server that enables both HTML and Java developers to create and deploy database interactive Web pages, Java applets and Java programs. Its IDS JDBC Driver supports full feature SSL v3 protocol including 128-bit Blowfish cipher.
Avactis Shopping Cart
PHP E-commerce software. Uses Blowfish to encrypt credit card and cardholder data.
An open-source e-commerce solution. Uses Blowfish to encrypt payment data.
PHP/MySQL-based shopping cart software. Uses Blowfish for password encryption.
Encryption software that integrates with popular Windows e-mail programs.
Windows encryption software with plug-ins for major e-mail clients.
A partial implementation of the OpenPGP standard for iOS devices.
Z1 SecureMail Gateway
Centralized encryption and digital signing for corporate e-mail. For Linux and Solaris.
Encryption Libraries and Toolkits
Avalanche Java Cryptography Toolkit
Pure Java implementations of popular cryptographic algorithms, including Blowfish.
BF-SDK (Blowfish Software Development Kit) [downloadable from ftp.hacktic.nl]
Provides the basic functions to encrypt and decrypt data in ECB and CBC mode (with a variable number of encryption rounds). You can directly use it in Turbo/Borland Pascal, TASM/MASM and even in MS Visual C++. The full source and documentation is provided. Free for private use.
Blowfish DLL [download from ftp.replay.com]
Bouncy Castle Crypto APIs
A Java implementation of cryptographic algorithms, including Blowfish and Twofish. The package contains a light-weight API suitable for use in any environment, with the additional infrastructure to conform the algorithms to the JCE framework.
A free set of cryptographic extensions for Java, including both Blowfish and Twofish.
A security toolkit that allows programmers to add encryption and authentication services to their software.
A free C++ class library of cryptographic schemes. Includes both Blowfish and Twofish.
An encryption and digital signature library.
Java Cryptography Architecture
Includes an implementation of Blowfish.
A cryptography toolkit for z/OS, with companion products for Windows, Unix, and Linux systems.
Oracle JCE Provider
A framework for implementing encryption, key generation and key agreement, and Message Authentication Code (MAC) algorithms in Java.
A collection of security related components and routines for Delphi, Kylix and C++Builder.
A free add-on to Tcl/Tk containing various encryption algorithms, including Blowfish.
A cross-platform toolkit for data encryption, containing routines & components for use with Borland Delphi, C++Builder, & Kylix.
An encryption and decryption wrapper for .NET applications.
Provides secure file transfers among different platforms (mainframe, Windows, Solaris, Linux, HP-UX).
Managed file transfer software for Windows, Linux, Solaris, IBM z/OS, and AIX.
Secure Instant Messaging for Windows.
Encrypted chat and advanced file sharing using a client/server architecture.
A lightweight, console based, peer-to-peer (p2p) encrypted chat client. Gnuzza is available for both Linux and Win32, is free, and is released under the GPL.
Includes Blowfish in the mainline kernel, starting with v2.5.47.
Novell SUSE Linux Enterprise
Uses Blowfish for password encryption and Twofish for encrypted partitions.
A free Unix-like operating system that uses Blowfish by default for one-way password encryption.
Personal Database Programs
Handy Safe Pro
Encrypted data storage for Symbian smartphones.
A database program for the PalmOS platform.
A database for images, music files, and documents that can transparently decrypt and display image files.
Secure Shell (SSH)
A free implementation of SSH.
A free Windows SSH client.
A Secure Shell (SSH) client for Windows.
A free secure telephony program for Windows and Unix-like operating systems.
Internet telephone software.
Steganography with a selection of algorithms, including Blowfish and Twofish.
Combines steganography (data hiding) with password protection using Blowfish.
JPHIDE and JPSEEK
Free steganography software for Windows and Linux.
Steganography software for Unix-like OSes and Windows.
A free Windows word processor incorporating text encryption.
A Wordpad-like cryptographic word processor, using several encryption methods including Blowfish and Twofish. Open Source.
A secure word processor. Part of the Kremlin Security Suite.
Anonymous System with Automatic Routing Management
Developed by Carlos Caselles Jiménez, a researcher at the Universidad Politécnica de Madrid's Facultad de Informática.
An online survey management system developed by Logivox for Howard Merrell & Partners.
A re-entrant version of Blowfish, developed by Geodyssey for use in its Hipparchus Library of geographic software tools, and available as a public domain command-line file encryption utility.
A PC and iSeries Client/Server application used to automatically distribute iSeries spool files or PC files to users.
Transparent encryption for removable media.
Protects Java code from reverse engineering by creating a native Windows executable that contains an encrypted version of the application's classes and resources. The contents are decrypted in memory as they are requested by the Java Virtual Machine.
A public-domain implementation of bcrypt, a password-hashing algorithm based on Blowfish.
The CyberAngel Security Software
Laptop security software with drive encryption. Offers a choice of algorithms including Blowfish and Twofish.
dlb (Digital Lecture Board)
A network whiteboard system.
Online file-sharing software.
Helion Blowfish Core
A data security silicon IP core.
Provides remote file access over any Internet connection.
Kremlin Security Suite
Includes file and directory encryption and an encrypted text editor. For Windows and Mac OS.
Clinical data-collection software for Palm OS.
A replacement for crypt(1), released under the GNU General Public License. Supports both Blowfish and Twofish.
MHA Data Packager
A utility for the secure submission of hospital data over the web.
Text entry software for mobile phones. Allows storage of encrypted notes.
A customizable, turnkey community intranet package.
A browser interface that allows users to manipulate webpages by writing scripts.
A Rapid Application Development (RAD) tool that allows the creation of multi-tier and web applications under Windows, Linux, Solaris, and Mac OS.
A single-sign-on solution for web-based resources that require a user name and password.
Overseer Network Monitor
Windows server and network monitoring. Uses Blowfish to encrypt passwords.
Password GENEOUS and Account GENEOUS
Multiplatform password synchronization and user account management.
Windows benchmarking software. Uses a multithreaded version of Blowfish for one of the CPU tests.
An implementation of Netscape's Secure Socket Layer for Palm OS.
An IBM i green screen modernization solution that transforms RPG and COBOL applications into professional-looking web pages on the fly.
An encryption suite including file and e-mail encryption, password manager, and steganography software.
File and text encryption software with an encrypted Tweet feature that splits large messages automatically.
Document and archiving management software.
Produces self-extracting encrypted files.
An encoder for PHP source code.
A remote access product for SourceSafe.
A free implementation of Netscape's Secure Socket Layer.
TiVo® Digital Video Recorders
TiVo DVRs use Blowfish to safely transmit data to and from the hard drive.
A tree notes manager. Uses Blowfish to protect notebook files.
Ultra-Scan's ultrasonic fingerprint scanner uses Blowfish to encrypt the fingerprint images.
A Web Application Development and Deployment tool, primarily designed to develop sophisticated dynamic browser web applications hosted by the IBM iSeries or AS/400, utilizing the iSeries or AS/400 databases. Using the Java Servlets Edition, you can also use it to deploy applications on any platform.
See also the List of products that use Twofish.
Photo of Bruce Schneier by Per Ervland.
Schneier on Security is a personal website. Opinions expressed are not necessarily those of Resilient Systems, Inc.