Skip to content

ebrasha/Abdal-Blowfish-Encryption

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Abdal Blowfish Encryption

🎤 README Translation

📸 Screenshot

💎 General purpose

In today's digital landscape, modern encryption tools for Windows, particularly those with a graphical user interface, are either scarce, prone to numerous issues, or outdated. Recognizing this gap, "Abdal Blowfish Encryption" was developed to provide a robust solution. This software supports advanced encryption algorithms such as Twofish and Blowfish2, all within an aesthetically pleasing and user-friendly graphical environment. With no complex dependencies required, it ensures fast and secure encryption and decryption operations. Furthermore, as a 100% open-source tool, it meets all professional and up-to-date encryption needs.

🛠️ Development Environment Setup

.NET 7

Chilkat

Microsoft Visual Studio Enterprise 2022 17.10.2

🔥 Requirements

  • No prerequisites required

✨ Features

  • Supports Twofish and Blowfish2 encryption algorithms
  • Beautiful interface with no dependencies required for installation
  • Very fast processing
  • Contains no malicious code
  • 100% open-source
  • Encryption Algorithm: Choose between Twofish and Blowfish2
  • Encoding Options: Supports Hex, URL, Base64, and Quoted-Printable encoding modes
  • Key Length: Supports 448-bit key length
  • Cipher Mode: Choose between ECB, CBC, and CFB modes
  • Operation Mode: Option to select between Encryption and Decryption

📝️ How it Works?

To use the "Abdal Blowfish Encryption" software, start by selecting the encryption algorithm you wish to use, either Twofish or Blowfish2. Next, choose the encoding mode that suits your needs; options include Hex, URL, Base64, or Quoted-Printable. After this, set the key length, with a maximum option of 448 bits for secure encryption. Then, select the cipher mode from the available choices: ECB, CBC, or CFB. Once these settings are configured, it's important to generate your secret key. It is highly recommended to use the software's built-in key generation tool, as it ensures a highly secure and precise key. Finally, decide whether you want to encrypt or decrypt the data, and then click the operation button to execute the process.

❤️ Donation

https://ebrasha.com/abdal-donation

🤵 Programmer

Handcrafted with Passion by Ebrahim Shafiei (EbraSha)

E-Mail = Prof.Shafiei@Gmail.com

Telegram: https://t.me/ProfShafiei

☠️ Reporting Issues

If you are facing a configuration issue or something is not working as you expected to be, please use the Prof.Shafiei@Gmail.com . Issues on GitLab or Github are also welcomed.