In our ongoing explorations of the methods of cryptographic protection of geographic location data we found Bruce Schneier's Blowfish to be the preferred cryptographic algorithm on which to base this protection. Its widespread use, small block size, speed and simple API make it an ideal component for use in high-performance database servers. However, the Blowfish C code published in Dr. Dobbs Journal, September, 1995 was not re-entrant, a necessary condition for use in multi-threaded database servers. Accordingly, we modified the published Blowfish functions slightly to provide re-entrancy. (For more about Blowfish, here's a link to its description on Bruce Schneier's company website).
To confirm the correct operation and performance of these functions, we have prepared a general purpose multi-platform public-domain file encryption/decryption utility, as well as a family of programs intended to be used in conjunction with other applications (e-mail, text editors, etc.) exchanging encrypted text via clipboard in a format we call "textec".
To learn more about the TEXTEC family of programs follow the link; the rest of this page deals with our file encryptor utility. Unceremoniously called BURP (for Blowfish Updated Re-entrant Project), it is a console ("command-line") program we use for protection of the archival data storage and in our software and data distribution.
The current version of BURP is v. 1.20. It has been ported to and tested on additional platforms and includes numerous minor upgrades. However, the program output data format is the same as it was in our original release version. Specifically, BURP provides "plausible deniability": it produces "clean" ciphertext files (i.e., there are no file headers, key verification tokens, system, application or content identification strings, etc.). Consequently, a file encrypted by BURP appears to consists entirely of a random data stream - it can not be easily detected or "provably identified" as ciphertext, as long as the key is secure, or unless it is broken cryptographically.
You are invited to download and use this utility. Full cross-platform C language source is provided. There are no restrictions on its use and re-distribution (other than such general restrictions on the use and/or distribution of strong cryptography that might or might not be imposed by some jurisdictions on their residents).
BURP has been in continous use by a large and diverse group of organizations and individuals since 1998. We expect and welcome your comments on both its strength and functionality.
Download complete BURP 1.20 archive
(burp120.zip - full source, documentation and selected binaries).
If you wish to verify its integrity, its md5sum is:
If you need only a platform-specific executable, you may be able to use one of the binaries listed below. If you download and invoke the program with no parameters, it will list on the console its "use summary". A complete description of BURP's use and functionality can be found in the burp.txt file.
Note: this set of binaries is provided primarily for the convenience of recipients of our distributions. (We will gladly port BURP to any platform not included below - and make it available for public use - if we can be provided with temporary ssh shell access).
If you are encrypting your own data we strongly suggest that you download the source, inspect it and compile the program. Depending on the circumstances, it could be extremely imprudent to use any cryptograpy that has not been built from the source code in your possesion, inspected by you or someone you trust.
Download BURP for NetBSD DEC Alpha.
Download BURP for BeOS on Intel.
Download BURP for Darwin/FreeBSD x86.
Download BURP for 16-bit DOS, Win3.x.
Download BURP for Hewlett-Packard PA-RISC workstations.
Download BURP for Linux on Intel using (old) libc5.
Download BURP for Linux on Intel.
Download BURP for Mac OS X G4.
Download BURP for OpenBSD on Intel.
Download BURP for IBM OS/2.
Download BURP for IBM RS/6000 workstations.
Download BURP for Silicon Graphics workstations.
Download BURP for Sun workstations under Solaris.
Download BURP for 32-bit Windows variants on Intel.
(W9x, ME, NT, 2K, XP, etc.)
Download BURP for 64-bit Windows on AMD 64.
Download BURP for Zaurus (Linux on SA-1110).
An example of use of Burp on Zaurus PDA can be found here.
A Win32 GUI "frontend" for Burp can be found here. Please read burp.txt file before downloading and using it, as such use of the program has serious security repercussions, and is best reserved for those instances where the attacker could never gain access to the computer used to produce encrypted files on removable media, or where the plainetx is intended to be permanently kept on a secured computer after the decryption.
Download our PGP public key.
Its md5sum is:
Return to Geodyssey's home page.
For more information about Geodyssey and Hipparchus, write, e-mail, fax or call:
Suite 240, Panarctic Plaza,
815 8th Avenue South West,
Calgary, Alberta, T2P 3P2, CANADA
Tel 1-403-234-9848, Fax 1-403-243-3979,
Hipparchus® is a registered trademark of Geodyssey Limited.
© Copyright 1992, 2002 by Geodyssey Limited. All rights reserved.
Last revised 2002/12/03.