The Blowfish algorithm is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use.
Blowfish is classified as public domain; as such it has been analyzed extensively and gone through years of peer review. At no point since it's initial release in 1993 has the Blowfish code ever been cracked. This is significant when you consider that the source code to the algorithm is freely available.
Blowfish supports key lengths of 32 to 448 bits, making it one of the strongest encryption algorithms on the market. Since the US government (NSA) has eliminated export restrictions on encryption, First Backup is shipped with 448-bit support standard.
The relative strength of the encryption algorithm is based on key length. Bruce Schneier, creator of the Blowfish encryption algorithm, has calculated that according to what we know of quantum mechanics today, that the entire energy output of the sun is insufficient to break a 197-bit key.
Here is a more generalized example:
In the preceding example, the 128-bit encryption is not just three times stronger than 40-bit encryption — it is 309,485,009,821,345,068,724,781,056 times stronger. Performing this same analysis on a 448-bit encryption key yields an encryption strength that is 2.1X1096 times stronger than a 128-bit key.
Many factors must be considered when incorporating encryption in any “security-based” software product like First Backup. Encryption speed, key strength and extensive peer review of the algorithm were the key motivating factors behind the decision to utilize Blowfish encryption.
As encryption algorithms evolve to meet the ever-increasing speed of systems designed to “crack” them, we will strive to incorporate these enhanced algorithms in all of our products. But until the next generation of encryption is developed, rest assured that Blowfish will offer substantial security for many years to come and will continue to be the preferred encryption algorithm used by many corporations and banking institutions worldwide.