various blowfish 1
various cryptographic algorithms about Blowfish.
Answer the following questions:
- When, by whom, and in what country was it introduced
- What was the background of the inventor
- What type of algorithm: symmetric, asymmetric, hash, other
- A short description of the basis of the algorithm
- A short description of how it is used, if at all
- How secure is it, has it been hacked etc.
- Was it later developed into or replaced by another cryptographic algorithm?
- What is the inventor doing now?
Make sure to include at least three references at the end of your answer.