This page describes a somewhat unique file encryptor/decryptor utility. Unceremoniously called BURP (for Blowfish Updated Re-entrant Project), it is a console ("command-line") program particularly well-suited for the protection of long-term archival data storage, in software and data distribution and in situations where the encrypted material must not provide the attacker with any useful information whatsoever.
The current version of BURP is v. 1.20. It has been ported to and tested on additional platforms and includes numerous minor upgrades. However, the program output data format is the same as it was in the original, "beta" release version. Specifically, BURP provides "plausible deniability": it produces "clean" cipher-text files (i.e., there are no file headers, key verification tokens, system, application or content identification strings, etc.). Consequently, a file encrypted by BURP appears to consists entirely of a random data stream - it can not be easily detected or "provably identified" as cipher-text, as long as the key is secure, or unless it is broken cryptographically.
You are invited to download and use this utility. Full cross-platform C language source is provided. There are no restrictions on its use and re-distribution (other than such general restrictions on the use and/or distribution of strong cryptography that might or might not be imposed by some jurisdictions on their residents).
BURP has been in continuous use by a large and diverse group of organizations and individuals since 1998. We expect and welcome your comments on both its strength and functionality.
Download complete BURP 1.20 archive
(burp120.zip - full source, documentation and selected binaries).
If you wish to verify its integrity, its md5sum is:
If you have received a file encrypted with Burp, and if your operating system is among those listed below, you might be here just to download a platform-specific executable. If you download and invoke the program with no parameters, it will list on the console its "use summary". A complete description of BURP's use and functionality can be found in the burp.txt file.
Note: this set of binaries is provided primarily as a convenience to the recipients of various burp-encrypted software and data distribution files. The binaries are fully functional, executable copies of the Burp program, performing both encryption and decryption. However, if you are encrypting your own data we strongly suggest that you download the source, inspect it and compile the program yourself. Depending on the circumstances, it could be extremely imprudent to use any cryptography that has not been built from the source code in your possession, inspected by you or someone you trust.
(We will gladly port BURP to any platform not included below - and make it available for public use - if we can be provided with temporary ssh shell access for less common operating systems).
Download BURP for NetBSD DEC Alpha.
Download BURP for BeOS on Intel.
Download BURP for Darwin/FreeBSD x86.
Download BURP for 16-bit DOS, Win3.x.
Download BURP for Hewlett-Packard PA-RISC workstations.
Download BURP for Linux on Intel using (old) libc5.
Download BURP for Linux on Intel.
Download BURP for Mac OS X G4.
Download BURP for OpenBSD on Intel.
Download BURP for IBM OS/2.
Download BURP for IBM RS/6000 workstations.
Download BURP for Silicon Graphics workstations.
Download BURP for Sun workstations under Solaris.
Download BURP for 32-bit Windows variants on Intel.
(W9x, ME, NT, 2K, XP, etc.)
Download BURP for 64-bit Windows on AMD 64.
Download BURP for Zaurus (Linux on SA-1110).