HTML dump on Wed Feb 26 22:53:30 EST 2003 Índice de los Códigos Fuente (V 2.0) Fichero Descripción [1]3-WAY 3-WAY algorithm written by Jean Daemen. [2]A5 A5 stream cipher, used in GSM cellular. [3]ASSORTED Assorted simple cryptography and statistics programs, written by Thomas Strong, Jr. in 1993. [4]BBC Big Block Cipher: uses 256K blocks, three random number generators, two substitution tables, cipher-text feedback, and transpositions. Written by Peter Boucher. Unknown security. [5]BIGNUM1 Bignum class, written in Borland C++ by Bruce Bowen. [6]BIGNUM2 Bignum package, written by Bruce Bowen in 1995. [7]BLOWFISH The Blowfish algorithm, written by Bruce Schneier in 1994. [8]CA1_1 CA algorithm, written by Howard Gutowitz in 1992. [9]CBW Crypt Breaker's Workbench. Program to help cryptanalyze messages encrypted with crypt(1), written by Robert W. Baldwin in 1986. [10]CHAMBERS A cryptographic pseudo-random number generator, designed and written by Bill Chambers in 1995. [11]CRPT-POL "Cryptography: Policy and Technology," report by Hoffman, Ali, Heckler, and Hoybechts, of 1 Dec 93. [12]CRYPT1 UNIX crypt(1) command: a one-rotor machine designed along the lines of Enigma, but considerably trivialized. [13]CRYPT3-1 UNIX crypt(3) command, written by Tom Truscott and copyright 1989, 1991 by the University of California. [14]CRYPT3-2 UNIX crypt(3) command, written by Paul Leyland in 1994. [15]CRYPTLB Wei Dai's C++ Class Library of Cryptographic Primitives, Version 1.0, of 6/17/1995. Includes: MD5, SHS, DES, IDEA, WAKE, RC4, RC5, Blowfish, Diamond, Diamond Lite, Sapphire, Luby-Rackoff, MDC, various modes (CFB, CBC, OFB, counter), DH, RSA, DSA, ElGamal, BBS, gzip compression, Shamir's secret sharing scheme, Rabin's information dispersal scheme, and zero-knowledge prover and verifier for graph isomorphism. There are also various miscellanous modules such as base 64 coding and 32-bit CRC. [16]DES-BARR DES implementation, fast, written by David A. Barrett in 1991. [17]DES-BISH Implementation of DES front end; does ECB, CBC, CFB, OFB. Does not include actual DES code. By Matt Bishop. [18]DES-KARN DES implementation, written by Phil Karn in 1987. [19]DES-KOON DES implementation, fast but large, written by David G. Koontz in 1991. [20]DES-LEVY DES implementation, fast and portable, by Stuart Levy in 1988. [21]DES-LOUK DES implementation, fast, with main program and C function library for arbitrary precision integer arithmetic. Written by Antti Louko in 1992. [22]DES-MITC DES implementation, written by D.P. Mitchell in 1983. [23]DES-OSTH DES implementation with several utility programs and many useful extra functions, runs on UNIX, written by Stig Ostholm, 1990. [24]DES-OUTE DES algorithm, fast and compact, written by Richard Outerbridge in 1991. Supports double and triple DES. Includes portable C version, and optimized 680x0 version. [25]DES-YOUN DES implementation, one of the fastest around, written by Eric Young in 1992. [26]DESSBOX The s^5 DES S-Boxes. [27]ENIGMA Software simulation of the German Enigma machine, written by Henry Tieman. [28]ESCROW A Proposed Federal Information Processing Standard for an Escrowed Encryption Standard (EES), NIST, 30 Jul 1993. [29]EXAMPLES Code examples from APPLIED CRYPTOGRAPHY. [30]FEAL8 FEAL-8 algorithm, written in 1989. [31]FEALNX FEAL-NX algorithm, written by Peter Pearson in 1992. [32]FIPS171 FIPS PUB 171, Key Management Using ANSI X9.17, dated 27 April 1992. [33]FIPS180 FIPS PUB 180, Secure Hash Standard, dated 11 May 1993. [34]FIPS181 FIPS PUB 181, Automated Password Generator, dated 5 October 1993, with C source code. [35]FIPS185 FIPS PUB 185, Escrowed Encryption Standard, dated 8 Febuary 1994. [36]FREQ Program to count the frequency of every letter in a file, written by Peter Boucher. [37]GOST The Soviet GOST algorithm (without the correct S-boxes), written by Colin Plumb in 1993. [38]GRENBOOK Draft 4.0 of the Green Book, the European computer security specification, dated 18 Oct 1993. [39]HASHES MD5 and SHA, optimized for speed by Colin Plumb in 1993. [40]HAVAL HAVAL algorithm. [41]HILL Hill cipher. [42]I-HAT C code for various cryptographically-useful statistical analysis functions: Kullback's information measure for a 2-way contingency table, Gamma and repeated functions (Poisson, chi-square, etc.), Pearson's chi-square, etc. By Doug Gwyn, 1991. [43]IDEA_C IDEA algorithm in C, optimized for speed by Colin Plumb in 1993. [44]IDEA68K IDEA algorithm in 68000 assembly, written by Colin Plumb in 1993. [45]IDEA8086 IDEA algorithm in 8086 assembly, written by Colin Plumb in 1993. [46]ISOMORPH Utility that prints isomorphs, written by Paul Leyland. [47]INDEX Index to APPLIED CRYPTOGRAPHY. [48]ITAR Imported and Exported Defense Articles and Services, Vol. 57, No. 89, Pari II, 56 FR 19666, 7 May 1992. By the Department of State. [49]KERBEROS Kerberos RFC (1510), dated Sep 1993. [50]KHUFU This archive contains KHUFU.C, a hack implementation of the Khufu algorithm written by Rayan Zachariassen in 1989. It also contains PRSBOX.H, PRSBOX.C, and MAKEFILE, a program to print S-boxes written by Landon Curt Noll in 1989. [51]KS-TEST KS statistical test, written by Peter Boucher in 1994. [52]LCRNG Linear congruential random number generator. [53]LCRNG-T Simple block transposition cipher based on a linear congruential random number generator, written by R.A. O'Keefe. [54]LOKI LOKI89 and LOKI91, written by Leslie Condie in 1992. [55]LUCIFER2 LUCIFER algorithm written by Graven Cyphers. [56]MD-RFC Internet RFCs (Requests for Comment) for MD2, MD4, and MD5. [57]MD4 MD4 algorithm, written by RSA Data Security, Inc. [58]MD4-DOS MD4 algorithm, fast DOS implementation by Jouka Holopainen. [59]MD5-KARN Optimization of RSA's MD5 code for 80386, written by Phil Karn in Feb 1992. [60]MIMIC Peter Wayner's Mimic function. [61]NEWDE NewDE algorithm, a DES variant used in the Macintosh program StuffIt (versions 1.51 and 2.0); written by Richard Outerbridge in 1991. [62]NEWDES NewDES algorithm, written by Mark Riordan in 1990. [63]NHASH N-Hash algorithm, written in 1993. [64]NSEA Nonpatented Simple Encryption Algorithm, written by Peter Gutmann. [65]PEM-RFC Internet RFCs (Requests for Comment) for the Privacy Enhanced Mail standard: RFC1421, RFC1422, RFC1423, and RFC1424. [66]PGP A list of places to download PGP from. [67]PIKE A stream cipher by Ross Anderson, written in 1994. [68]PKC Public-Key Cryptography, a 162-page tutorial written by James Nechvatal of NIST in 1991. [69]PLAYFAIR Playfair algorithm, written by Paul Leyland in 1993. [70]PPSC Pass-Phrase Stream Cipher, written by Peter Boucher in 1992. [71]PRNGXOR Source code that illustrates polyalphabetic substitution with a running key stream, written by Carl Ellison in 1993. [72]PRV-ANMT "Privacy and Anonymity on the Internet": comprehensive summary by L. Detweiler in 1993. [73]RADIX64 Radix64 endocing and decoding, written by Carl Ellison in 1995. [74]RAN-MIX Random number mixer: takes in a random source and outputs strong random numbers. Writtenby Carl Ellison in 1995. [75]RANDOM1 Random number generator that uses phase noise in PC crystals to generate random bits, written by Nico E de Vries in 1992. [76]RANDOM2 Schematic for cheap hardware random bit generator. [77]RANDOM3 Random number generator for AT-compatible MS-DOS machines, written by Brian Harvey in 1993. [78]RANDOM4 RFC1790, "Randomness Requirements for Security." [79]RC4 [80]RC4asm The alleged RC4 cipher, posted anonymously to sci.crypt in 1994. [81]RC5-1 The RC5 algorithm, written by J. Nimmer. [82]RC5-2 The RC5 algorithm, written by John Kelsey. [83]RC5-3 The RC5 algorithm, written by RSADSI. [84]REDOC2 REDOC2 algorithm written by Michael Wood. [85]REDOC3 REDOC3 algorithm, written by Michael Wood. [86]RIPE-MD RIPE-MD function, written by the RIPE project in 1992. [87]RIPEM12A Mark Riordan's Privacy Enhanced Mail, Version 1.2a, current as of April 1994. [88]RND-ANLS Randomness analysis, using Maurer's test. [89]RSA-FAQ RSA Data Security's Frequently Asked Questions about Cryptography file. Version 2.0, last updated 20 Sep 1993. [90]RSAREF20 RSA Data Security Inc.'s reference implementation of RSA. Includes code for DES and MD5. Bignum package can be easily modified to do El Gamal, Diffie-Hellman, DSA, etc. Version 2.0. [91]SAFER SAFER algorithm, written by Michael Roe in 1994. [92]SCICRYPT The Frequently-Asked Questions file for the Internet newsgroup, sci.crypt. [93]SEAL SEAL cipher, written by Michael Roe in 1994. [94]SHA1 Old Secure Hash Algorithm, written by Peter Gutmann in 1992. [95]SHA2 Old Secure Hash Algorithm, written by Paul Rubin in 1994. [96]SHA3 Old and new Secure Hash Algorithm. [97]SHARING Code to implement a threshold scheme, written by Peter Pearson in 1993. [98]SNEFRU Snefru algorthm, written by Ralph Merkle in 1989. [99]SNUFFLE Program to turn a one-way hash function into an encryption function, by Dan Bernstein. [100]SPLAY Compression and encryption in C based on splay trees. [101]TEA The Tiny Encryption Algorithm, designed and written by David Wheeler and Roger Needham in 1994. [102]TIS-PEM The Frequently Asked Questions file about the TIS implementation of PEM. Last updated 29 Oct 93. Includes where to get a copy. [103]TRAN Carl Ellison's TRAN function, a large-block mixing function. Written in 1995. [104]TRAN-PWD TRAN with the addition of a key, written by Carl Ellison in 1995. [105]TRNSPOSE Cipher that does a transposition of a 8192 byte block, based on a random number generator, by William Setzer. [106]VIGENERE A program that encrypts using Viegnere, Beauford, or Variant Beauford ciphers. Written by Leisa Condie in Dec 1992. [107]VIGSOLVE Program to solve Vigenere cipher, by Mark Riordan in 1991. [108]WPCRACK Program to break WordPerfect's encryption, written by Ron Dippold in 1991. [109]ZIP The encryption algorithm used in the PKZIP 2.04g and 2.0.1 compression program. The algorithm was written by Roger Schlafly. [110]ZIP-BARK A pseudo-random sequence generator by Chris Barker, 1995. References 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 79. 80. 81. 82. 83. 84. 85. 86. 87. 88. 89. 90. 91. 92. 93. 94. 95. 96. 97. 98. 99. 100. 101. 102. 103. 104. 105. 106. 107. 108. 109. 110. [disk1] [disk2] [disk3]