HTML dump on Wed Feb 26 22:53:30 EST 2003 http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/indice.html Índice de los Códigos Fuente (V 2.0) Fichero Descripción [1]3-WAY 3-WAY algorithm written by Jean Daemen. [2]A5 A5 stream cipher, used in GSM cellular. [3]ASSORTED Assorted simple cryptography and statistics programs, written by Thomas Strong, Jr. in 1993. [4]BBC Big Block Cipher: uses 256K blocks, three random number generators, two substitution tables, cipher-text feedback, and transpositions. Written by Peter Boucher. Unknown security. [5]BIGNUM1 Bignum class, written in Borland C++ by Bruce Bowen. [6]BIGNUM2 Bignum package, written by Bruce Bowen in 1995. [7]BLOWFISH The Blowfish algorithm, written by Bruce Schneier in 1994. [8]CA1_1 CA algorithm, written by Howard Gutowitz in 1992. [9]CBW Crypt Breaker's Workbench. Program to help cryptanalyze messages encrypted with crypt(1), written by Robert W. Baldwin in 1986. [10]CHAMBERS A cryptographic pseudo-random number generator, designed and written by Bill Chambers in 1995. [11]CRPT-POL "Cryptography: Policy and Technology," report by Hoffman, Ali, Heckler, and Hoybechts, of 1 Dec 93. [12]CRYPT1 UNIX crypt(1) command: a one-rotor machine designed along the lines of Enigma, but considerably trivialized. [13]CRYPT3-1 UNIX crypt(3) command, written by Tom Truscott and copyright 1989, 1991 by the University of California. [14]CRYPT3-2 UNIX crypt(3) command, written by Paul Leyland in 1994. [15]CRYPTLB Wei Dai's C++ Class Library of Cryptographic Primitives, Version 1.0, of 6/17/1995. Includes: MD5, SHS, DES, IDEA, WAKE, RC4, RC5, Blowfish, Diamond, Diamond Lite, Sapphire, Luby-Rackoff, MDC, various modes (CFB, CBC, OFB, counter), DH, RSA, DSA, ElGamal, BBS, gzip compression, Shamir's secret sharing scheme, Rabin's information dispersal scheme, and zero-knowledge prover and verifier for graph isomorphism. There are also various miscellanous modules such as base 64 coding and 32-bit CRC. [16]DES-BARR DES implementation, fast, written by David A. Barrett in 1991. [17]DES-BISH Implementation of DES front end; does ECB, CBC, CFB, OFB. Does not include actual DES code. By Matt Bishop. [18]DES-KARN DES implementation, written by Phil Karn in 1987. [19]DES-KOON DES implementation, fast but large, written by David G. Koontz in 1991. [20]DES-LEVY DES implementation, fast and portable, by Stuart Levy in 1988. [21]DES-LOUK DES implementation, fast, with main program and C function library for arbitrary precision integer arithmetic. Written by Antti Louko in 1992. [22]DES-MITC DES implementation, written by D.P. Mitchell in 1983. [23]DES-OSTH DES implementation with several utility programs and many useful extra functions, runs on UNIX, written by Stig Ostholm, 1990. [24]DES-OUTE DES algorithm, fast and compact, written by Richard Outerbridge in 1991. Supports double and triple DES. Includes portable C version, and optimized 680x0 version. [25]DES-YOUN DES implementation, one of the fastest around, written by Eric Young in 1992. [26]DESSBOX The s^5 DES S-Boxes. [27]ENIGMA Software simulation of the German Enigma machine, written by Henry Tieman. [28]ESCROW A Proposed Federal Information Processing Standard for an Escrowed Encryption Standard (EES), NIST, 30 Jul 1993. [29]EXAMPLES Code examples from APPLIED CRYPTOGRAPHY. [30]FEAL8 FEAL-8 algorithm, written in 1989. [31]FEALNX FEAL-NX algorithm, written by Peter Pearson in 1992. [32]FIPS171 FIPS PUB 171, Key Management Using ANSI X9.17, dated 27 April 1992. [33]FIPS180 FIPS PUB 180, Secure Hash Standard, dated 11 May 1993. [34]FIPS181 FIPS PUB 181, Automated Password Generator, dated 5 October 1993, with C source code. [35]FIPS185 FIPS PUB 185, Escrowed Encryption Standard, dated 8 Febuary 1994. [36]FREQ Program to count the frequency of every letter in a file, written by Peter Boucher. [37]GOST The Soviet GOST algorithm (without the correct S-boxes), written by Colin Plumb in 1993. [38]GRENBOOK Draft 4.0 of the Green Book, the European computer security specification, dated 18 Oct 1993. [39]HASHES MD5 and SHA, optimized for speed by Colin Plumb in 1993. [40]HAVAL HAVAL algorithm. [41]HILL Hill cipher. [42]I-HAT C code for various cryptographically-useful statistical analysis functions: Kullback's information measure for a 2-way contingency table, Gamma and repeated functions (Poisson, chi-square, etc.), Pearson's chi-square, etc. By Doug Gwyn, 1991. [43]IDEA_C IDEA algorithm in C, optimized for speed by Colin Plumb in 1993. [44]IDEA68K IDEA algorithm in 68000 assembly, written by Colin Plumb in 1993. [45]IDEA8086 IDEA algorithm in 8086 assembly, written by Colin Plumb in 1993. [46]ISOMORPH Utility that prints isomorphs, written by Paul Leyland. [47]INDEX Index to APPLIED CRYPTOGRAPHY. [48]ITAR Imported and Exported Defense Articles and Services, Vol. 57, No. 89, Pari II, 56 FR 19666, 7 May 1992. By the Department of State. [49]KERBEROS Kerberos RFC (1510), dated Sep 1993. [50]KHUFU This archive contains KHUFU.C, a hack implementation of the Khufu algorithm written by Rayan Zachariassen in 1989. It also contains PRSBOX.H, PRSBOX.C, and MAKEFILE, a program to print S-boxes written by Landon Curt Noll in 1989. [51]KS-TEST KS statistical test, written by Peter Boucher in 1994. [52]LCRNG Linear congruential random number generator. [53]LCRNG-T Simple block transposition cipher based on a linear congruential random number generator, written by R.A. O'Keefe. [54]LOKI LOKI89 and LOKI91, written by Leslie Condie in 1992. [55]LUCIFER2 LUCIFER algorithm written by Graven Cyphers. [56]MD-RFC Internet RFCs (Requests for Comment) for MD2, MD4, and MD5. [57]MD4 MD4 algorithm, written by RSA Data Security, Inc. [58]MD4-DOS MD4 algorithm, fast DOS implementation by Jouka Holopainen. [59]MD5-KARN Optimization of RSA's MD5 code for 80386, written by Phil Karn in Feb 1992. [60]MIMIC Peter Wayner's Mimic function. [61]NEWDE NewDE algorithm, a DES variant used in the Macintosh program StuffIt (versions 1.51 and 2.0); written by Richard Outerbridge in 1991. [62]NEWDES NewDES algorithm, written by Mark Riordan in 1990. [63]NHASH N-Hash algorithm, written in 1993. [64]NSEA Nonpatented Simple Encryption Algorithm, written by Peter Gutmann. [65]PEM-RFC Internet RFCs (Requests for Comment) for the Privacy Enhanced Mail standard: RFC1421, RFC1422, RFC1423, and RFC1424. [66]PGP A list of places to download PGP from. [67]PIKE A stream cipher by Ross Anderson, written in 1994. [68]PKC Public-Key Cryptography, a 162-page tutorial written by James Nechvatal of NIST in 1991. [69]PLAYFAIR Playfair algorithm, written by Paul Leyland in 1993. [70]PPSC Pass-Phrase Stream Cipher, written by Peter Boucher in 1992. [71]PRNGXOR Source code that illustrates polyalphabetic substitution with a running key stream, written by Carl Ellison in 1993. [72]PRV-ANMT "Privacy and Anonymity on the Internet": comprehensive summary by L. Detweiler in 1993. [73]RADIX64 Radix64 endocing and decoding, written by Carl Ellison in 1995. [74]RAN-MIX Random number mixer: takes in a random source and outputs strong random numbers. Writtenby Carl Ellison in 1995. [75]RANDOM1 Random number generator that uses phase noise in PC crystals to generate random bits, written by Nico E de Vries in 1992. [76]RANDOM2 Schematic for cheap hardware random bit generator. [77]RANDOM3 Random number generator for AT-compatible MS-DOS machines, written by Brian Harvey in 1993. [78]RANDOM4 RFC1790, "Randomness Requirements for Security." [79]RC4 [80]RC4asm The alleged RC4 cipher, posted anonymously to sci.crypt in 1994. [81]RC5-1 The RC5 algorithm, written by J. Nimmer. [82]RC5-2 The RC5 algorithm, written by John Kelsey. [83]RC5-3 The RC5 algorithm, written by RSADSI. [84]REDOC2 REDOC2 algorithm written by Michael Wood. [85]REDOC3 REDOC3 algorithm, written by Michael Wood. [86]RIPE-MD RIPE-MD function, written by the RIPE project in 1992. [87]RIPEM12A Mark Riordan's Privacy Enhanced Mail, Version 1.2a, current as of April 1994. [88]RND-ANLS Randomness analysis, using Maurer's test. [89]RSA-FAQ RSA Data Security's Frequently Asked Questions about Cryptography file. Version 2.0, last updated 20 Sep 1993. [90]RSAREF20 RSA Data Security Inc.'s reference implementation of RSA. Includes code for DES and MD5. Bignum package can be easily modified to do El Gamal, Diffie-Hellman, DSA, etc. Version 2.0. [91]SAFER SAFER algorithm, written by Michael Roe in 1994. [92]SCICRYPT The Frequently-Asked Questions file for the Internet newsgroup, sci.crypt. [93]SEAL SEAL cipher, written by Michael Roe in 1994. [94]SHA1 Old Secure Hash Algorithm, written by Peter Gutmann in 1992. [95]SHA2 Old Secure Hash Algorithm, written by Paul Rubin in 1994. [96]SHA3 Old and new Secure Hash Algorithm. [97]SHARING Code to implement a threshold scheme, written by Peter Pearson in 1993. [98]SNEFRU Snefru algorthm, written by Ralph Merkle in 1989. [99]SNUFFLE Program to turn a one-way hash function into an encryption function, by Dan Bernstein. [100]SPLAY Compression and encryption in C based on splay trees. [101]TEA The Tiny Encryption Algorithm, designed and written by David Wheeler and Roger Needham in 1994. [102]TIS-PEM The Frequently Asked Questions file about the TIS implementation of PEM. Last updated 29 Oct 93. Includes where to get a copy. [103]TRAN Carl Ellison's TRAN function, a large-block mixing function. Written in 1995. [104]TRAN-PWD TRAN with the addition of a key, written by Carl Ellison in 1995. [105]TRNSPOSE Cipher that does a transposition of a 8192 byte block, based on a random number generator, by William Setzer. [106]VIGENERE A program that encrypts using Viegnere, Beauford, or Variant Beauford ciphers. Written by Leisa Condie in Dec 1992. [107]VIGSOLVE Program to solve Vigenere cipher, by Mark Riordan in 1991. [108]WPCRACK Program to break WordPerfect's encryption, written by Ron Dippold in 1991. [109]ZIP The encryption algorithm used in the PKZIP 2.04g and 2.0.1 compression program. The algorithm was written by Roger Schlafly. [110]ZIP-BARK A pseudo-random sequence generator by Chris Barker, 1995. References 1. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/3-way.zip 2. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/a5.zip 3. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/assorted.zip 4. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/bbc.zip 5. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/bignum1.zip 6. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/bignum2.zip 7. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/blowfish.zip 8. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/ca1_1.zip 9. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/cbw.zip 10. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/chambers.zip 11. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/crpt-pol.zip 12. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/crypt1.zip 13. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/crypt3-1.zip 14. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/crypt3-2.zip 15. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/cryptolb.zip 16. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-barr.zip 17. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-bish.zip 18. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-karn.zip 19. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-koon.zip 20. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-levy.zip 21. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-louk.zip 22. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-mitc.zip 23. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-osth.zip 24. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-oute.zip 25. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/des-youn.zip 26. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/dessbox.zip 27. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/enigma.zip 28. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/escrow.zip 29. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/examples.zip 30. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/feal8.zip 31. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/fealnx.zip 32. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/fips171.zip 33. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/fips180.zip 34. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/fips181.zip 35. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/fips185.zip 36. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/freq.zip 37. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/gost.zip 38. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/grenbook.zip 39. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/hashes.zip 40. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/haval.zip 41. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/hill.zip 42. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/i-hat.zip 43. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/idea_c.zip 44. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/idea68k.zip 45. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/idea8086.zip 46. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/isomorph.zip 47. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk1/index.zip 48. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/itar.zip 49. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/kerberos.zip 50. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/khufu.zip 51. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/ks-test.zip 52. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/lcrng.zip 53. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/lcrng-t.zip 54. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/loki.zip 55. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/lucifer2.zip 56. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/md-rfc.zip 57. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/md4.zip 58. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/md4-dos.zip 59. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/md5-karn.zip 60. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/mimic.zip 61. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/newde.zip 62. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/newdes.zip 63. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/nhash.zip 64. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/nsea.zip 65. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/pem-rfc.zip 66. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/pgp.zip 67. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/pike.zip 68. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/pkc.zip 69. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/playfair.zip 70. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/ppsc.zip 71. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/prngxor.zip 72. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/prv-anmt.zip 73. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/radix64.zip 74. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/ran-mix.zip 75. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/random1.zip 76. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/random2.zip 77. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/random3.zip 78. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/random4.zip 79. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/rc4.zip 80. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/rc4asm.zip 81. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/rc5-1.zip 82. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/rc5-2.zip 83. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/rc5-3.zip 84. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/redoc2.zip 85. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/redoc3.zip 86. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/ripe-md.zip 87. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/ripem12a.zip 88. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk2/rnd-anls.zip 89. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/rsa-faq.zip 90. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/rsaref20.zip 91. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/safer.zip 92. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/scicrypt.zip 93. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/seal.zip 94. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/sha1.zip 95. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/sha2.zip 96. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/sha3.zip 97. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/sharing.zip 98. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/snefru.zip 99. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/snuffle.zip 100. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/splay.zip 101. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/tea.zip 102. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/tis-pem.zip 103. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/tran.zip 104. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/tran-pwd.zip 105. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/trnspose.zip 106. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/vigenere.zip 107. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/vigsolve.zip 108. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/wpcrack.zip 109. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/zip.zip 110. http://tirnanog.ls.fi.upm.es/Servicios/Software/ap_crypt/disk3/zip-bark.zip [disk1] [disk2] [disk3]