1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-08 08:56:41 +02:00
Files
mirror-textfiles.com/programming/CRYPTOGRAPHY.html

97 lines
14 KiB
HTML

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>Programming Textfiles: Cryptography</H1>
<P>
A goal of all communicators, as far back as time records, is to ensure that
those communications reach the right people and don't fall into the hands
of others. To this end, codes and passwords and ciphers have been created
to make it so anyone intercepting a communication is unable to know what the
message is.
<P>
This goal has come into the computer era in the form of encrypted e-mail
and secure networking, and the politics that have arisen as a result are
what have brought a strong awareness of government policy and social
change to computing. This directory contains both technical and political
discussions.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/2xdesfou.txt">2xdesfou.txt</A> <tab to=T><TD> 6795<BR><TD> Nx2 DES Found Weak by Terry Ritter of Ritter Software Engineering (February 11, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/2xisolat.txt">2xisolat.txt</A> <tab to=T><TD> 10270<BR><TD> 2x Isolated Double-DES: Another Weak Two-Level DES Structure, by Terry Ritter of Ritter Software Engineering (February 16, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/4212582_.par">4212582_.par</A> <tab to=T><TD> 19559<BR><TD> Patent for Public Key Cryptographic Apparatus and Method
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/4405829.riv">4405829.riv</A> <tab to=T><TD> 94246<BR><TD> Cryptographic Communications System and Method Patent (RSA)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/4424414.hel">4424414.hel</A> <tab to=T><TD> 31340<BR><TD> Exponentiation cryptographic apparatus and method (1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/4562305.gaf">4562305.gaf</A> <tab to=T><TD> 19925<BR><TD> Software cryptographic apparatus and method Patent (1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/a-crypt.txt">a-crypt.txt</A> <tab to=T><TD> 23673<BR><TD> A Call to Arms in 1992 to Free Cryptography
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/arrl.txt">arrl.txt</A> <tab to=T><TD> 19296<BR><TD> Overview of some Basic Cryptographic Schemes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/atalynx.txt">atalynx.txt</A> <tab to=T><TD> 9546<BR><TD> Discussion of How Different Console Systems Handled Encryption
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/authenc.txt">authenc.txt</A> <tab to=T><TD> 16951<BR><TD> The Telnet Authetication Option with Encryption Draft, from the IETF (July 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/blowfish.cry">blowfish.cry</A> <tab to=T><TD> 31630<BR><TD> Description of a New Variable-Length Key, 64-Bit Block Cipher (Blow Fish) and Bruce Schneier
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/breaking.des">breaking.des</A> <tab to=T><TD> 11261<BR><TD> Is DES Breakable?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/chaum_di.txt">chaum_di.txt</A> <tab to=T><TD> 34187<BR><TD> The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability by David Chaum
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/cipher1.txt">cipher1.txt</A> <tab to=T><TD> 4374<BR><TD> Computer Ciphering by Steve Harrison of the San Diego IBM PC User SIG
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/clipper.txt">clipper.txt</A> <tab to=T><TD> 12777<BR><TD> Statement by the White House Announcing the Clipper Chip (April 16, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/code.txt">code.txt</A> <tab to=T><TD> 17664<BR><TD> Cracking the Code by Mark. D. Uehling
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/crossbow">crossbow</A> <tab to=T><TD> 29200<BR><TD> From Crossbows to Cryptography: Thwarting the State Via Technology
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/cryp.txt">cryp.txt</A> <tab to=T><TD> 16213<BR><TD> Data Encryption Fast and Secure by Harry J. Smith
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/crypt.pri">crypt.pri</A> <tab to=T><TD> 15965<BR><TD> Simple Cryptography, by a Simple Cryptographer, typed in by Dave Ferret of The Works
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/crypt.txt">crypt.txt</A> <tab to=T><TD> 345988<BR><TD> Public Key Cryptography, by James Nechvatal of the Security Technology Group (December, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/cryptfaq.txt">cryptfaq.txt</A> <tab to=T><TD> 122400<BR><TD> FAQ: Cryptography FAQ Version 1.0 (January 11, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/cryptloj.txt">cryptloj.txt</A> <tab to=T><TD> 12468<BR><TD> Cryptology as defined by Grolier Electronic Publishing
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/crypto.dic">crypto.dic</A> <tab to=T><TD> 28115<BR><TD> Cryptography Glossary by Timothy C. May
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/crypto.tch">crypto.tch</A> <tab to=T><TD> 12795<BR><TD> The Rises of Teaching About Computers and the Law
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/cryptogr.txt">cryptogr.txt</A> <tab to=T><TD> 65831<BR><TD> Cryptography: Trends in Techology and Policy, by Hoffman, Ali, Heckler, and Huybrechts (December 5, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/cryptoma">cryptoma</A> <tab to=T><TD> 3925<BR><TD> The Crypto Anarchist Manifesto by Timothy C. May
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/cryptprg.txt">cryptprg.txt</A> <tab to=T><TD> 346781<BR><TD> Public Key Cryptography, by James Nechvatal of National Institute of Standards and Technology (December 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/des.txt">des.txt</A> <tab to=T><TD> 23285<BR><TD> On the Digital Encryption Standard
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/des_nist.txt">des_nist.txt</A> <tab to=T><TD> 22446<BR><TD> The Data Encryption Standard Fact Sheet
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/dss.txt">dss.txt</A> <tab to=T><TD> 34816<BR><TD> A Proposed Federal Information Processing Standard for Digital Signature Standard (DSS) (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/hideseek.txt">hideseek.txt</A> <tab to=T><TD> 8685<BR><TD> DOCUMENTATION: Hide and Seek v1.html: Hide Information in GIF Files
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/ideafast.txt">ideafast.txt</A> <tab to=T><TD> 9830<BR><TD> A Quick IDEA, was: Speed of DES/IDEA implementations (Cryptography using IDEA) by Bryan Olson
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/intro.txt">intro.txt</A> <tab to=T><TD> 2669<BR><TD> PRESS RELEASE: NIST Proposes Computer Security "Digital Signature" Standard (1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/ladderbl.txt">ladderbl.txt</A> <tab to=T><TD> 4241<BR><TD> Large Block DES Newsletter (Volume 1, Number 1) February 28, 1994, by Terry Ritter
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/ladderde.txt">ladderde.txt</A> <tab to=T><TD> 11088<BR><TD> Ladder-DES: A Proposed Candidate to Replace DES by Terry Ritter (February 22, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/legal_kl.txt">legal_kl.txt</A> <tab to=T><TD> 4095<BR><TD> How to Legally Circumvent PGP 2.6's Legal Kludge by Paul Elliott (July 19, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/merkle.txt">merkle.txt</A> <tab to=T><TD> 85054<BR><TD> A Software Encryption Function, by Ralph C. Merkle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/mutation.txt">mutation.txt</A> <tab to=T><TD> 20015<BR><TD> DOCUMENTATION: MUTATi0N: Cryptography for Hackers/Phreakers & Others Version 1.html by Professor Falken (July 27, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/ncsatelnpw.hac">ncsatelnpw.hac</A> <tab to=T><TD> 4683<BR><TD> Eric thinks this new Cryptography scheme sucks
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/nist-cry.txt">nist-cry.txt</A> <tab to=T><TD> 346030<BR><TD> Public-Key Cryptography: NIST Special Publication 800-2 by James Nechvatal of the Security Technology Group (April 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/nortons_.txt">nortons_.txt</A> <tab to=T><TD> 8612<BR><TD> Norton's InDiskreet, by Peter Gutmann (November 11, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/nsapaper.txt">nsapaper.txt</A> <tab to=T><TD> 23411<BR><TD> Written Response from the NSA Regarding Cyptography, by Joe Abernathy of the Houston Chronicle (June 10, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pax.inf">pax.inf</A> <tab to=T><TD> 14112<BR><TD> Information about Anonymous & Privacy-Enhanced Posting (November 20, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pfaq.asc">pfaq.asc</A> <tab to=T><TD> 8565<BR><TD> NoiseNet Privacy Echo Frequently Asked Questions (March 16th, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgp.faq">pgp.faq</A> <tab to=T><TD> 84116<BR><TD> FAQ: alt.security.PGP (December 19th, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgp20faq.txt">pgp20faq.txt</A> <tab to=T><TD> 9349<BR><TD> FAQ: PGP Faq
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgp26mit.txt">pgp26mit.txt</A> <tab to=T><TD> 15265<BR><TD> Questions and Answers about MIT's Release of PGP 2.6 by Hal Abelson, Jeff Schiller, Brian LaMacchia, and Derek Atkins (June 2, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgpdoc1.txt">pgpdoc1.txt</A> <tab to=T><TD> 81069<BR><TD> The PGP User's Guide by Philip Zimmermann (May 22, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgpdoc2.txt">pgpdoc2.txt</A> <tab to=T><TD> 118436<BR><TD> The PGP User's Guide Volume II: Special Topics by Philip Zimmerman (May 22, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgpfaq.txt">pgpfaq.txt</A> <tab to=T><TD> 145330<BR><TD> FAQ: Frequently Asked Questions: Alt.Security.PGP (May 25, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgpfaq1.txt">pgpfaq1.txt</A> <tab to=T><TD> 34361<BR><TD> FAQ: Alt.Security.PGP (May 25, 1995)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgpfaq2.txt">pgpfaq2.txt</A> <tab to=T><TD> 54914<BR><TD> FAQ: Alt.Security.PGP (May 25, 1995) (Part II)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgpfaq3.txt">pgpfaq3.txt</A> <tab to=T><TD> 56055<BR><TD> FAQ: Alt.Security.PGP (May 25, 1995) (Part III)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgpjump.txt">pgpjump.txt</A> <tab to=T><TD> 17543<BR><TD> A Pretty Good Privacy Jump Start
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pgptb.txt">pgptb.txt</A> <tab to=T><TD> 22579<BR><TD> The PGP Time Bomb FAQ (August 16, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/polygona.txt">polygona.txt</A> <tab to=T><TD> 8611<BR><TD> The Cryptographic Uses of Polygonal Sequences by C. David Colston
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/pow_code.txt">pow_code.txt</A> <tab to=T><TD> 9912<BR><TD> American POW Communication Codes
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/rabin-al.txt">rabin-al.txt</A> <tab to=T><TD> 8111<BR><TD> Description of the Rabin Public Key Cryptosystem (August 24, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/rsa_news.txt">rsa_news.txt</A> <tab to=T><TD> 47625<BR><TD> Ciphertext: The RSA Newsletter Volume 1 Number 1 (Fall, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/rsafaq.txt">rsafaq.txt</A> <tab to=T><TD> 169559<BR><TD> FAQ: Frequently Asked QUestions about Today's Cryptography by Paul Fahn of RSA Laboratories (September 20, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/rsaisbro.txt">rsaisbro.txt</A> <tab to=T><TD> 12306<BR><TD> Public Key Cryptography is Easy to Break by William H. Payne (October 16, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/sapphire.txt">sapphire.txt</A> <tab to=T><TD> 20404<BR><TD> Information on the Sapphire Stream Cipher, from Michael Johnson (December 10, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/secdrv.txt">secdrv.txt</A> <tab to=T><TD> 40944<BR><TD> DOCUMENTATION: Secure Drive v1.3c by Edgar Swank
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/shr_ware.txt">shr_ware.txt</A> <tab to=T><TD> 28061<BR><TD> What is Shareware and What is the ASP? by MacGregor K. Phillips (1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/shs_doc.txt">shs_doc.txt</A> <tab to=T><TD> 24687<BR><TD> The Secure Hash Standard by Dennis Branstad of NIST
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/simpcryp.txt">simpcryp.txt</A> <tab to=T><TD> 4719<BR><TD> Simple Data Encryption or Digital Electronics 101 by The leftist
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/skipjack.txt">skipjack.txt</A> <tab to=T><TD> 27131<BR><TD> Skipjack Review: The Skipjack Algorithm by Brickell, Denning, Kent, Maher, Tuchman (July 28, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/techdes.txt">techdes.txt</A> <tab to=T><TD> 42290<BR><TD> Technical Information on Validated DES Devices (May 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/theory.des">theory.des</A> <tab to=T><TD> 72211<BR><TD> A Survey of Data Encryption by John A. Thomas
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/ww_pgp_a.txt">ww_pgp_a.txt</A> <tab to=T><TD> 29669<BR><TD> Zimmerman's PGP: A Cure for the Common Code (October 3, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="CRYPTOGRAPHY/zimmerma.txt">zimmerma.txt</A> <tab to=T><TD> 14505<BR><TD> The Testimony of Philip Zimmermann to the Subcommittee for Economic Policy, Trade, and the Environment (October 12, 1993)
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 71 files for a total of 3,194,574 bytes.</SMALL></TABLE></BODY>
</HTML>