Cryptography Reference
In-Depth Information
To run this program, you need Tcl/Tk and a UNIX
system, because trans requires 'real pipelines'
(they are merely emulated in DOS/Windows). The
invocation is explained in the program and in
Section 4.1.5. The images reappears after 72-fold
encryption. The effect is amazing.
fcrypt directory:
fcrypt.c
This is the fcrypt encryption program discussed in
Section 3.7. There is no documentation; you find a
description in [Wobfcrypt]. Don't use this method!
The program is included for analysis only!
secshare directory:
Includes the Python script (plus C program) for
secret-sharing implementation, as discussed in
Section 6.2.
algor directory:
A5 directory:
a5-article.txt
Description of the A5 algorithm for cell phones in
the digital D- and E-networks (see Section 5.7.2).
a5.c
Implementation of the algorithm in C.
a3a8.c
Implementation of the secret A3 and A8
algorithms as they are used in the D2-network
(see Section 6.1.3).
gsm.txt
Description of the security mechanism of cell
phones (see Section 6.1.3).
AES directory:
The AES implementations from www.nist.gov/aes
(see Section 5.5).
blowfish directory:
The implementation of the Blowfish algorithm
from Section 5.7.4; including test data.
idea directory:
An implementation of the IDEA algorithm (5.3)
by De Moliner (Zurich, Switzerland).
DES directory:
karndes directory:
DES implementation by Philipp Karn; a very
small and simple implementation of the algorithm.
osthes directory:
A much more extensive DES implementation by
Stig Ostholm, including built-in ciphering modes,
different key formats, etc.
Search WWH ::




Custom Search