diggcode.txt 2029 bytes. |
Digg.com censored for revealing HD-DVD code
|
pan_rar.txt 15954 bytes. by pan
(2009)
|
How to recover a RAR key in Linux
|
wpadweak.pdf 351208 bytes. by S. Rublev
(2009)
|
WPAD technology weaknesses
Cryptography
|
pegasus1.htm 4028 bytes. by Galldor
(1999)
|
Pegasus Mail (all) weak password crypto
Advisory
Cryptography
Windows
|
fcrypt.c 25183 bytes. |
Eric Yong's Fcrypt C source - part of a Netscape SSL implementation
|
stegdetn.pdf 822440 bytes. by Provos, Honeyman
(2001)
|
Detecting Steganographic Content on the Internet
Cryptography
|
public.pdf 288780 bytes. by T. Moh
(1997)
|
A Public Key System With Signature And Master Key Functions
Cryptography
|
macneilc.txt 12436 bytes. |
Open Sesame - McNeil-Lehrer News Hour report on Clipper
Cryptography
|
key_st~1.txt 64508 bytes. (1996)
|
The Risks of Key Recovery, Key Escrow, and Trusted 3rd Party Encryption Various Authors
|
perlcss1.gif 29450 bytes. (2001)
|
A picture of the source code for the smallest known Perl implementation of a CSS descrambler.
|
perlcss2.gif 32797 bytes. (2001)
|
A picture of the source code for a slightly larger, but much faster Perl implementation of a CSS descrambler.
|
dcsshaik.txt 31723 bytes. (2001)
|
Astounding! The DeCSS Haiku!
|
tinycss.gif 24636 bytes. (2001)
|
Here is the smallest known C implementation of a CSS descrambler.
|
decssdst.htm 58311 bytes. (2000)
|
42 ways to Distribute DeCSS (or just about anything else "they" don't want you to know!) by Samuel Hocevar
Cryptography
|
cipher.txt 31719 bytes. |
64 bit codes
|
ptpkzip.txt 25859 bytes. |
A Known Plaintext Attack on the PKZip Stream Cipher
Cryptography
|
narafile.htm 395395 bytes. by CIA
(2003)
|
A list of declassified CIA documents, mostly relating to early crypto and pre-WWII espionage
Cryptography
Espionage
|
099.pdf 287572 bytes. by E.Filiol
(2002)
|
A New Statistical Testing for Symmetric Ciphers and Hash Functions
Cryptanalysis
|
a5-1.c 11687 bytes. (1999)
|
A Pedagogical Implementation of A5/1
Cryptography
|
aprime~1.pdf 461450 bytes. (2001)
|
A Primer on Mobile Application Security
Cellular
Cryptography
|
12-00.pdf 142057 bytes. (2000)
|
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Cryptography
|
steganog.txt 6218 bytes. |
A synopsis of Steganography
Steganography
|
a5.txt 16183 bytes. |
A5, the GSM encryption algorithm. Once thought to be too good for Saddam Hussein, now even the government admits it sucks...
|
g-312.pdf 1189632 bytes. (2000)
|
About the Abwehr G-312 Enigma machine
Cryptography
|
ih99-s~1.pdf 143135 bytes. |
Adobe Acrobat paper on StegFS and the Steganographic File System concept
Steganography
|
confeb92.txt 85299 bytes. |
Air Force Cryptologic Support Center's Newsletter, "The Connection" February 92
|
americ~1.txt 9706 bytes. (1988)
|
American Vietnam P.O.W. Code
Cryptography
|
a5attack.txt 5692 bytes. (2003)
|
An attack on A5
Cellular
Cryptanalysis
|
encrypti.txt 48004 bytes. |
An Introduction to the Use of Encryption
Cryptography
|
apx.pl 3476 bytes. (2002)
|
AppendX Simple steganography in Perl
Steganography
|
asoft3~1.htm 5563 bytes. by ByteRage
(2001)
|
ArGoSoft FTP Server 1.2.2.2 password decryption FTP:
Advisory
Cryptography
|
stego.txt 4547 bytes. |
Article about Cypherella and her mighty creation, Stego, the picture encoding privacy scheme
|
pra04456.pdf 199332 bytes. by Brandt/Myers/Lomonaco
(1997)
|
Aspects of entangled translucent eavesdropping in quantum cryptography
Cryptanalysis
|
marking.pdf 458700 bytes. (1998)
|
Attacks on Copyright Marking Systems
Steganography
|
snakeoil.txt 31427 bytes. |
Avoiding Crypto "Snake Oil" products.
Cryptography
Frequently Asked Questions
|
800_1sec.txt 92877 bytes. |
Bibliography of encryption texts
|
blowfish.txt 18137 bytes. |
Blowfish Source Code!
|
lesson2.txt 2307 bytes. by HeadTrip
(2001)
|
Breaking Cue:Cat Encryption for Complete Fucking Retards
Cryptography
|
breakms.c 57197 bytes. (1997)
|
BreakMS - Break Microsoft Private Key Encryption with a dictionary attack
Cryptanalysis
|
bgate2.htm 3662 bytes. by S. Alexander
(2000)
|
BrowseGate 2.80.2 weak password encryption
Advisory
Cryptography
Exploit
Windows
|
cesar~1.htm 1348 bytes. by ByteRage
(2001)
|
CesarFTP v0.98b Directory Traversal, Weak Password Encryption
Advisory
Cryptography
|
citrix3.htm 2699 bytes. by D. Song
(2000)
|
Citrix ICA Basic Encryption
Advisory
Cryptography
|
clippers.txt 9729 bytes. (1994)
|
Clinton announces Clipper is scaled back!
Cryptography
Press Release
|
newdes.c 6796 bytes. |
Code to implement the NEWDES algorithm
|
ccc.htm 2972 bytes. by R. Scott
(2001)
|
Computer Associates' CCC\Harvest 5.0 weak encryption
Advisory
Cryptography
Windows
|
crypto_1.txt 19363 bytes. |
CPSR letter on cryptography policy
|
bt40.txt 1630 bytes. (2003)
|
Cracking preshared keys
Cryptanalysis
|
crackean.txt 3600 bytes. by Moe1
(1999)
|
Cracking the EAN Barcode System
Cryptography
|
ibm4758c.htm 2840 bytes. (2001)
|
Cracking the IBM 4758 Crypto Co-Processor
Cryptanalysis
Exploit
|
crcrev.txt 36429 bytes. (1999)
|
CRC and how to reverse it
Cryptography
|
modified.txt 10307 bytes. |
Crypt-decrypt program based on a WWII algorithm (Modified Enigma)
|
cssanlys.txt 16756 bytes. (1999)
|
Cryptanalysis of a Contents Scrambling System by Frank A. Stevenson
Cryptography
|
044.pdf 344378 bytes. by Courtois/Pieprzyk
(2002)
|
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Cryptanalysis
|
pptpcryp.pdf 169442 bytes. (1999)
|
Cryptanalysis of Microsoft's PPTP Authentication Extensions
Cryptography
|
ttm.pdf 200340 bytes. by Goubin/Courtois
(2002)
|
Cryptanalysis of the TTM Cryptosystem
Cryptanalysis
|
crypglos.txt 28469 bytes. |
Crypto Glossary
|
hk_crypt.txt 34587 bytes. |
Cryptography
|
crypto~1.txt 4495 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial - Intro
Cryptography
|
part1.pdf 459189 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 1 of 8
Cryptography
|
part2.pdf 431402 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 2 of 8
Cryptography
|
part3.pdf 335679 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 3 of 8
Cryptography
|
part4.pdf 112492 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 4 of 8
Cryptography
|
part5.pdf 409249 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 5 of 8
Cryptography
|
part6.pdf 197346 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 6 of 8
Cryptography
|
part7.pdf 471526 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 7 of 8
Cryptography
|
part8.pdf 83999 bytes. by P. Gutmann
(1998)
|
Cryptography and Data Security Tutorial Part 8 of 8
Cryptography
|
voynich.txt 9853 bytes. |
Cryptography and John Dee - A true mystery
|
cryptref.txt 34087 bytes. |
Cryptography references
|
crypfq01.txt 5254 bytes. |
Cryptogrphy Faq Part 1
|
crypfq10.txt 17487 bytes. |
Cryptogrphy Faq Part 10
|
crypfq02.txt 4098 bytes. |
Cryptogrphy Faq Part 2
|
crypfq03.txt 8840 bytes. |
Cryptogrphy Faq Part 3
|
crypfq04.txt 10136 bytes. |
Cryptogrphy Faq Part 4
|
crypfq05.txt 20981 bytes. |
Cryptogrphy Faq Part 5
|
crypfq06.txt 4773 bytes. |
Cryptogrphy Faq Part 6
|
crypfq07.txt 3519 bytes. |
Cryptogrphy Faq Part 7
|
crypfq08.txt 18253 bytes. |
Cryptogrphy Faq Part 8
|
crypfq09.txt 8047 bytes. |
Cryptogrphy Faq Part 9
|
cryptol1.txt 8235 bytes. (2000)
|
Cryptology Part 1
Cryptanalysis
|
cuteftp.doc 1085 bytes. |
CuteFTP 4.0.19 Password Encryption Routine
Cryptography
|
mimic.pl 49566 bytes. (2001)
|
CyberArmy Spam Steganograpy SPM:
Source Code
Steganography
|
desblt.txt 24471 bytes. |
Data Encryption Standard
|
decrypt.txt 33577 bytes. |
Decrypting The Puzzle Palace
|
decsspls.c 8460 bytes. (2002)
|
DeCSSPlus Alleged to be an improvement on the controversial DeCSS code
|
bt1419.txt 8568 bytes. (2003)
|
defeating Lotus Sametime "encryption"
Cryptanalysis
|
bt32.txt 5819 bytes. (2003)
|
Defeating HTML "Encryption"
Cryptanalysis
World Wide Web
|
defpgplm.doc 24064 bytes. by JD Glaser
(1999)
|
Defeating PGP in NT with LanMan
Cryptography
Windows
|
des_algo.txt 9358 bytes. |
DES Algorithm changes
|
descrypt.txt 35357 bytes. |
DES encryption shell
|
desval.txt 3074 bytes. |
DES Validation List
|
blowfsh1.txt 30242 bytes. |
Description of a new Variable-Length key, 64-bit block cipher (Blowfish)
Cryptography
|
encryp~2.txt 8974 bytes. (1999)
|
Die Grundlagen der Verschlüsselung - The Basics of Cryptography in German
Cryptography
In German
|
dpa.pdf 222534 bytes. by Kocher/Jaffe/Jun
(1999)
|
Differential Power Analysis - White Paper
Cryptanalysis
|
cslbull.txt 16637 bytes. |
Digital Signature Standard
|
plaineng.htm 17973 bytes. (2000)
|
Dr. David S. Touretzky describes CSS Decryption in English.
Cryptography
|
ei.txt 5632 bytes. |
Encryption Information
|
merkle1.txt 6035 bytes. |
Encryption paper from usenet (very technical)
|
enigma.txt 7407 bytes. |
Enigma encryption simulation
|
euro-scr.htm 135041 bytes. |
European Scrambling Systems FAQ 01/97
|
eurocryp.txt 27117 bytes. |
Everything you wanted to know about Eurocrpyt
Cryptography
|
merkle2.txt 9793 bytes. |
Explanation of above by John Gilmore
|
cryt_faq.txt 123217 bytes. |
FAQ for sci.crypt
|
fastdes.txt 8687 bytes. |
Fast DES routines available from various Internet sites
|
flash-b.pdf 157815 bytes. (2002)
|
FLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography
|
flash-c.pdf 84813 bytes. (2002)
|
FLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography
|
pgpfaq.txt 25340 bytes. |
Frequently asked questions about PGP encryption
|
a_crypt.txt 22476 bytes. |
From CPSR: U.S. wants to outlaw the use & export of cryptography
|
zimpgp.txt 31462 bytes. (1993)
|
From sci.crypt: Secrets Agent. Story about computer encryption by a criminal
Cryptography
|
ffp.pdf 173300 bytes. by THC
(2002)
|
Fuzzy Fingerprints - Attacking Vulnerabilities in the Human Brain
Cryptography
|
gpgman.pdf 204377 bytes. (2001)
|
Gnu Privacy Handbook
Cryptography
|
gnupg3~1.htm 31125 bytes. by Fish Stiqz
(2001)
|
GnuPG format string weakness
Advisory
Cryptography
Unix
|
gnupg2.htm 5021 bytes. by F. Weimer
(2000)
|
GnuPG trust issues
Advisory
Cryptography
|
gpg1.htm 11007 bytes. by J. Small
(2000)
|
GPG 1.0.3 can fail to detect message tampering
Advisory
Cryptography
|
stopclip.gif 27254 bytes. |
Grafitti: "Fuck Clipper, Stop the NSA"
Cryptography
|
handbo~1.pdf 4857327 bytes. (1996)
|
Handbook of Applied Cryptography
Cryptography
|
hdcp~1.htm 1532 bytes. by N. Ferguson
(2001)
|
High-bandwidth Digital Content Protection system cracked
Advisory
Cryptography
|
087.pdf 233169 bytes. by Courtois
(2002)
|
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
Cryptography
|
010.pdf 340426 bytes. by Courtois/Finiasz/Sendrier
(2002)
|
How to achieve a McEliece based Digital Signature Scheme
Cryptography
|
md5-attk.pdf 188863 bytes. by Xiaoyun Wang, Hongbo Yu
(2005)
|
How to break MD5 and other hash functions
Cryptanalysis
|
legal_kl.txt 4095 bytes. |
How to legally circumvent PGP's "legal_kludge"
|
rot13.c 336 bytes. |
How to ROT13 in C
|
icip00wm.pdf 59890 bytes. |
Image Watermarking with Better Resilience
Steganography
|
tr_cs91_.txt 32345 bytes. |
Improving resistance to Differential Cryptanalysis and the redesign of LOKI
|
dns.txt 133944 bytes. |
Info on Reverse and Double Reverse Lookups
|
cryptprg.txt 345946 bytes. |
Info on state-of-the-art public key cryptography
|
clipper.txt 38364 bytes. |
Info on the "Clipper" encryption chip
|
des.txt 22454 bytes. |
Info on the DES standard in Encryption
|
ipgp0201.txt 21027 bytes. |
Info-PGP Digest, 2.01
|
ipgp0202.txt 24168 bytes. |
Info-PGP Digest, 2.02
|
ipgp0203.txt 29750 bytes. |
Info-PGP Digest, 2.03
|
ipgp0204.txt 35834 bytes. |
Info-PGP Digest, 2.04
|
ipgp0205.txt 43035 bytes. |
Info-PGP Digest, 2.05
|
sslcrack.txt 6656 bytes. |
Information on cracking Netscape's SSL encryption protocol
|
pgptrix.txt 74190 bytes. |
Informative text file on PGP encryption and encryption in general
|
sp800-32.pdf 261376 bytes. by NIST
(2001)
|
Introduction to Public Key Technology and the Federal PKI Infrastructure
Crayola Book
Cryptography
|
iomega.htm 1925 bytes. by Aberrant
(1999)
|
Iomega Jaz One-Step Backup password protected by weak XOR
Advisory
Cryptography
|
pkeyring.txt 36209 bytes. |
Jason's Public Key Compilation List 0.9
|
cuecatd.htm 6695 bytes. by D. Hull
(2000)
|
JavaScript CueCat Decoder
Accessory
Cryptography
|
a6121.htm 640 bytes. (2003)
|
JpegX password bypass
Steganography
|
encryp~3.txt 9473 bytes. (1999)
|
La base de la Cryptographie - The Basics of Cryptography in french
Cryptography
In French
|
csslect.txt 24187 bytes. (2000)
|
Lecture Notes from a lecture given at CMU on CSS
Cryptography
|
oech03.pdf 242617 bytes. (2003)
|
Making a Faster Cryptanalytic Time-Memory Trade-Off
Cryptanalysis
|
meekscrp.txt 11086 bytes. |
Meeks on Cryptography
|
mmaker.htm 7850 bytes. by M. Power
(2000)
|
Meeting Maker weak password cipher
Advisory
Cryptography
Windows
|
merkle.txt 84223 bytes. |
Merkle's paper on encryption
|
hmail1~1.htm 8755 bytes. by G. Duchemin
(2001)
|
Messenger/Hotmail bug inpassword encryption
Advisory
Cryptography
Windows
|
msdrm.txt 26565 bytes. by Beale Screamer
(2001)
|
Microsoft's Digital Rights management Scheme
Cryptography
|
800-20.pdf 1275531 bytes. by NIST
(2000)
|
Modes of Operation Validation System for the Triple Data Encryption Algorithm
Cryptography
|
mondo2k.txt 5049 bytes. |
Mondo 2000 article on Senate bills S266 and S618 trying to include back doors in encrption software & PGP freeware that cam
|
crypto_2.txt 20964 bytes. |
More from CPSR on the government and cryptography
|
v7-2065.htm 1549 bytes. by Gerardo Richarte
(2005)
|
more MD5 colliding examples
Cryptography
|
pkcs.htm 9755 bytes. by D. Bleichenbacher
(1998)
|
Most software using PKCS#1 - ciphertext attack on SSL
Advisory
Cryptography
World Wide Web
|
ntscpcrk.txt 3201 bytes. |
Netscape Security has been cracked with $584 worth of computer time on a graphics workstation!
|
crypt-pw.htm 3994 bytes. by J. Lewis
(1999)
|
Netsol's Auth Scheme Crypt-PW self-salting password encryption
Advisory
Cryptography
|
cryptp~1.htm 9624 bytes. by P. Ajamian
(2001)
|
Network Solutions Crypt-PW Weak Encryption
Advisory
Cryptography
|
fips196.pdf 163546 bytes. (1997)
|
NIST FIPS-196: Entity Authentication Using Public Key Cryptography
Cryptography
|
fips-197.pdf 279457 bytes. (2001)
|
NIST FIPS-197: The Advanced Encryption Standard
Cryptography
|
csspab.txt 5453 bytes. |
NIST Privacy Board Resolutions on Clipper technology
|
cracking.txt 19401 bytes. |
Non-guessable random number generation in C
|
omnis.htm 5943 bytes. by E. Stevens
(2000)
|
Omnis RAD environment weak field encryption
Advisory
Multi Platform
Cryptography
|
crackpgp.txt 5533 bytes. |
On "cracking" PGP
|
gsma3a8.txt 5714 bytes. |
On A3 and A8 algorithms(sic) in GSM
Cryptography
|
attakrip.txt 9877 bytes. |
On Attacking RIPEM Systems
Cryptography
|
111.pdf 255183 bytes. by Fuller/Millan
(2002)
|
On Linear Redundancy in the AES S-Box
Cryptanalysis
|
jsac98.pdf 159495 bytes. (1998)
|
On The Limits of Steganography
Steganography
|
gsm-a5.txt 9501 bytes. |
On the weakness of the A5 encryption algorithm used by GSM
Cryptography
|
openssl2.htm 11867 bytes. by OpenSSL Advisory
(2001)
|
OpenSSL up to 0.9.6a pseudorandom number generator design error
Advisory
Cryptography
|
passwdex.htm 5676 bytes. by D. Roethlisberger
(2000)
|
PassWD v1.2 weak cipher decoding
Cryptography
Exploit
Password Hacking
|
passwd~1.htm 7098 bytes. by D. Roethlisberger
(2001)
|
PassWD2000 v2.x weak encryption
Advisory
Cryptography
|
pgp6.htm 3366 bytes. by ICZ
(2001)
|
PGP - discover private keys!
Advisory
Cryptography
|
pgp1.htm 3033 bytes. by P. Pedersen
(2000)
|
PGP - what happens when two users have the same Key ID!
Advisory
Cryptography
|
pgp2.htm 8825 bytes. by Caronni, Roessler, Waldvogel
(2000)
|
PGP 5.0 randomness flaw
Advisory
Cryptography
|
pgp5.htm 2012 bytes. by M. Kjorling
(2001)
|
PGP 7.0 Key import code vulnerability
Advisory
Cryptography
Windows
|
ciack070.htm 5959 bytes. by CIAC
(2000)
|
PGP Additional Decryption Keys (ADKs) Vulnerability
Advisory
Cryptography
|
pgp32.htm 1353 bytes. by USSR Labs
(2000)
|
PGP Certificate Server Version 2.5.0, 2.5.1 Solaris/Win null memory problem
Advisory
Cryptography
|
pgp7.htm 5576 bytes. by P. Birgersson
(2001)
|
PGP Desktop Security 7.0 flaws in the Split Key implementation
Advisory
Cryptography
|
pgp.txt 17224 bytes. (1999)
|
PGP Encryption for Beginners
Cryptography
|
pgpstart.txt 27206 bytes. |
PGP Startup Guide - DOS version
|
pgp4.htm 8293 bytes. by Young, Senderek, Early
(2000)
|
PGP-5.5.3i, PGP-6.5.1i ADKs bug
Advisory
Cryptography
|
pgp4pine.htm 6144 bytes. by V. Brennen
(2001)
|
Pgp4pine-1.75-6 fails to properly identify expired keys
Advisory
Cryptography
Unix
|
pgpf_sit.hqx 979695 bytes. |
PGPFone for Macintosh
Cryptography
Macintosh/MacOS
|
pgpfund.txt 4239 bytes. |
Phil Zimmerman Defense Fund info. Phil Zimmerman is the author of the PGP
|
p-02580.txt 6701 bytes. (2001)
|
Phil Zimmermann: "No regrets" about developing PGP
Cryptography
Cyber Culture
|
whthsecr.txt 29512 bytes. (1998)
|
Press briefing from the White House on Encryption.
Cryptography
Legal Info
|
clipfact.txt 5108 bytes. |
Press release on the hazards of Clipper
|
primes.txt 21041 bytes. |
Primes, codes, and the National Security Agency
|
des_prob.txt 3946 bytes. |
Problems with DES encryption by Ratsnatcher
|
nist_sec.txt 25358 bytes. |
Proposed NIST Secure Hash Standard
|
pskatack.pdf 170493 bytes. (2003)
|
PSK Cracking using IKE Aggressive Mode
Cryptography
Internet
|
pub_key.txt 345982 bytes. |
Public Key Cryptography
|
crypt.txt 345952 bytes. (1990)
|
Public Key Cryptography
Cryptography
|
800-2.txt 346035 bytes. by NIST
(1991)
|
Public-Key Cryptography
Cryptography
|
quartz-b.pdf 205901 bytes. by Courtois/Goubin/Patarin
(2001)
|
Quartz, an asymmetric signature scheme for short signatures on PC
Cryptography
|
rta51.htm 58584 bytes. by Biryukov/Shamir/Wagner
(2000)
|
Realtime Cryptanalysis of A5/1 on a PC
Cryptanalysis
|
sp800.pdf 229834 bytes. (2001)
|
Recommendation for Block Cipher Modes of Operation
Cryptography
|
pgp2x.pdf 74244 bytes. |
Replacing PGP 2.x with GPG
Cryptography
|
clipfoia.txt 24532 bytes. |
Results of Freedom of Information request about Clipper chip
|
rfc1319.txt 26638 bytes. |
RFC 1319: MD2 Message-Digest Algorithm
|
rfc1320.txt 33555 bytes. |
RFC 1320: MD4 Message-Digest Algorithm
|
rfc1321.txt 36427 bytes. |
RFC 1321: MD5 Message-Digest Algorithm
|
rfc1421.txt 106296 bytes. |
RFC 1421: Privacy Enhancement for Internet Electronic Mail, Part I: Message Encryption and Authentication Procedures
|
rfc1422.txt 87917 bytes. |
RFC 1422: Privacy Enhancement for Internet Electronic Mail, Part II: Certificate-Based Key Management
|
rfc1423.txt 34083 bytes. |
RFC 1423: Privacy Enhancement for Internet Electronic Mail, Part III: Algorithms, Modes, and Identifiers
|
rfc1424.txt 18058 bytes. |
RFC 1424: Privacy Enhancement for Internet Electronic Mail, Part IV: Key Certification and Related Services
|
glossary.htm 433703 bytes. (1999)
|
Ritter's Crypto Glossary
Cryptography
Frequently Asked Questions
|
szarka.asc 1640 bytes. |
Rob Szarka, Sea of Noise (PGP Public Key)
|
cryp5210.htm 6762 bytes. (2002)
|
RSA and Diffie-Hellman keys are broken up to 1024bits in seconds
Cryptanalysis
Exploit
|
rsa.txt 7407 bytes. |
RSA encryption
|
cryp1faq.txt 53636 bytes. (1993)
|
RSA Encryption FAQ 1/3
Cryptography
Frequently Asked Questions
|
cryp2faq.txt 60549 bytes. (1993)
|
RSA Encryption FAQ 2/3
Cryptography
Frequently Asked Questions
|
cryp3faq.txt 55364 bytes. (1993)
|
RSA Encryption FAQ 3/3
Cryptography
Frequently Asked Questions
|
cdc327.txt 14006 bytes. (1997)
|
S/KEY Vulnerabilities - Mudge
|
powcodes.txt 20261 bytes. (1994)
|
Sapphire Stream Cipher
Cryptography
|
atalynx.txt 8500 bytes. |
sci.crypt partial thread on the use of encryption in video games to prevent thir
Cryptography
|
fip180-1.pdf 140819 bytes. (1995)
|
Secure Hash Standard
Cryptography
|
securid.htm 14628 bytes. by I.C. Wiener
(2001)
|
SecurID Token Emulator with Token Secret Import - easily breakable algorithm
Advisory
Cryptography
|
pgp-ba~1.htm 21558 bytes. (2000)
|
Serious Bug in PGP!
Advisory
Cryptography
|
sflash-b.pdf 155321 bytes. (2002)
|
SFLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography
|
sflash-c.pdf 84549 bytes. (2002)
|
SFLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography
|
cdc_226.txt 15600 bytes. (1993)
|
Simple Cryptology by Dave Ferret
|
simpcryp.txt 3884 bytes. |
Simple Encryption
|
skipjack.txt 27131 bytes. |
Skipjack Review - includes the algorithm
Cryptography
|
snowworx.txt 5311 bytes. |
Snow - how whitespace encryption works
Steganography
|
rsa_tatt.gif 45527 bytes. |
Someone tattoed the "RSA in 3 lines of Perl" code on his arm!!!
Cryptography
|
stegfaq.txt 15769 bytes. |
Steganography FAQ
Frequently Asked Questions
Steganography
|
submit.txt 138495 bytes. |
Submissions to NIST CSSAB on encryption and CLIPPER technology initiative
|
zimmtest.txt 17709 bytes. |
Testimony of Philip Zimmermann to the Subcommittee on Science, Technology and Space, of the U.S. Senate Committee on Commerce,
|
breakdes.txt 11051 bytes. (1993)
|
Text on "breaking" DES encryption. Tells about the new decryption techniques, etc.
Cryptography
|
s_box_ex.txt 9322 bytes. |
Text on the "S" boxes for DES. Talks mostly about the weaknesses of DES
|
sdmi.htm 44794 bytes. |
The banned paper - "Reading Between the Lines - the SDMI Challenge"
|
encryp~1.txt 8428 bytes. (1999)
|
The Basics of Cryptography
Cryptography
|
schneier.c 13165 bytes. |
The Blowfish Algorithm
|
cloak.txt 14139 bytes. (1990)
|
The Cloak Crypto Scheme
Cryptography
|
upc.txt 261 bytes. (2001)
|
The CueCat UPC-A Cipher (or why writing a program to "decode" CueCat output is trivial)
Cryptography
|
chaum_di.txt 34191 bytes. by Chaum
|
The Dining Cryptographers Problem
|
pooshe.htm 182004 bytes. (2000)
|
The DVD Logo made out of the CSS descrambler source code!
Cryptography
|
history.txt 9359 bytes. (1988)
|
The History of Enigma
Cryptography
|
pgpup.txt 20671 bytes. (1993)
|
The Internet Code Ring! An Interview with Phil Zimmerman
Cryptography
|
fips-198.pdf 177180 bytes. (2002)
|
The Keyed-Hash Message Authentication Code (HMAC)
Cryptography
|
faults.txt 5011 bytes. |
The Next Stage of Differential Fault Analysis
|
pgpatack.txt 33090 bytes. (1995)
|
The PGP Attack FAQ, beta v.10 on the theoretical possibility of cracking RSA
Cryptography
Frequently Asked Questions
|
ppfaq104.txt 35664 bytes. |
The PGP Passphrase FAQ
|
rijndael.pdf 1043552 bytes. (1999)
|
The Rijndael (AES) Specification
Cryptography
|
key_st.txt 64508 bytes. (1997)
|
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
Cryptography
|
perlrsa2.gif 13230 bytes. |
The RSA algorithm on a bumpersticker - Slightly more readable OCR font
Cryptography
|
perl_rsa.gif 13240 bytes. |
The RSA algorithm on a bumpersticker ...Conveniently OCRable
Cryptography
|
sapphire.txt 27496 bytes. |
The Sapphire II Stream Cipher
Cryptography
|
fips1802.pdf 296515 bytes. (2002)
|
The Secure Hash Standard
Cryptography
|
page1.gif 40746 bytes. (2000)
|
This is not DeCSS, it is a PICTURE of DeCSS, for study of the process. 1 of 3
Cryptography
|
page2.gif 28079 bytes. (2000)
|
This is not DeCSS, it is a PICTURE of DeCSS, for study of the process. 2 of 3
Cryptography
|
page3.gif 12964 bytes. (2000)
|
This is not DeCSS, it is a PICTURE of DeCSS, for study of the process. 3 of 3
Cryptography
|
gpg106sg.txt 761 bytes. (2001)
|
This is the signature for the GnuPG 1.06 Tarball
Cryptography
|
timing.pdf 211673 bytes. by P. Kocher
(1995)
|
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Cryptanalysis
|
yeltsinb.txt 13072 bytes. |
Translation of Boris Yeltsin's decree banning crypto in Russia
Cryptography
Legal Info
|
cryptec.pdf 229457 bytes. by T. Moh
(2002)
|
TTM - A Fast Public Key System With Signature And Master Key Functions
Cryptography
|
ca200104.txt 7503 bytes. by CERT
(2001)
|
Unauthentic "Microsoft Corporation" certificates
Advisory
Cryptography
|
st04-018.htm 8496 bytes. by CERT
(2004)
|
Understanding Digital Signatures
Cryptography
|
st04-019.htm 6520 bytes. by CERT
(2004)
|
Understanding Encryption
Cryptography
|
upccode.txt 5787 bytes. |
UPC Codes cracked
Cryptography
|
conmar93.txt 47659 bytes. |
USAF Cryptologic Support Center Newsletter 03/10/93
|
arrl.txt 18465 bytes. |
Use of public key encryption on BBS networks
|
techdes.txt 41459 bytes. |
Validated hardware DES devices
|
schemes.doc 111104 bytes. (2000)
|
Watermarking Schemes Evaluation
Steganography
|
securid.ps 570661 bytes. |
Weaknesses in SecurID
Cryptography
|
rc4_ksa.pdf 329823 bytes. (2001)
|
Weaknesses in the Key Scheduling Algorithm of RC4
Wireless
Cryptography
|
zippass.txt 4807 bytes. |
Zip Encryption: Is it secure?
|
skey.txt 11048 bytes. |
Description of the S/KEY One-time password system
|
skeyflaw.txt 11419 bytes. |
Vulnerabilities in the S/KEY One-time password system
|