exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

cryptl99.txt

cryptl99.txt
Posted Dec 21, 1999

cryptl99.txt

tags | encryption
SHA-256 | 9d489923d081e50b2555660603ab6bc0d7a9169f927c6aa1efecea52bd838ded

cryptl99.txt

Change Mirror Download
From: pgut01@cs.auckland.ac.nz (Peter Gutmann)
Newsgroups: alt.security,comp.security.misc,sci.crypt
Subject: cryptl99.zip Free encryption library for DOS/UNIX/Windows
Date: 20 Nov 1995 09:57:45 GMT
Organization: University of Auckland
Sender: pgut01@cs.auckland.ac.nz (Peter Gutmann)
Message-ID: <48pjep$7ge@net.auckland.ac.nz>
NNTP-Posting-Host: cs26.cs.auckland.ac.nz
X-Newsreader: NN version 6.5.0 #3 (NOV)
Xref: news.lut.fi alt.security:31093 comp.security.misc:23319 sci.crypt:42403




[This was announced a few days ago, I've reposted it to a few crypto and
security groups for people who don't read the archives groups]

File name: ftp://garbo.uwasa.fi/pc/security/cryptl99.zip
One line description: Free encryption library for Unix/DOS/Windows

This encryption library provides a universal interface to a number of
conventional-key encryption algorithms. The library currently supports
encryption algorithms and modes of MDC/SHS CFB, DES ECB, CBC, CFB, OFB, PCBC,
triple DES ECB, CBC, CFB, OFB, IDEA ECB, CBC, CFB, OFB, RC4, SAFER ECB, CBC,
CFB, OFB, and SAFER-SK ECB, CBC, CFB, OFB. All encryption routines are
accessed through a single standardised interface with parameters such as
algorithm, mode and key size being selectable by the user. The library is
supplied as source code for Unix, DOS, and the Amiga, and as dynamic link
libraries for Windows and Windows NT.

The design goal for the library was to create an easy-to-use, standardised
interface to a number of popular encryption algorithms. Like the standard C
file I/O libraries which work with FILE objects, this library works with an
"encryption context" of type CRYPT_INFO. To encrypt data, you create an
encryption context, load a user key into it, en/decrypt data, and destroy it
when you've finished. This concept lends itself to implementation either as a
C++ class or as C routines.

The library has been written to be as idiot-proof as possible. On
initialization it performs extensive self-testing against test data from
encryption standards documents, and the API's check each parameter and
function call for errors before any actions are performed, with error
reporting down to the level of individual parameters.

The library API serves as an interface to a range of plug-in encryption
modules which allow encryption algorithms to be added in a fairly transparent
manner. The standardised API allows any of the algorithms and modes supported
by the library to be used with a minimum of coding effort. As such the main
function of the library is to provide a standard, portable, easy-to-use
interface between the underlying encryption routines and the user software.

All code is plain ANSI C, with no machine or OS-specific functions or calls
being used.

Peter.



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close