exploit the possibilities

snuffle.txt

snuffle.txt
Posted Dec 21, 1999

snuffle.txt

tags | encryption
MD5 | 279ae67f34fb46ea336d17144ed68cc5

snuffle.txt

Change Mirror Download
30 August 1997
Added URLs for Snuffle; see bottom of document.

****************************************************

CENSORED BY UNITED STATES GOVERNMENT AUGUST 28, 1997

See http://jya.com/bernstein8.htm

****************************************************
26 August 1997
ftp://coast.cs.purdue.edu/pub/tools/unix/snuffle.shar

Converted by JYA from .shar to .txt. Download original for surety.

----------------------------------------------------------------------------------------------

Path:
nosun!tektronix!zephyr.ens.tek.com!uw-beaver!mit-eddie!snorkelwacker!tut.cis.ohio-state.edu!cs
.utexas.edu!uunet!ogicse!husc6!cmcl2!kramden.acf.nyu.edu!brnstnd
From: brnstnd@kramden.acf.nyu.edu (Dan Bernstein)
Newsgroups: sci.crypt,alt.sources
Subject: snuffle, a very simple Snefru-based encryption package
Message-ID: <25738:Jun1409:02:4790@kramden.acf.nyu.edu>
Date: 14 Jun 90 09:02:47 GMT
Followup-To: sci.crypt
Distribution: usa
Organization: IR
Lines: 334
Xref: nosun sci.crypt:3208 alt.sources:1943

This is snuffle, a reasonably fast, private-key encryption package that
uses (but isn't derived from) Merkle's Snefru. Pick up snefru from
comp.sources.unix, volume 21, and compile it; snuffle should take less
than a minute after that. It runs about two to three times slower than
crypt on this Sun 4 (87K a second).

snuffle and unsnuffle take the key as the first line of input; if you
want echo turned off, do it yourself. They can also take an optional
``time-key'' on the command line---typically a time-dependent key, not
a secret one. (sci.crypt readers should be familiar with the reasons for
using a time-key.)

Don't you dare send this outside the USA without first asking the
appropriate agencies.

---Dan

#! /bin/sh
# This is a shell archive. Remove anything before this line, then unpack
# it by saving it into a file and typing "sh file". To overwrite existing
# files, type "sh file -c". You can also feed this as standard input via
# unshar, or by typing "sh <file", e.g.. If this archive is complete, you
# will see the following message at the end:
# "End of shell archive."
# Contents: Makefile README snuffle.1 snuffle.c unsnuffle.c
# Wrapped by brnstnd@kramden on Thu Jun 14 04:45:47 1990
PATH=/bin:/usr/bin:/usr/ucb ; export PATH
if test -f 'Makefile' -a "${1}" != "-c" ; then
echo shar: Will not clobber existing file \"'Makefile'\"
else
echo shar: Extracting \"'Makefile'\" \(702 characters\)
sed "s/^X//" >'Makefile' <<'END_OF_FILE'

****************************************************************


SNUFFLE CENSORED BY US GOVERNMENT AUGUST 28, 1997


****************************************************************
END_OF_FILE
if test 1277 -ne `wc -c <'unsnuffle.c'`; then
echo shar: \"'unsnuffle.c'\" unpacked with wrong size!
fi
# end of 'unsnuffle.c'
fi
echo shar: End of shell archive.
exit 0

----------------------------------------------------------------

30 August 1997

Date: Sat, 30 Aug 1997 01:18:02 +0100
From: Adam Back <aba@dcs.ex.ac.uk>
To: jya@pipeline.com
CC: cypherpunks@toad.com
Subject: Re: Snuffle Availability



There's another one which has been at:

ftp://idea.sec.dsi.unimi.it/pub/crypt/code/snuffle.tar.gz

for a long time.

Actually if you point a browser at:

ftp://idea.sec.dsi.unimi.it/pub/crypt/

you'll find a fine collection of mirrors of whole not-for-export sites
replete with DO_NOT_EXPORT warnings etc, plus many other illegally
exported stuff.

I love the Italians respect for export laws.

Adam
--
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`

--------------------------------------------------------------------------

Adam confirms non-US access to the US Snuffle source:

ftp://coast.cs.purdue.edu/pub/tools/unix/snuffle.shar

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    19 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close