what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

crypto-free.htm

crypto-free.htm
Posted Dec 21, 1999

crypto-free.htm is a paper on cryptography freedom

tags | encryption, cryptography
SHA-256 | 6cfe0e296ab845303da8e73b2915d35c3e729d217981c93f091f5aa91d709cc8

crypto-free.htm

Change Mirror Download
<HTML>
<HEAD>
<!-- Created with AOLpress/2.0 -->
<TITLE>International Cryptography Freedom</TITLE>
</HEAD>
<BODY BGCOLOR="#ffffff">
<P>
<TABLE CELLPADDING="6">
<TR>
<TD COLSPAN=3 bgcolor="#ff000"><P ALIGN=Left>
<FONT face="Arial, Helvetica" COLOR="white"><BIG><BIG>INTERNATIONAL CRYPTOGRAPHY
FREEDOM</BIG></BIG></FONT></TD>
</TR>
<TR>
<TD><P>
<P>
<B>Last Updated 20&nbsp;May 1999:</B> Add ssh 1.2.27 to UK4.
<P>
"Never has our ability to shield our affairs from prying eyes been at such
a low ebb. The availability and use of secure encryption may offer an opportunity
to reclaim some portion of the privacy we have lost. Government efforts to
control encryption thus may well implicate not only the First Amendment rights
of cryptographers intent on pushing the boundaries of their science, but
also the constitutional rights of each of us as potential recipients of
encryption's bounty."
<BLOCKQUOTE>
-- US Appeals Court Judge Betty Fletcher, in the
<I><A HREF="http://jya.com/bernstein-9th.htm">Bernstein</A></I> opinion,
May 6, 1999.
</BLOCKQUOTE>
</TD>
<TD></TD>
<TD></TD>
</TR>
<TR>
<TD COLSPAN=3>New US section for:
<BLOCKQUOTE>
Heeding Hugh Daniels' call today to let 1,000 US crypto sites flower<BR>
free of unconstitutional encryption export restrictions in the light of<BR>
the May 6 <A HREF="http://jya.com/bernstein-9th.htm">Bernstein opinion</A>,
we invite contributions of <BR>
unlimited-strengh encryption programs and/or links to such programs <BR>
for the new US unrestricted cryptography section here. See also<BR>
formerly restricted US sites below.
</BLOCKQUOTE>
<P>
This a growing list. Contributions welcome:
<<A HREF="mailto:jya@pipeline.com">jya@pipeline.com</A>>
<P>
Please mirror this page, or scavenge it to make your own. Let us know about
additional sites or your page and we'll make a link.
<P>
See also:
<BLOCKQUOTE>
<A HREF="http://jya.com/crypto.htm">Cryptome</A> for news<BR>
<A HREF="http://www.io.com/~ritter/LEARNING.HTM">Ritter's <I>Learning About
Cryptography</I></A><BR>
<A HREF="http://www.io.com/~ritter/GLOSSARY.HTM">Ritter's <I>Crypto Glossary
and Dictionary of Technical Cryptography</I></A>
<P>
Dec. 3 Wassenaar Arrangement Lists in
<A HREF="http://www.wassenaar.org/List/Table%20of%20Contents%20-%2098web.html">original
DOC format</A> and <A HREF="http://www.fitug.de/news/wa/index.html">HTML</A>
format<BR>
<A HREF="http://www.cs.auckland.ac.nz/~pgut001/tutorial/">Encryption and
Security Tutorial</A><BR>
<A HREF=" http://www.zanshin.com/~bobg/">Call for Crypto Strike on Dec.
14</A><BR>
<A HREF="http://www.quintessenz.at/freecrypto.html">Free Crypto Logos</A><BR>
<A HREF="http://www.freecrypto.org/">Free Crypto Org</A><BR>
<A href="http://www.nyu.edu/projects/wray/RhizNom.html">Electronic Civil
Disobedience (ECD)</A> <- look to last section<BR>
</BLOCKQUOTE>
</TD>
</TR>
</TABLE>
<TABLE CELLPADDING="6" width=100%>
<TR>
<TD COLSPAN=3 bgcolor="#ff000"><FONT face="Arial, Helvetica" COLOR="White">
UNITED STATES UNRESTRICTED CRYPTOGRAPHY</FONT></TD>
</TR>
<TR VALIGN="Top">
<TD><B>Program</B></TD>
<TD><B>URL</B></TD>
<TD><B>Notes</B></TD>
</TR>
<TR VALIGN="Top">
<TD>USUC 1<BR>
Cracking DES</TD>
<TD><A HREF="http://www.shmoo.com/~pablos/Cracking_DES/">http://www.shmoo.com/~pablos/Cracking_DES/</A></TD>
<TD>The Shmoo Group is proud to present...<BR>
for the first time...<BR>
available legally for download in the United States...<BR>
from the jurisdiction of the 9th US Circuit Court of Appeals...</TD>
</TR>
<TR VALIGN="Top">
<TD>USUC 2 Secure Office</TD>
<TD><A HREF="http://www.filesafety.com">http://www.filesafety.com</A>
<P>
Mirror: <A HREF="http://come.to/SecureOffice">http://come.to/SecureOffice</A></TD>
<TD>Charles Booher's site, formerly under attack by the USG</TD>
</TR>
<TR VALIGN="Top">
<TD>USUC 3<BR>
Secure Remote Password (SRP) distribution</TD>
<TD><A HREF="http://srp.stanford.edu/srp/">http://srp.stanford.edu/srp/</A></TD>
<TD>A cryptographically secure remote-access suite, featuring Telnet and
FTP with full strength 128-bit encryption. Open Source, unrestricted
downloads.&nbsp; Available from mirror sites worldwide.</TD>
</TR>
<TR VALIGN="Top">
<TD>USUC 4<BR>
PGP 2.62</TD>
<TD><A HREF="http://jya.com/pgp262-mil.zip">http://jya.com/pgp262-mil.zip</A></TD>
<TD>Mirror of US military web site offering of PGP 2.62</TD>
</TR>
<TR VALIGN="Top">
<TD>USUC 5<BR>
Snuffle</TD>
<TD><A HREF="http://jya.com/snuffle.txt">http://jya.com/snuffle.txt</A>
<P>
Available also at USUC 1</TD>
<TD>Bernstein's Snuffle program, centerpiece of Bernstein v. USDOJ</TD>
</TR>
<TR VALIGN="Top">
<TD>USUC 6<BR>
GSM A5/1</TD>
<TD><A HREF="http://jya.com/a51-pi.htm">http://jya.com/a51-pi.htm</A></TD>
<TD>A Pedagogical Implementation of A5/1</TD>
</TR>
<TR VALIGN="Top">
<TD>USUC 7<BR>
PGP 5.0</TD>
<TD><A HREF="http://web.qx.net/infocus/pgpinfo.html">http://web.qx.net/infocus/pgpinfo.html</A></TD>
<TD>In Focus offering</TD>
</TR>
<TR>
<TD></TD>
<TD></TD>
<TD></TD>
</TR>
</TABLE>
<TABLE CELLPADDING="6">
<TR>
<TD COLSPAN=3 bgcolor="#ff000"><FONT face="Arial, Helvetica" COLOR="White">
INTERNATIONAL MIRROR SITES</FONT></TD>
</TR>
<TR>
<TD><B>Country</B></TD>
<TD><B>URL</B></TD>
<TD><B>Notes</B></TD>
</TR>
<TR VALIGN="Top">
<TD>Australia 1</TD>
<TD><A href="ftp://ftp.psy.uq.oz.au/pub/Crypto/">ftp.psy.uq.oz.au:/pub/Crypto
</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Australia 1</TD>
<TD><A href="ftp://ftp.psy.uq.oz.au/pub/Crypto/">ftp.psy.uq.oz.au:/pub/Crypto
</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Australia 2</TD>
<TD><A HREF="http://vicraves.i-o.net.au/crypto.html">http://vicraves.i-o.net.au/crypto.html</A></TD>
<TD>No access logging</TD>
</TR>
<TR VALIGN="Top">
<TD>Austria 1</TD>
<TD><A HREF="ftp://ftp.giga.or.at/pub/hacker/crypt">ftp://ftp.giga.or.at/pub/hacker/crypt</A></TD>
<TD>Stuff related to crypto</TD>
</TR>
<TR VALIGN="Top">
<TD>Austria 2</TD>
<TD><A HREF="ftp://ftp.giga.or.at/pub/hacker/stego">ftp://ftp.giga.or.at/pub/hacker/stego</A></TD>
<TD>Stuff related to steganography</TD>
</TR>
<TR VALIGN="Top">
<TD>Austria 3</TD>
<TD><A HREF="ftp://ftp.giga.or.at/pub/hacker/Incoming">ftp://ftp.giga.or.at/pub/hacker/Incoming</A></TD>
<TD>For very welcome contributions of all sorts: binaries, texts, sources,
etc. related to&nbsp;cryptography, cryptanalysis, steganography, information
hiding, etc.</TD>
</TR>
<TR VALIGN="Top">
<TD>Brazil 1</TD>
<TD><A HREF="http://www.nw.com.br/users/pbarreto/crypto_page.html">http://www.nw.com.br/users/pbarreto/crypto_page.html</A></TD>
<TD>Selected links, public domain crypto software, mostly related to elliptic
curves and block ciphers</TD>
</TR>
<TR VALIGN="Top">
<TD>Brazil 2</TD>
<TD><A HREF="http://novaware.cps.softex.br/">http://novaware.cps.softex.br/</A></TD>
<TD>NOTICE: Neither Novaware nor this site are subject to restrictions from
the Wassenaar Agreement on the control of Cryptography</TD>
</TR>
<TR VALIGN="Top">
<TD>Brazil 3</TD>
<TD><A HREF="http://novaware.cps.softex.br/mirrors/cryptix-java/">http://novaware.cps.softex.br/mirrors/cryptix-java/</A></TD>
<TD>Cryptix mirror</TD>
</TR>
<TR VALIGN="Top">
<TD>Canada 1</TD>
<TD><A HREF="ftp://ftp.privacy.nb.ca/pub/crypto/">ftp://ftp.privacy.nb.ca/pub/crypto/</A></TD>
<TD>233MB; Apache-SSL, SSLeay, cryptlib, freeswan, gnupg, mozilla-crypto,
pgpi, ssh</TD>
</TR>
<TR VALIGN="Top">
<TD>Canada 2</TD>
<TD><A HREF="ftp://gwynne.cs.ualberta.ca/pub/Crypto/">ftp://gwynne.cs.ualberta.ca/pub/Crypto/</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Canada 3</TD>
<TD><A HREF="ftp://ftp.mindlink.net/pub/crypto/">ftp://ftp.mindlink.net/pub/crypto/</A>
<P>
See for access procedure:
<A HREF="ftp://ftp.mindlink.net/pub/crypto/README.html">ftp://ftp.mindlink.net/pub/crypto/README.html</A></TD>
<TD></TD>
</TR>
<TR VALIGN="Top">
<TD>Canada 4</TD>
<TD><A HREF="http://www.interlog.com/~rguerra/www">http://www.interlog.com/~rguerra/www</A></TD>
<TD>224! PGP and Privacy Links</TD>
</TR>
<TR>
<TD>Canada 5</TD>
<TD><A HREF="http://crypto.yashy.com/">http://crypto.yashy.com/</A></TD>
<TD></TD>
</TR>
<TR VALIGN="Top">
<TD>Croatia 1</TD>
<TD><A href="ftp://pgp.rasip.fer.hr/">pgp.rasip.fer.hr:/pub/crypt</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Denmark 1</TD>
<TD><A HREF="http://www.datashopper.dk/~boo/index.html">http://www.datashopper.dk/~boo/index.html</A></TD>
<TD>Assorted PGP Freeware</TD>
</TR>
<TR VALIGN="Top">
<TD>Finland 1</TD>
<TD><A HREF="http://www.ssh.fi/tech/crypto/sites.html">http://www.ssh.fi/tech/crypto/sites.html</A></TD>
<TD>Multiple Sources</TD>
</TR>
<TR VALIGN="Top">
<TD>Finland 2</TD>
<TD><A href="ftp://ftp.funet.fi/pub/crypt/">ftp.funet.fi:/pub/crypt</A></TD>
<TD>PGP, symmetric and asymmetric encryption, crypto libraries, papers&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Finland 3</TD>
<TD><A HREF="http://www.pgpi.org/">http://www.pgpi.org/</A></TD>
<TD>International PGP Home Page</TD>
</TR>
<TR VALIGN="Top">
<TD>Finland 4</TD>
<TD><A HREF="ftp://garbo.uwasa.fi/pc/crypt">ftp://garbo.uwasa.fi/pc/crypt</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>France 1</TD>
<TD><A HREF="http://web.cnam.fr/reseau/Crypto/">http://web.cnam.fr/reseau/Crypto/
</A></TD>
<TD>L'utilisation du chiffrement en France</TD>
</TR>
<TR VALIGN="Top">
<TD>France 2</TD>
<TD><A HREF="ftp://ftp.lip6.fr/pub2/linux/networking/net-source/mail/pgp/">ftp://ftp.lip6.fr/pub2/linux/networking/net-source/mail/pgp/</A></TD>
<TD>PGP Sendmail v1.4<BR>
Auto PGP 1.04<BR>
PGP 2.6.3is<BR>
PGP 5.0-b8</TD>
</TR>
<TR VALIGN="Top">
<TD>France 3</TD>
<TD><A HREF="http://www.fortunecity.com/skyscraper/oracle/598/cryptofree-fr.htm">http://www.fortunecity.com/skyscraper/oracle/598/cryptofree-fr.htm</A></TD>
<TD>"Liberte pour la cryptographie internationale." UK Mirror, 10MB. PGP,
DOS & Unix versions, sources, GNUPG, ScramDisk, the PGP 6.0 & 2.62
french manuals, etc. All are freeware and none have been exported from USA
(only PGP international versions).&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Germany 1</TD>
<TD><A href="ftp://ftp.darmstadt.gmd.de/pub/crypto/">ftp.darmstadt.gmd.de:/pub/crypto</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Germany 2</TD>
<TD><A href="ftp://ftp.informatik.uni-hildesheim.de/pub/security/">ftp.informatik.uni-hildesheim.de:/pub/security</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Germany 3</TD>
<TD><A HREF="ftp://ftp.pca.dfn.de/pub/tools/crypt/">ftp://ftp.pca.dfn.de/pub/tools/crypt/</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Germany 4</TD>
<TD><A HREF="ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/">ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/</A></TD>
<TD>Disk and file encryption, PGP, stego, voice encryption</TD>
</TR>
<TR VALIGN="Top">
<TD>Germany 5</TD>
<TD><A HREF="ftp://ftp.uni-mainz.de/pub/internet/security/SSL/">ftp://ftp.uni-mainz.de/pub/internet/security/SSL/</A></TD>
<TD>SSL site</TD>
</TR>
<TR>
<TD>Germany 6</TD>
<TD><A HREF="http://www.d.shuttle.de/isil/gnupg/">http://www.d.shuttle.de/isil/gnupg/</A></TD>
<TH>The GNU Privacy Guard</TH>
</TR>
<TR VALIGN="Top">
<TD>Hong Kong 1</TD>
<TD><A HREF="ftp://ftp.futuredynamics.com/freecrypto/">ftp://ftp.futuredynamics.com/freecrypto/</A>;
or, if broken
<P>
<A HREF="ftp://futuredynamics.com/freecrypto/">ftp://futuredynamics.com/freecrypto/</A>;
or, if also busted
<P>
<A HREF="ftp://202.87.252.100/freecrypto/">ftp://202.87.252.100/freecrypto/</A></TD>
<TD>Mirrors of ftp.pgpi.com; ftp.psy.uq.oz.au/pub/Crypto (SSLeay and SSH);
Fortify; and the Speakfree distribution from
ftp.fourmilab.ch/pub/web/speakfree.&nbsp;<BR>
About 180 Mb. More stuff will be hopefully added later.</TD>
</TR>
<TR VALIGN="Top">
<TD>Hungary 1</TD>
<TD><A href="ftp://ftp.kfki.hu/pub/packages/security/">ftp.kfki.hu:/pub/packages/security</A>
<P>
Full description:
<P>
<A HREF="http://www.kfki.hu/ftp.html#Security">http://www.kfki.hu/ftp.html#Security</A></TD>
<TD>SSH, SSL, SSL applications, libdes, OPIE, PGP, SRP and other
non-cryptographical-security tools.</TD>
</TR>
<TR VALIGN="Top">
<TD>Ireland 1</TD>
<TD><A HREF="ftp://ftp.heanet.ie/pub/crypto/">ftp://ftp.heanet.ie/pub/crypto/</A></TD>
<TD>Contains SSH, SSL, SSL apps, PGPI. More to come.</TD>
</TR>
<TR VALIGN="Top">
<TD>Italy 1</TD>
<TD><A href="ftp://idea.sec.dsi.unimi.it/pub/security/crypt/">idea.sec.dsi.unimi.it:/pub/security/crypt</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Kyrgyzstan 1</TD>
<TD><A HREF="http://www.underground.org.kg/crypto/">http://www.underground.org.kg/crypto/</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Netherlands 1</TD>
<TD><A href="ftp://utopia.hacktic.nl/pub/replay/pub/disk/">utopia.hacktic.nl:/pub/replay/pub/disk</A></TD>
<TD>Apache, Applied Crypto files, encryption, Java, PGP, remailers, security,
voice encryption files&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Netherlands 2</TD>
<TD><A HREF="http://www.replay.com">http://www.replay.com</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Netherlands 3</TD>
<TD><A HREF="ftp://ftp.replay.com/pub/crypto/crypto/LIBS/cryptolib/crypto30.zip">ftp://ftp.replay.com/pub/crypto/crypto/LIBS/cryptolib/crypto30.zip</A></TD>
<TD>Crypto++ 3.0, a major revision of a free C++ class library of cryptographic
primitives.</TD>
</TR>
<TR VALIGN="Top">
<TD>New Zealand 1</TD>
<TD><A HREF="http://www.cs.auckland.ac.nz/~pgut001/links.html">http://www.cs.auckland.ac.nz/~pgut001/links.html</A></TD>
<TD>A Comprehensive List of Worldwide Sources</TD>
</TR>
<TR VALIGN="Top">
<TD>New Zealand 2</TD>
<TD><A HREF="http://www.cs.auckland.ac.nz/~pgut001/archive.html">http://www.cs.auckland.ac.nz/~pgut001/archive.html</A>
<P>
(Not yet active; meanwhile see NZ 1 above)</TD>
<TD>Peter Guttman: This currently contains a mostly blank page because it'll
take a few days to get things set up, but I thought I'd get the ball
rolling.&nbsp; Once it's ready I'll use it to make all sorts of crypto available
to anyone anywhere until ordered by a NZ court to stop doing so (this is
a long way removed from being ordered by the Ministry of Foreign Affairs
and Trade to stop doing so), or alternatively until the machine sh*ts itself
and dies, which may happen somewhat sooner :-).
<P>
The archives (when ready) will be stored on a machine for which accesses
are not logged.&nbsp; It may also allow SSL access (with strong encryption,
obviously), which will include making available dummy files of various sizes
so that it's not possible to prove (based on traffic analysis) exactly what
was downloaded ("Crypto? Certainly not, I was downloading this paper on the
history of Ethiopian pottery in 4000BC").</TD>
</TR>
<TR VALIGN="Top">
<TD>Norway 1</TD>
<TD><A href="ftp://ftp.unit.no/pub/unix/security/">ftp.unit.no:/pub/unix/security</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Norway 2</TD>
<TD><A href="ftp://ftp.ifi.uio.no/pub/gnu/">ftp://ftp.ifi.uio.no/pub/gnu/</A></TD>
<TD>Main distribution site for crypt() in glibc</TD>
</TR>
<TR VALIGN="Top">
<TD>Norway 3</TD>
<TD><A href="ftp://ftp.ifi.uio.no/pub/pgp/">ftp://ftp.ifi.uio.no/pub/pgp/</A>&nbsp;
(the same as <A href="ftp://ftp.no.pgpi.com/">ftp.no.pgpi.com</A>)</TD>
<TD>Main distribution site for pgpi</TD>
</TR>
<TR VALIGN="Top">
<TD>Norway 4</TD>
<TD><A href="ftp://ftp.at.pgpi.com/pub/pgpi/">ftp://ftp.at.pgpi.com/pub/pgpi/</A><BR>
<A href="ftp://ftp.au.pgpi.com/pub/pgp/">ftp://ftp.au.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.ch.pgpi.com/pub/pgp/">ftp://ftp.ch.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.cz.pgpi.com/pub/pgp/">ftp://ftp.cz.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.de.pgpi.com/pub/pgp/">ftp://ftp.de.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.dk.pgpi.com/pub/pgp/">ftp://ftp.dk.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.es.pgpi.com/pub/pgp/">ftp://ftp.es.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.fi.pgpi.com/pub/pgp/">ftp://ftp.fi.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.jp.pgpi.com/pub/pgp/">ftp://ftp.jp.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.kr.pgpi.com/pub/security/pgp/">ftp://ftp.kr.pgpi.com/pub/security/pgp/</A><BR>
<A href="ftp://ftp.nl.pgpi.com/pub/pgp/">ftp://ftp.nl.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.pl.pgpi.com/pub/pgpi/">ftp://ftp.pl.pgpi.com/pub/pgpi/</A><BR>
<A href="ftp://ftp.ru.pgpi.com/pub/pgp/">ftp://ftp.ru.pgpi.com/pub/pgp/</A><BR>
<A href="ftp://ftp.se.pgpi.com/pub/pgp/">ftp://ftp.se.pgpi.com/pub/pgp/</A><BR>
</TD>
<TD>PGP International&nbsp; Mirrors</TD>
</TR>
<TR VALIGN="Top">
<TD>Norway 5</TD>
<TD><A href="ftp://ftp.kerneli.org/pub/linux/kerneli/v2.1/">ftp://ftp.kerneli.org/pub/linux/kerneli/v2.1/</A><BR>
( which is verden.pvv.org which is verden.pvv.ntnu.no )</TD>
<TD>Main distribution site for the international kernel patch for Linux<BR>
(collection of crypto-patches for the linux kernel)</TD>
</TR>
<TR VALIGN="Top">
<TD>Russia 1</TD>
<TD><A href="ftp://ftp.kiae.su/unix/crypto/">ftp.kiae.su:/unix/crypto</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Spain 1</TD>
<TD><A HREF="http://www.kriptopolis.com/software/prog.html">http://www.kriptopolis.com/software/prog.html</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>Spain 2</TD>
<TD><A HREF="http://www.argo.es/~jcea/cripto.htm">http://www.argo.es/~jcea/cripto.htm</A></TD>
<TD>Criptolog&iacute;a by Jes&uacute;s Cea Avi&oacute;n</TD>
</TR>
<TR VALIGN="Top">
<TD>Sweden 1</TD>
<TD><A href="ftp://ftp.sunet.se/pub/security/tools/crypt/">ftp.sunet.se:/pub/security/tools/crypt</A></TD>
<TD>Swedish University Network Security Archives</TD>
</TR>
<TR VALIGN="Top">
<TD>Switzerland 1</TD>
<TD><A HREF="http://www.semper.org/sirene/outsideworld/security.html">http://www.semper.org/sirene/outsideworld/security.html</A></TD>
<TD>IBM Zurich Security and Cryptography Sources</TD>
</TR>
<TR VALIGN="Top">
<TD>Switzerland 2</TD>
<TD><A HREF="http://www.semper.org/sirene/people/gerrit/secprod/secprod.html">http://www.semper.org/sirene/people/gerrit/secprod/<BR>
secprod.html</A></TD>
<TD>Gerrit Bleumer's Cryptography Enhanced Products</TD>
</TR>
<TR VALIGN="Top">
<TD>United Kingdom 1</TD>
<TD><A href="ftp://ftp.ox.ac.uk/pub/crypto/">ftp.ox.ac.uk:/pub/crypto</A></TD>
<TD>DES, SSL, cryptanalysis, documentation, PGP, miscellaneous&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>United Kingdom 2</TD>
<TD><A HREF="http://www.dcs.exeter.ac.uk/~aba/">http://www.dcs.exeter.ac.uk/~aba/</A></TD>
<TD>Adam Back's Resources</TD>
</TR>
<TR VALIGN="Top">
<TD>United Kingdom&nbsp;3</TD>
<TD><A HREF="ftp://ftp.cl.cam.ac.uk/users/rja14/">ftp://ftp.cl.cam.ac.uk/users/rja14/</A></TD>
<TD>Ross Anderson's FTP Sources</TD>
</TR>
<TR VALIGN="Top">
<TD>United Kingdom 4</TD>
<TD><A HREF="http://www.notatla.demon.co.uk/CRYPTO/crypto.html">http://www.notatla.demon.co.uk/CRYPTO/crypto.html</A></TD>
<TD>pgutlinks.html 245K<BR>
SSLeay-0.9.0b.tar.gz 1.3M<BR>
crypto-free.htm 28K<BR>
Fortify-README 2K<BR>
Fortify-1.3.1-unix-x86.tar.gz 372K<BR>
apache_1.3.3+ssl_1.29.tar.gz 37K<BR>
crypto30.zip 394K<BR>
nhs-rpt.wp 88K<BR>
aba_zergo.txt 142K<BR>
bnlib.tar.gz 142K<BR>
cfs-1.3.3bf-1.i386.rpm.tar.gz 192K<BR>
crypto.html 8K<BR>
ssh 1.2.27
<P>
</TD>
</TR>
<TR VALIGN="Top">
<TD>United Kingdom 5</TD>
<TD><A HREF="ftp://opensores.thebunker.net/pub/mirrors/">ftp://opensores.thebunker.net/pub/mirrors/</A></TD>
<TD>The Bunker open source FTP repository is housed in an ex-military data
centre, buried deep below the earth in a nuclear, chemical and biological
warfare proof bunker.
<P>
SSLapps, SSLeay, argus, crack5, cracklib, MD5, SHA, l6, satan, ssh, stunnel,
syn, tcp_wrappers, more coming.</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 1</TD>
<TD><A HREF="http://www.cryptography.org/">http://www.cryptography.org/</A>
<P>
<A HREF="http://cryptography.org/cgi-bin/crypto.cgi/libraries/crypto30.zip">http://cryptography.org/cgi-bin/crypto.cgi/libraries/crypto30.zip</A>
<P>
<A HREF="http://cryptography.org/cgi-bin/crypto.cgi/libraries/crypto23.zip">http://cryptography.org/cgi-bin/crypto.cgi/libraries/crypto23.zip</A></TD>
<TD>North American Cryptography Archives. Archive of crypto software, only
available from the US and Canada. Crypto++ 3.0, a major revision of a free
C++ class library of cryptographic primitives.</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 2</TD>
<TD><A HREF="http://cryptography.org/freecryp.htm">http://cryptography.org/freecryp.htm</A></TD>
<TD>Crypto Sites Outside North America</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 3</TD>
<TD><A HREF="http://www.austinlinks.com/Crypto/">http://www.austinlinks.com/Crypto/</A></TD>
<TD>Quadralay Cryptography Archive</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 4</TD>
<TD><A HREF="http://theory.lcs.mit.edu/~rivest/crypto-security.html">http://theory.lcs.mit.edu/~rivest/crypto-security.html</A></TD>
<TD>Ron Rivest's Links</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 5</TD>
<TD><A HREF="http://www.genocide2600.com/~tattooman/cryptography/">http://www.genocide2600.com/~tattooman/cryptography/</A>
<P>
</TD>
<TD>Maintainer:&nbsp; Ken Williams. Contents:&nbsp; Crypto Libraries,
SecureOffice, Source Code for all AES Candidates, Applied Crypto, Cryptanalysis,
GNUGP, Kerberos, PGP, Skip, Snow, Snuffle, SSH, Steganography, Voice Encryption,
source code, crypto papers, much more, and more on the way.&nbsp;Size: 300+
MB, 2000+ files, and growing every day.</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 6</TD>
<TD><A HREF="http://www.dis.org/erehwon/crypto.html">http://www.dis.org/erehwon/crypto.html</A></TD>
<TD>&nbsp;</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 7</TD>
<TD><A HREF="http://www.eskimo.com/~weidai/cryptlib.html">http://www.eskimo.com/~weidai/cryptlib.html</A></TD>
<TD>Crypto++ 3.0, a major revision of a free C++ class library of cryptographic
primitives.</TD>
</TR>
<TR VALIGN="Top">
<TD>United States&nbsp;8</TD>
<TD><A HREF="http://www.lila.com/nautilus">http://www.lila.com/nautilus</A></TD>
<TD>Nautilus, with links to non-US sites.</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 9</TD>
<TD><A HREF="http://www.counterpane.com/sites.html">http://www.counterpane.com/sites.html</A></TD>
<TD>Bruce Schneier's Sources for Software and Source Code</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 10</TD>
<TD><A HREF="ftp://ftp.clark.net/pub/cme/">ftp://ftp.clark.net/pub/cme/</A></TD>
<TD>Carl Ellison's FTP Sources</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 11</TD>
<TD><A HREF="http://patriot.net/~johnson/html/neil/sec/crypto.htm">http://patriot.net/~johnson/html/neil/sec/crypto.htm</A></TD>
<TD>Neil Johnson's Cryptography and Encryption Sources</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 12</TD>
<TD><A HREF="http://www.homeport.org/~adam/crypto/">http://www.homeport.org/~adam/crypto/</A></TD>
<TD>Adam Shostack's Cryptographic Libraries</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 13</TD>
<TD><A HREF="http://www.io.com/~ritter/">http://www.io.com/~ritter/</A></TD>
<TD>Terry Ritter's Codes, Links, Tutorials</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 14</TD>
<TD><A HREF="http://www.enter.net/~chronos/cryptolog1.html">http://www.enter.net/~chronos/cryptolog1.html</A></TD>
<TD>Crypto-Log: Codes, papers and policies</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 15</TD>
<TD><A HREF="http://www.cryptography.com/resources/index.html">http://www.cryptography.com/resources/index.html</A></TD>
<TD>Paul Kocher's Cryptography Resources Online</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 16</TD>
<TD><A HREF="http://www.cypher.net/tools/crypto-free.html">http://www.cypher.net/tools/crypto-free.html</A></TD>
<TD>Mirror of this page, updated 4 times daily.</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 17</TD>
<TD><A HREF="http://members.tripod.com/~the_cancer/Crypto/index.html">http://members.tripod.com/~the_cancer/Crypto/index.html</A></TD>
<TD>PGP Crypto: QDPGP, XCrypt, MAilPGP, Peics</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 18</TD>
<TD><A HREF="http://www.theargon.com">http://www.theargon.com</A></TD>
<TD>The A.R.G.O.N. Security and Crypto Site</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 19</TD>
<TD><A HREF="ftp://ftp.jpunix.com">ftp://ftp.jpunix.com</A></TD>
<TD>John Perry's PGPdomo for secure mailing lists, and other programs</TD>
</TR>
<TR VALIGN="Top">
<TD>United States 20</TD>
<TD><A HREF="http://home.ptd.net/~kruslicc/">http://home.ptd.net/~kruslicc/</A></TD>
<TD>CryptoCards - strong encryption with deck of cards</TD>
</TR>
<TR>
<TD>United States 21</TD>
<TD><A HREF="http://www.angelfire.com/md/keyshift/">http://www.angelfire.com/md/keyshift/</A></TD>
<TD>PR0 Death's PGP Message Shifter Applet</TD>
</TR>
<TR>
<TD>United States 22</TD>
<TD><A HREF="http://ciphersaber.gurus.com">http://ciphersaber.gurus.com</A></TD>
<TD></TD>
</TR>
<TR>
<TD></TD>
<TD></TD>
<TD></TD>
</TR>
<TR bgcolor="#ff000">
<TD COLSPAN=3><FONT face="Arial, Helvetica" COLOR="White"> NOTES</FONT></TD>
</TR>
<TR>
<TD COLSPAN=3><B><A NAME="Note 1">Note</A> 1:</B>
<A HREF="http://jya.com/crypto-call.htm">John Gilmore's proposal</A> is to
mirror the contents of cryptography sites not just the URLs.
<P>
We've been asked what to mirror if it is not possible to mirror large archives
(200&nbsp;MB and up), or you can't easily decide which programs are most
important.
<P>
<B>John Gilmore</B> recommends:
<BLOCKQUOTE>
The top things I'd suggest for a mirror site are (see sources at sites above):
<BLOCKQUOTE>
PGP source code (various versions)<BR>
Matching PGP binaries (for easy downloading and use)<BR>
SSH source code and matching binaries<BR>
SSLEAY - Eric Young's crypto library from Australia<BR>
Kerberos source code (various versions)<BR>
IPSEC source code (various versions for BSD and Linux)<BR>
Crypto-Mozilla source code (web browser with good crypto)<BR>
DNS Security source code (domain name with good crypto)
</BLOCKQUOTE>
<P>
My criterion for these things is:&nbsp; what building blocks will people
be able to use every day for to improve their privacy?&nbsp; And then, what
pieces of infrastructure will permit people to build secure networks that
protect their users?
<P>
At first, the archives will be "rough and ready", but as people worldwide
start writing documentation, e.g. "How to secure your MS-Windows system using
this archive", "How to secure your Linux system", etc, it will become easier
for the end users.
</BLOCKQUOTE>
<P>
<B>Jim Gillogly</B> recommends:
<BLOCKQUOTE>
One way to determine which programs are the best for this purpose would be
to study what various governments have taken some action on.&nbsp; Some obvious
ones (See US 5):
<BLOCKQUOTE>
<A HREF="http://www.pgpi.org/">PGP</A> (various versions, high level of
government interest)<BR>
<A HREF="http://jya.com/snuffle.txt">Snuffle</A> (extended US litigation
against Daniel Bernstein)<BR>
All the <A HREF="http://csrc.nist.gov/encryption/aes/aes_home.htm">AES
candidates</A> (strictly-controlled dissemination from NIST)<BR>
<A HREF="http://www.filesafety.com/">SecureOffice</A> (Charles Booher's program
-- US government has taken action)<BR>
<A HREF="http://www.counterpane.com">Applied Cryptography</A> disk (US export
license denied Phil Karn)
</BLOCKQUOTE>
<P>
It would also be nice to have an infrastructural component, such as (when
ready for mass distribution) the
<A HREF="http://replay.com/security/pub/pub/crypto/IPsec/freeswan/">Linux/FreeSWAN
IPSec release</A>; this doesn't have quite the cachet of programs on which
the government has already weighed in, though.
</BLOCKQUOTE>
<P>
<B>Jim Choate</B> recommends that cryptography documentation be mirrored
to encourage understanding and creation of strong encryption -- the best
assurance that it will grow and spread.
<P>
Mirror whatever you can until better advice for selections comes along. Prime
need: many mirrors of the strongest cryptography, especially anything allowing
the use of key lengths above 40-bits, that is, anything that requires a US
export license for general public use (the US standard appears to be the
model for <A HREF="http://jya.com/wass-au.htm">latest Wassenaar
restrictions</A>). Next, mirror any program that appears to be a&nbsp;target
for latest Wassenaar restrictions as they may be implemented in your country.
<P>
For complaints about the restrictions on privacy to be implemented due to
US pressure, contact your government's cryptography control ministry:
<A HREF="http://www.wassenaar.org/docs/contacts.htm">http://www.wassenaar.org/docs/contacts.htm</A></TD>
</TR>
<TR>
<TD COLSPAN=3><A NAME="Note 2"><B>Note 2: </B></A>Please forward news and
information on the recent Wassenaar Arrangement restrictions in your country
to John Young
<<A HREF="mailto:jya@pipeline.com">jya@pipeline.com</A>>. Anonymous
and encrypted messages welcome. <A HREF="http://jya.com/jy-pk.htm">PGP public
keys of John Young</A>. Check
<A HREF="http://jya.com/crypto.htm">Cryptome</A> for news.
<P>
<B><A NAME="note 3">Note 3:</A></B> For information on cryptography export
issues see:
<BLOCKQUOTE>
<A HREF="http://www.gilc.org/crypto/">Global Internet Liberty Campaign
(GILC)</A>
<P>
<A HREF="http://www.eff.org/pub/Crypto/ITAR_export/">EFF "Privacy - Crypto
- ITAR Export Restrictions" Archive</A>
<P>
<A HREF="ftp://ftp.cygnus.com/pub/export/export.html">John Gilmore's Cryptography
Export Control Archives</A>
</BLOCKQUOTE>
<P>
<B><A NAME="Note 4">Note 4:</A></B> More mirror sites are needed in countries
which are not members of the Wassenaar Arrangment so that when the doors
are slammed shut by new WA laws there will still be free sources of strong
encryption. For list of WA members see:
<A HREF="http://www.wassenaar.org/docs/contacts.htm">http://www.wassenaar.org/docs/contacts.htm</A>.
<P>
<B><A NAME="Note 5">Note 5:</A></B>
<PRE>From: Richard Stallman <rms@gnu.org>
Subject: Encryption software volunteers needed in countries without
export control

We need to find volunteers in countries which are not signatories to
Wassenaar to take over development and distribution of encryption
software such as the GNU Privacy Guard and PSST.&nbsp; We are looking for
(1) an ftp site from which to distribute the software, and (2) people
to carry on the development work.

If you have contacts in any non-signatory country, please circulate
this message as widely as possible in your country, looking for people
who might want to volunteer for GNU software development.
Non-signatory countries that come to mind as possible places where
free encryption software can be developed include Mexico, India,
Croatia, China, South Africa, and perhaps Israel.&nbsp; However, any
country is ok if its laws do not prevent the work.<BR>
</PRE>
</TD>
</TR>
<TR bgcolor="#ff000">
<TD COLSPAN=3>&nbsp;</TD>
</TR>
</TABLE>
<P>
</BODY></HTML>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close