⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 cryptography_encryption_stenography.htm

📁 很多加密解密的资源地址
💻 HTM
📖 第 1 页 / 共 5 页
字号:
<html><head><meta HTTP-EQUIV="Content-Type" CONTENT="text/html; iso-8859-1"><meta NAME="keywords" CONTENT="Hacking,Hacker,Hackers,Computer Security,Security,Cracker,Network Security,Internet Security,Crackers,Virus,Virii,Webpages,DOS,Denial of Service,files,links,encryption,spoofing,news,texts,password,port monitors,key logger,phreaking,boxes,wardialers,patches,exploits,fixes,hot fixes,infosyssec,bugs,technology,"><meta NAME="description" CONTENT="Hacking And Hackers - Computer and Network Security - Information Security Resource Portal. For security hacking hackers hacker news downloads crackers virus virii viruses hacked webpages DOS denial of service hacking files hack files hack links hacking links encryption spoofing news texts password crackers port monitors key logger phreaking boxes wardialers patches exploits computer security network security privacy encryption computer crime firewalls information warfare intrusion detection hackers electronic commerce"><style TYPE="text/css"><!-- .b9{font:8pt arial,helvetica,sans-serif;color:black;text-decoration:none;}.box{font:8pt arial,helvetica,sans-serif;color:white;text-decoration:none;font-weight;bold}A:link{font:bold normal 8pt arial,helvetica,sans-serif;color:navy;text-decoration:none}A:visited{font:bold normal 8pt arial,helvetica,sans-serif;color:navy;text-decoration:none}A:hover{font:bold normal 8pt arial,helvetica,sans-serif;color:red;;text-decoration:underline}A:body{font:8pt arial,helvetica,sans-serif;color:black;font-weight:bold;text-decoration:none;}A:p{font:8pt arial,helvetica,sans-serif;color:black;font-weight:bold;text-decoration:none;}A:td{font:8pt arial,helvetica,sans-serif;color:black;font-weight:bold;text-decoration:none;}.infosyssec{font-family:Arial,Helvetica,sans-serif;font-size:46pt}.spanstyle{position:absolute;visibility:visible;top:-50px;font-size:8pt;font-family:Arial;font-weight:bold;color:red;--></style><base target="_blank"><base href="http://www.infosyssec.net/infosyssec/"><title>Cryptography, Encryption and Stenography</title></head><body bgcolor="#FFFFFF" link="#000099" vlink="#000099" alink="#000099"><p><font FACE="Arial" SIZE="1" COLOR="#FFFFFF">Computer Security - Hacking And Hackers Information Security Resource Portal security hacking hackers hacker news downloads crackers virus virii viruses hacked webpages DOS denial of service hacking files hack files hack links hacking links encryption spoofing news texts password crackers port monitors key logger phreaking boxes wardialers patches exploits computer security network security privacy encryption computer crime firewallsinformation warfare intrusion detection hackers elec</font></p><div align="center"><center> <table width=800 border=0 align=center><tr><td width=492><span class=b9></span></td><td width=298><div align=center><span class=b9></span></div></td></tr></table><table width=800 align=center><tr><td><hr></td></tr></table><table width=800 border=0 align=center><tr><td width="478"><img src=infosyssec1.gif width=425 height=76><br></td><td width="302" class="b9"><div align="center"><font color="#666666" size="1" face="Arial, Helvetica, sans-serif"><span class="b9">Our News Resources have been upgraded<br> to bring you the latest news from around the World.</span></font><span class="b9"><br> <a href="infosecnews.html">Check out the latest news by clicking HERE</a></span></div> </td></tr><tr><td colspan="2"><font face=Arial, Helvetica, sans-serif size=4 color=#999999><b>The Security Portal for Information System Security Professionals<br> </b></font><hr><font color=#999999><a href=kudos1.htm><span class=b9> The most comprehensive computer and network security resource on the Internet for Information System Security Professionals</span></a></font><font size=1 color=#999999 face=Arial> - Says Yahoo Editors</font><br> <hr></td></tr></table></center></div><div align="center"><center><table WIDTH="800" CELLPADDING="5" ALIGN="center"><tr><td VALIGN="top" WIDTH="25%" CLASS="b9" align="left"><table border="0" cellpadding="0" cellspacing="0" width="170"><tr bgcolor="#000099" background="http://www.infosyssec.net/infosyssec/grad.jpg"><td width="170" height="30" background="http://www.infosyssec.net/infosyssec/grad.jpg"><p class="box"><font color="#FFFFFF" face="Arial" size="2"><b>Return to Main Menu</b></font></td></tr></table><p class="b9"><font face="Arial" size="1"><b><a href="http://www.infosyssec.net/index.html">Return to Main Menu</a><br></b></font></p><table border="0" cellpadding="0" cellspacing="0" width="170"><tr bgcolor="#000099" background="http://www.infosyssec.net/infosyssec/grad.jpg"><td width="170" height="30" background="http://www.infosyssec.net/infosyssec/grad.jpg"><p class="box"><b><font color="#FFFFFF" face="Arial" size="2">Our Research Facility</font><font face="Arial" size="1"><br></font></b></td></tr></table><p><b><font face="Arial" size="1"><a HREF="http://www.infosyssec.net/infosyssec/intdet1.htm">Audit - Detect Network Intrusions</a><br><a HREF="http://www.infosyssec.net/infosyssec/anon1.htm">Anonymity &amp; Privacy</a><br><a HREF="http://www.infosyssec.net/infosyssec/secatm1.htm">ATM - Asynchronous Transfer</a><br><a href="http://www.infosyssec.net/infosyssec/biomet1.htm">Biometrics</a><br><a HREF="http://www.infosyssec.net/infosyssec/buscon1.htm">Business Continuity Planning</a><br><a HREF="http://www.infosyssec.net/infosyssec/cellcom1.htm">Cellular Communications</a><br><a HREF="http://www.infosyssec.net/infosyssec/compcrim1.htm">Computer Crime &amp; Investigations</a><br><a HREF="http://www.infosyssec.net/infosyssec/comphard.htm">Computer Hardware Tutorial</a><br><a HREF="http://www.infosyssec.net/infosyssec/corpsafe1.htm">Corporate Violence in Workplace</a><br><a HREF="http://www.infosyssec.net/infosyssec/cry1.htm">Crypto &amp; Encryption - Part I</a><br><a HREF="http://www.infosyssec.net/infosyssec/cry2.htm">Crypto &amp; Encryption - Part II</a><br><a HREF="http://www.infosyssec.net/infosyssec/cry3.htm">Crypto &amp; Encryption - Part III</a><br><a HREF="http://www.infosyssec.net/infosyssec/buscon1.htm">Disaster Recovery Planning</a><br><a HREF="http://www.infosyssec.net/infosyssec/secdow1.htm">Downloads - - Public Domain</a><br><a HREF="http://www.infosyssec.net/infosyssec/tools1.htm">Downloads - Packet Storm</a><br><a HREF="http://www.infosyssec.net/infosyssec/tools2.htm">Downloads - Hacker Domain</a><br><a HREF="http://www.infosyssec.net/infosyssec/jobsec1.htm">Employment and Job Opportunities</a><br><a HREF="http://www.infosyssec.net/infosyssec/seceth1.htm">Ethics Law and Security Policy</a><br><a HREF="http://www.infosyssec.net/infosyssec/firew1.htm">Firewalls</a><br><a HREF="http://www.infosyssec.net/infosyssec/secfr1.htm">Frame Relay Tutorials</a><br><a HREF="http://www.infosyssec.net/infosyssec/freebsd1.htm">FreeBSD - Berkeley Unix Clone</a><br><a HREF="http://www.infosyssec.net/infosyssec/linux2.htm">FreeBSD - OnlineBooks to Read</a><br><a HREF="http://www.infosyssec.net/infosyssec/gensec1.htm">General Security Related Links</a><br><a HREF="http://www.infosyssec.net/infosyssec/hackhow1.htm">Hacking - How its done Guides</a><br><a HREF="http://www.attrition.org/mirror/attrition/index.html">Hacked Web Sites</a><br><a HREF="http://www.infosyssec.net/infosyssec/infowar1.htm">Information Warfare</a><br><a HREF="http://www.infosyssec.net/infosyssec/telephon1.htm">Internet Telephony &amp; Protocols</a><br><a HREF="http://www.infosyssec.net/infosyssec/intdet1.htm">Intrusion Detection Library</a><br><a HREF="http://www.infosyssec.net/infosyssec/invest1.htm">Investigations and Courtrooms</a><br><a HREF="http://www.infosyssec.net/infosyssec/java1.htm">Java Security Resources</a><br><a HREF="http://www.infosyssec.net/infosyssec/jobsec1.htm">Jobs &amp; Employment Opportunities</a><br><a HREF="http://www.infosyssec.net/infosyssec/legres1.htm">Legal Resources - Legal Basics</a><br><a HREF="http://www.infosyssec.net/infosyssec/linux1.htm">Linux Resources - Basics</a><br><a HREF="http://www.infosyssec.net/infosyssec/linux2.htm">Linux Resources - Online Books</a><br><a HREF="http://www.infosyssec.net/infosyssec/secmail1.htm">Mailing List - For Newsletters</a><br><a HREF="http://www.infosyssec.net/infosyssec/searcher2.htm">Magazine Articles - SEARCHER</a><br><a HREF="http://www.infosyssec.net/infosyssec/newstand.html">Magazine Store - CheapPrices</a><br><a HREF="http://www.infosyssec.net/infosyssec/milsec1.htm">Military &amp; Govt Security Docs</a><br><a HREF="http://www.infosyssec.net/infosyssec/netprot1.htm">Networking - Internet Protocols</a><br><a HREF="http://www.infosyssec.net/infosyssec/novsec1.htm">Novell Networking Security</a><br><a HREF="http://www.infosyssec.net/infosyssec/oncour1.htm">Online Courses -Boost Your Skills</a><br><a HREF="http://www.infosyssec.net/infosyssec/pager1.htm">Pager Hardware Reprogramming</a><br><a HREF="http://www.infosyssec.net/infosyssec/intdet1.htm">Penetration Testing -Intrusions</a><br><a HREF="http://www.infosyssec.net/infosyssec/physfac1.htm">Physical and Facility Security</a><br><a HREF="http://www.infosyssec.net/infosyssec/anon1.htm">Privacy &amp; Anonymity on the Net</a><br><a HREF="http://www.infosyssec.net/infosyssec/prog1.htm">Programming Tutorials</a><br><a HREF="http://www.infosyssec.net/infosyssec/netprot1.htm">Protocols - Networking - Internet</a><br><a HREF="http://www.infosyssec.net/infosyssec/resint1.htm">Resume and Interview Resources</a><br><a HREF="http://www.infosyssec.net/infosyssec/secmag1.htm">Security Magazines Online</a><br><a HREF="http://www.infosyssec.net/infosyssec/secref1.htm">Security Reference Library I</a><br><a HREF="http://www.infosyssec.net/infosyssec/secref2.htm">Security Reference Library II</a><br><a HREF="http://www.infosyssec.net/infosyssec/secpol1.htm">Security Policy Library</a><br><a HREF="http://www.infosyssec.net/infosyssec/secstan1.htm">Security Standards &amp; Guidelines</a><br><a HREF="http://www.infosyssec.net/infosyssec/secsmc1.htm">Smart Cards</a><br><a HREF="http://www.infosyssec.net/infosyssec/telephon1.htm">Telecommunication &amp; Internet</a><br><a HREF="http://www.infosyssec.net/infosyssec/teletut1.htm">Telecommunications Tutorials</a><br><a HREF="http://www.infosyssec.net/infosyssec/threat1.htm">Threat Risk Assessments</a><br><a HREF="http://www.infosyssec.net/infosyssec/unixsec1.htm">Unix Security Resources</a><br><a HREF="http://www.infosyssec.net/infosyssec/linux2.htm">Unix Security Online Books</a><br><a HREF="http://www.infosyssec.net/infosyssec/secvpn1.htm">VPN's - Virtual Private Networks</a><br><a HREF="http://www.infosyssec.net/infosyssec/virwor1.htm">Virus Worms Trojans Hoaxs</a><br><a HREF="http://www.infosyssec.net/infosyssec/voiceip1.htm">Voice / IP Protocols and Standards</a><br><a HREF="http://www.infosyssec.net/infosyssec/winnet1.htm">WIN NT Assorted Files</a><br><a HREF="http://www.infosyssec.net/infosyssec/winnt1.htm">WIN NT Security Files</a><br><a HREF="http://www.infosyssec.net/infosyssec/win2000.htm">WIN 2000 Operating System</a><br><a HREF="http://www.infosyssec.net/infosyssec/corpsafe1.htm">Workplace Violence</a><br><a HREF="http://www.infosyssec.net/infosyssec/y2kyear1.htm">Y2K Year 2000 Information</a><br><br><br></font></b></td><td VALIGN="top" WIDTH="75%" CLASS="b9" align="left"><hr color="#FF0000"><p><font face="Arial" size="3" color="#FF0000"><b><b>Cryptography, Encryption and Stenography</b></b></font><font color="#FF0000"></font></p><hr color="#FF0000"><p align="left"><font color="#FF0000">Handbook of Applied Cryptography</font></p><ul><li>Chapter 1 - Overview of Cryptography (48 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap1.ps">Postscript file, 554k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap1.pdf">Pdf file, 356k</a>.</li><li>Chapter 2 - Mathematics Background (38 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap2.ps">Postscript file, 472k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap2.pdf">Pdf file, 345k</a>.</li><li>Chapter 3 - Number-Theoretic Reference Problems (46 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap3.ps">Postscript file, 543k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap3.pdf">Pdf file, 416k</a>.</li><li>Chapter 4 - Public-Key Parameters (36 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap4.ps">Postscript file, 497k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap4.pdf">Pdf file, 344k</a>.</li><li>Chapter 5 - Pseudorandom Bits and Sequences (22 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap5.ps">Postscript file, 330k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap5.pdf">Pdf file, 226k</a>.</li><li>Chapter 6 - Stream Ciphers (32 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap6.ps">Postscript file, 484k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap6.pdf">Pdf file, 282k</a>.</li><li>Chapter 7 - Block Ciphers (60 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap7.ps">Postscript file, 783k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap7.pdf">Pdf file, 503k</a>.</li><li>Chapter 8 - Public-Key Encryption (36 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap8.ps">Postscript file, 434k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap8.pdf">Pdf file, 303k</a>.</li><li>Chapter 9 - Hash Functions and Data Integrity (61 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap9.ps">Postscript file, 690k</a>; <spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap9.pdf">Pdf file, 481k</a>.</li><li>Chapter 10 - Identification and Entity Authentication (40 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap10.ps">Postscript file, 444k</a>;<spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap10.pdf">Pdf file, 344k</a>.</li><li>Chapter 11 - Digital Signatures (64 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap11.ps">Postscript file, 748k</a>;<spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap11.pdf">Pdf file, 560k</a>.</li><li>Chapter 12 - Key Establishment Protocols (53 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap12.ps">Postscript file, 532k</a>;<spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap12.pdf">Pdf file, 402k</a>.</li><li>Chapter 13 - Key Management Techniques (48 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap13.ps">Postscript file, 536k</a>;<spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap13.pdf">Pdf file, 347k</a>.</li><li>Chapter 14 - Efficient Implementation (44 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap14.ps">Postscript file, 547k</a>;<spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap14.pdf">Pdf file, 378k</a>.</li><li>Chapter 15 - Patents and Standards (27 pages)<br><spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap15.ps">Postscript file, 296k</a>;<spacer size="3" type="horizontal"><a href="http://www.cacr.math.uwaterloo.ca/hac/about/chap15.pdf">Pdf file, 228k</a>.</li></ul><p>If you do not have a PostScript previewer, you can download one from <a href="http://www.cs.wisc.edu/~ghost/">here</a>.</p><hr color="#FF0000"><p align="left"><font color="#FF0000">Software (products, programs and source code)</font></p><hr color="#FF0000"><p><a href="gopher://gopher.infor.com:6000/0exec:-v%20a%20R7232887-7234731-/.text/Main:/.bin/aview">Applied Cryptography </a>by Bruce Schneier; <a href="http://www.wiley.com/">Wiley</a>, 2nd. ed., 1995; a major update of the primary reference on applied cryptography; <a href="ftp://ftp.wimsey.bc.ca/pub/crypto/Doc/applied_cryptography">errata </a>and <a href="http://www.openmarket.com/info/cryptography/applied_cryptography.html">source code </a>for several dozen algorithms are available; essential for programmers developing cryptographic applications<br><br>CryptoLib 1.1 by Jack Lacy (AT&amp;T Bell Labs) - library of primitives for building cryptographic applications; runs under Unix, DOS, and Windows 3.1, NT, and 95; source code available in US &amp; Canada by <a href="mailto:cryptolib@research.att.com">e-mail request</a>, or by FTP from sites in <a href="ftp://ftp.dsi.unimi.it/pub/security/crypt/math/cryptolib_1.1.tar.gz">.it </a>and <a href="ftp://chem2.chem.swin.edu.au/pub/security/cryptolib_1.1.tar.gz">.au</a><br><a href="http://www.eskimo.com/~weidai/cryptlib.html"><br>Crypto++ 2.0 </a>- a free C++ class library of many cryptographic primitives, by <a href="http://www.eskimo.com/~weidai/index.html">Wei Dai </a>(who also runs an experimental PGP-based <a href="http://www.eskimo.com/~weidai/timestamp.html">Time Stamp Service</a>)<br><br>Peter Gutman's <a href="ftp://garbo.uwasa.fi/pc/security/cryptl99.zip">CryptLib </a>- a free &quot;universal interface&quot; in ANSI C to the major conventional-key (symmetric) algorithms (incl. code for MDC/SHS, DES, 3DES, IDEA, RC4, and SAFER), plus well-planned infrastructure for adding more<br><a href="http://triode.apana.org.au:8080/~cskinner/cybanim.html"><br>Cybanim </a>produces cryptographic software and free info:</p><hr color="#FF0000"><p><font color="#FF0000">DES (Data Encryption Standard):</font></p><a href="http://csrc.ncsl.nist.gov/fips/"><hr color="#FF0000"></a><p><a href="http://csrc.ncsl.nist.gov/fips/">NIST FIPS </a>Federal Information Processing Standards, including full text of DES and DSS<br><a href="ftp://ftp.uu.net/pub/security/des">DES source code </a>FTP archive<br><a href="http://www.quadralay.com/www/Crypt/DES/source-books.html">Phil Karn's list </a>of books with DES Source Code<br><a href="http://www.bokler.com/bokler">DEScipher/VBX</a>, a Visual Basic VBX wrapper to DES</p><hr color="#FF0000"><p><font color="#FF0000">IDEA (International Data Encryption Algorithm):</font></p><hr color="#FF0000"><p><a href="http://www.ascom.ch/systec">Ascom, Ltd.</a>, owners of <a href="http://www.ascom.ch/Web/systec/security/page1.htm">IDEA</a>, are now <a href="http://www.ascom.ch/Web/systec/press/release.htm">licensing it </a>for commercial use in USA<br><a href="ftp://ftp.dsi.unimi.it/pub/security/crypt/code/">IDEA source code </a>FTP archive<br><br>Diceware for Passphrase Generation: <a href="http://world.std.com/~reinhold/papers.html">Reinhold's papers </a>and <a href="http://reality.sgi.com/employees/limes/diceware.html">random word tables</a><br><a href="ftp://sunsite.unc.edu/pub/academic/mathematics/snefru.readme">Snefru hash function</a><br><a href="ftp://ftp.compapp.dcu.ie/pub/crypto"><br>MIRACL V3.3 </a>(Multiprecision Integer &amp; Rational Arithmetic C Library) - C code with C++ interfaces for manipulation of large fixed-length integers; uses in-line assembler for 80x86 processors; sample programs for modern factoring algorithms, public key systems, DSS, discrete logs; 82 pp. manual; free for non-commercial use.<br><a href="http://www.io.com/~ritter"><br>Dynamic Substitution and Dynamic Transposition ciphers </a>by Terry Ritter<br><a href="http://www.firecloud.com/IMD5">IMD5 </a>- an implementation of MD5 (message digest algorithm defined in <a href="http://www.apocalypse.org/pub/rfcs/rfc1321.txt">RFC1321</a>) via the &quot;Component Object Model&quot; (COM) within Microsoft's OLE system<br>MacIntosh cryptography software:</p><p><a href="ftp://erg.ucd.ie/Public/Macintosh/Cryptography/">PowerMac Cryptography Software </a>- FTP site in .ie has PGP 2.62, PGP 2.63i, CryptDisk 1.2, etc.<br><a href="http://www.math.ohio-state.edu/~fiedorow/PGP/"><br>MacPGP 2.6.3 alpha release </a>by Zbigniew Fiedorowicz; a Mac port of PGP 2.6.3; underlying crypto code is same as in PGP2.6.3i, except that it uses RSAREF1.0 instead of Zimmermann's MPILIB.<br><a href="http://uts.cc.utexas.edu/~grgcombs/htmls/crypto.html"><br>Greg Combs' page on cryptography on the Mac</a><br><a href="http://www.io.com/~combs/htmls/mcip.html"><br>Macintosh Cryptography Interface Project</a><br><br><a name="PGP"></a></p><hr color="#FF0000"><p><font color="#FF0000">PGP (Pretty Good Privacy) - Phil Zimmerman's public-key e-mail security system</font></p><hr color="#FF0000"><p><a href="http://web.mit.edu/network/pgp.html">PGP U.S. home page </a>(MIT) - information &amp; programs (export controlled)<br><a href="http://www.ifi.uio.no/~staalesc/PGP/">PGP International Home Page</a><br>PGP FAQs &amp; tutorials are posted by <a href="http://world.std.com/~franl/pgp/">Fran Litterio</a>, <a href="ftp://ftp.netcom.com/pub/mp/mpj/getpgp.asc">Michael Johnson</a>, <a href="http://sun1.bham.ac.uk/N.M.Queen/pgp/pgp.html">Nat Queen</a>, and <a href="http://www.mantis.co.uk/pgp/pgp.html">Mathew</a>.<br><a href="http://colossus.net/wepinsto/wsft_f/wspp_f/passfraz.html">PGP Passphrase Selection FAQ </a>by Randall Williams<br><a href="http://axion.physics.ubc.ca/pgp-attack.html">PGP Attacks FAQ </a>- assessment of whether PGP is vulnerable to attack or compromise<br><a href="http://www.dcs.ex.ac.uk/~aba/timeline/">PGP Timeline FAQ </a>- a concise history of PGP by Adam Back<br><a href="http://www.pegasus.esprit.ec.org/people/arne/pgp.html">PGP documentation online </a>in HTML and PostScript formats; covers MIT version 2.6.2<br><a href="http://www-mitpress.mit.edu/mitp/recent-books/comp/pgp-source.html">PGP Source Code and Internals </a>by Philip R. Zimmermann (MIT Press, 1995)<br>newsgroup: <a href="news:alt.security.pgp">alt.security.pgp</a>, <a href="http://www.quadralay.com/www/Crypt/PGP/pgp00.html">FAQs </a>by Jeff Licquia (May 1995)<br><a href="http://www.viacrypt.com">ViaCrypt, Inc. </a>distributes PGP software for commercial use<br><a href="ftp://www.dfki.uni-sb.de/pub/crypto/pgprtest-1.0beta.tar.gz">code </a>to test quality of PGP's IDEA session keys<br><a href="http://bcn.boulder.co.us/~neal/pgpstat/">analysis of existing public-key infrastructure </a>for PGP, by Neal McBurnett<br><a href="http://members.tripod.com/ttp://www.cs.usask.ca/undergrads/cwu122/pgpnt_request.html">PGP 2.6.2 for WinNT &amp; Win95 </a>- a character-based (console) port of PGP 2.6.2 (US/Canadian version) that understands long file names; no source code; released 10 Feb by Chris Uhl &amp; Chris Moran<br><a href="http://www.netlink.co.uk/users/hassop/pgp.html">UK site </a>with many pointers to PGP code and utilities<br>see also: <a href="#PGP Protocols">PGP Internet Drafts </a>in the Protocols section</p><hr color="#FF0000"><p><font color="#FF0000">PGP Shells &amp; Utilities - interface PGP to e-mail, file systems, networks, etc.</font></p><hr color="#FF0000"><p>a large <a href="http://www.primenet.com/~shauert/">page of links </a>to PGP front-ends and shells for Windows, DOS, Unix, OS2, &amp; MAC, maintained by Scott Hauert<br>PGP interfaces for e-mail programs:</p><p><a href="http://www.xs4all.nl/~comerwel/">PgpEudra 0.20 </a>- a PGP-shell that runs as an extension to the 16-bit Eudora versions<br><a href="http://web.aimnet.com/~jnavas/winpmail.htm">WinPMAIL </a>- interface to Pegasus Mail (Windows)</p><hr color="#FF0000"><p><font color="#FF0000"><a href="http://www.holli.com/~rrubin/">PGP interfaces for operating systems:</a></font></p><hr color="#FF0000"><p><a href="http://www.holli.com/~rrubin/">ProPGP </a>- a free 32-bit PGP front end for Windows '95, v. 1 beta 1 released Feb 1996; supports most functions of PGP 2.6.2 including key operations, views files before/after encrypting/decrypting, encrypts data from clipboard.<br><a href="http://www.panix.com/~jgostl/wpgp/">WPGP home page </a>and <a href="ftp://ftp.msicri.com/wpgp/wpgp150.zip">code (ZIP format)</a><br><a href="ftp://powerbbs.ic.net/">PWRPGP10.ZIP </a>(PGP shell for Windows)<br><a href="http://iquest.com/~aegisrc">Aegis 2.1 </a>PGP shell for Windows<br><a href="http://netaccess.on.ca/ugali/crypt/index.html">PGP QuickFront and PGP Winfront </a>by Ross Barclay / Ugali Int'l Corp.<br><a href="http://www.singnet.com.sg/~evanj">Pgpacket, Travel Web Page</a></p><hr color="#FF0000"><p><font color="#FF0000"><a href="http://www.itconsult.co.uk/stamper.htm">PGP-based time-stamp services attach a dated non-forgeable PGP signature to messages you submit:</a></font></p><hr color="#FF0000"><p><a href="http://www.itconsult.co.uk/stamper.htm">Stamper </a>- free service, run by Matthew Richardson<br><a href="http://www.eskimo.com/~weidai/timestamp.html">Wei's Time Stamp Service </a>- also free, run by Wei Dei</p><hr color="#FF0000"><p><font color="#FF0000">RIPEM - Mark Riordan's Internet Privacy Enhanced E-Mail system</font></p><hr color="#FF0000"><p>Archives at <a href="http://www.cs.indiana.edu/ripem/dir.html">Indiana Univ. </a>and at<a href="ftp://ripem.msu.edu/pub/crypt/ripem">MSU</a><br><a href="http://www.quadralay.com/www/Crypt/RIPEM/faq.html">Frequently Asked Questions </a>and<a href="http://www.quadralay.com/www/Crypt/RIPEM/vulnerabilities.html">Vulnerabilities</a><br>newsgroup: <a href="news:alt.security.ripem">alt.security.ripem </a>| archive<br><br><a href="http://www.c2.org/~um/crypt/scheme.html">CRYPT.SCM </a>is a small library of cryptographic functions written by Ulf M鰈ler in &quot;Scheme&quot;. Scheme is an algorithmic language (written in C) defined by IEEE P1178, and runs under many OS's including DOS, OS/2 and Unix.<br><a href="ftp://ftp.funet.fi/pub/crypt/random/noise04.zip">NOISE.SYS</a>, a random-noise device driver for DOS; source incl., 386 req'd.<br><a href="ftp://ftp.csn.net/mpj/public/ruby_m4.ps">Ruby Block Cipher </a>- a simple block cypher (although it cannot be used in Electronic Codebook mode) similar to a cryptographic hash function with a block size of 64 bits; <a href="ftp://ftp.csn.net/mpj/README">more info</a><br><a href="http://www.python.org/~pct/">Python Cryptography Toolkit </a>- free software (hash, en/decrypt, public-key, etc) for Python (an interpreted object-oriented language similar to Perl or Java) by Andrew Kuchling (Aug 1995); <a href="ftp://ftp.cwi.nl:/pub/pct">FTP site</a><br><a href="http://192.35.37.25/cypris">CYPRIS </a>(CrYPtographic RISc processor) - a coprocessor chip developed by Lockheed-Martin Advanced Technology Labs for DoD applications requiring &quot;algorithm agile&quot; reprogrammable cryptography; may also have business/commercial applications<br><a href="http://www.enigma-co.com/">Enigma </a>a software version of the famous WW2 crypto machine, and other cryptographic software<br>&quot;Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security&quot; (a report commissioned by Business Software Alliance) by M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener; Jan 1996; Matt Blaze comments that that &quot;more efficient attacks than those we considered might also be possible and should be taken into account by the prudent cryptosystem designer;&quot; <a href="ftp://ftp.research.att.com/dist/mab/keylength.txt">ASCII text </a>and <a href="ftp://ftp.research.att.com/dist/mab/keylength.ps">PostScript format</a><br></p><hr color="#FF0000"><p><font color="#FF0000">Steganography - hiding information within noise; a way to supplement (not replace) encryption, to prevent the existence of encrypted data from being detected</font></p><hr color="#FF0000"><p><a href="http://www.quadralay.com/www/Crypt/General/secure-obscure.html">Finney's essay</a>on &quot;security through obscurity&quot; and &quot;keyed steganography&quot;<br><a href="http://www.cl.cam.ac.uk/users/rja14/ihws.html">Workshop on Information Hiding</a>, University of Cambridge, UK (30 May - 1 June 1996)<br><a href="ftp://ftp.funet.fi/pub/crypt/steganography/">FTP archive of steganography programs</a><br><a href="http://indyunix.iupui.edu/~emilbran/stego.html">steganography</a><br><a href="http://vip.hotwired.com/wired/3.07/features/dyson.html">steganography article</a><br><a href="http://osf1.gmu.edu/~njohnso5/sec.htm#steganography">Neil Johnson's links </a>to steganography info<br><a href="http://osf1.gmu.edu/~njohnso5/sbib00.htm">Ross Anderson's bibliography </a>on steganography<br>Markus Kuhn's <a href="http://www.thur.de/ulf/stegano/index.html">steganography web page </a>and<a href="http://www.thur.de/ulf/stegano/announce.html">mailing list</a><br><a href="http://indyunix.iupui.edu/~emilbran/stego.html">S-Tools </a>steganography toolkit<br><a href="http://www.best.com/~fqa/romana/romanasoft/stego.html">STEGO </a>is a Mac program that hides encrypted data in a PICT file; written by <a href="http://www.best.com/~fqa/romana/">Romana Machado</a>, whose <a href="http://www.glamazon.com/">Peek of the Week </a>site features &quot;glamorous erotic art photography&quot;<br>Adam Back's <a href="http://dcs.ex.ac.uk/~aba/stealth/">STEALTH </a>program strips standard headers from a PGP encrypted message, making the result look like random noise<br><a href="http://www.c2.org/~mark/pgp/m-readme.html">MandelSteg </a>creates a Mandelbrot &quot;fractal&quot; image in which your encrypted data is stored in a specified bit-plane<br><a href="ftp://ftp.univie.ac.at/security/crypt/steganography">file archive at Univ. of Vienna</a><br></p><hr color="#FF0000"><p><font color="#FF0000">Voice Encryption (telephone security, wiretapping threats) </font>- 3 software programs listed below turn a computer (with modem and sound card) into a secure telephone, using speech compression and strong encryption protocols to provide a secure real-time voice channel over the public telephone system or Internet:</p><a href="http://web.mit.edu/network/pgpfone"><hr color="#FF0000"></a><p><a href="http://web.mit.edu/network/pgpfone">PGPfone </a>- Windows'95/NT version 1.0b1 available from FTP sites in <a href="ftp://ftp.hacktic.nl/pub/replay/pub/voice/pgpf10b1.zip">.nl</a>, <a href="ftp://ftp.funet.fi/pub/crypt/utilities/phone/pgpf10b1.zip">.fi</a>, and <a href="ftp://ftp.ifi.uio.no/pub/pgp/pc/windows/pgpf10b1.zip">.no</a>; release 1.0b6 for Macintosh (not compatible with previous versions) available from FTP site in <a href="ftp://utopia.hacktic.nl/pub/replay/pub/voice/PGPfone10b5.sea.Hqx">.nl</a>; source code available &quot;shortly&quot;<br><a href="ftp://utopia.hacktic.nl/pub/replay/pub/voice/">Nautilus v1.0a </a>- voice encryption for DOS and Unix; source code avail.; alternate FTP sites in <a href="ftp://ftp.dsi.unimi.it/pub/security/crypt/cypherpunks/nautilus">.it</a>, <a href="ftp://ftp.ox.ac.uk/pub/crypto/misc">.uk</a>, and <a href="ftp://ftp.funet.fi/pub/crypt/utilities/phone/">.fi</a><br><a href="http://www.fourmilab.ch/speakfree/windows/speak_freely.html">Speak Freely </a>- Windows application that encrypts and sends real-time voice data over a network; supports encryption with DES, IDEA, or key file; supports PGP for key-exchange<br><a href="http://www-jb.cs.uni-sb.de/~khuwig/lc-1eng.html">Louis Cypher (LC-1) </a>- a prototype secure telephone unit that uses &quot;fulltime RSA&quot; encryption &quot;for both the exchange of session keys and the data transfer itself&quot;; developed by German students Huwig and Baller<br><a href="http://www.epic.org/privacy/wiretap/">Digital Telephony Initiative and CALEA </a>(Communications Assistance for Law Enforcement Act of 1994) - FBI plan for automated surveillance of millions of phone lines<br><a href="http://www.mcnc.org/HTML/ITD/ANT/Attila.html">ATTILA </a>is a traffic analyzer for public telephone and ATM/SONET networks developed for DoD; ATTILA has &quot;powerful wire tapping capability&quot; and can &quot;define filters&quot; to &quot;trigger the capture of traffic on connections between... specified originating and/or terminating call addresses (with wild card fields). The captured traffic could be displayed (heard/seen) in real time or stored in memory for later playback.&quot;<br><a href="http://www.tscm.com/">Technical Surveillance Countermeasures </a>- extensive information on wiretapping threats and (non-cryptographic) countermeasures</p><hr color="#FF0000"><p><font color="#FF0000">Vulnerabilities - risks &amp; defects in cryptography-based security systems</font>&nbsp;&nbsp; Timing Attack - precise CPU timing of cryptographic computations can reveal key information</p><hr color="#FF0000"><p><a href="http://www.cryptography.com">Paul Kocher's paper </a>(Dec 1995) brought widespread attention to the timing attack problem<br><a href="http://www.rsa.com/rsaqa.htm">RSA's Comments </a>explain how the timing attack is easy to guard against<br>Matt Blaze's <a href="ftp://research.att.com/dist/mab/quantize.shar">quantize </a>code for Unix and Win32 defeats the timing attack by inserting a delay time in crypto computations<br><br>Bugs Bounty: Community Connexion offers prizes for discovery of security bugs in <a href="http://www.c2.org/hacknetscape">Netscape</a>, <a href="http://www.c2.org/hackmsoft/">Win95</a>, and <a href="http://www.c2.org/hackjava/">Java</a><br>security defects in MicroSoft's Windows NT and Win95:</p><p><a href="http://shadowland.rh.uchicago.edu/ntcrypto.html">Ted Cabeen's report </a>on how passwords may be stored in the registry's Security section<br><a href="mailto:snakey@cs.umd.edu">David Ross </a>wrote a <a href="http://burns.dejanews.com/cgi-bin/dngetdoc.html?RECNUM=4014816+SERVER=dnserver.dbjan+CONTEXT=6840.6906.">simple C program </a>that breaks the password encryption code in the Windows 95 registry<br><a href="http://www-leland.stanford.edu/~llurch/win95netbugs/faq.html">security bugs in Windows 95</a><br><a href="http://members.tripod.com/quixote.stanford.edu/1m/win95netbugs">security bugs in Windows 95</a><br><a href="http://www.ddj.com/ddj/1996/1996.01/wagner.htm">Netscape Cracked </a>- Ian Goldberg and David Wagner (CS students at UC Berkeley), writing in Dr. Dobb's Journal (Jan 1996), describe weaknesses they found in the PRNG of Netscape's SSL implementation; see also their report on <a href="http://www.cs.berkeley.edu/~daw/netscape-randomness.html">crypto-quality pseudo-random numbers</a><br><a href="http://www.cs.purdue.edu/homes/swlodin/kerberos.html">Flaw in Kerberos 4.0 </a>reported by 2 Purdue students; caused by inadequate RNG operation, similar to Netscape SSL flaw (previous item)<br>&quot;Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security&quot; (report commissioned by Business Software Alliance) by M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, and M. Wiener; Jan 1996; Matt Blaze comments that that &quot;more efficient attacks than those we considered might also be possible and should be taken into account by the prudent cryptosystem designer;&quot; <a href="ftp://ftp.research.att.com/dist/mab/keylength.txt">ASCII text </a>and <a href="ftp://ftp.research.att.com/dist/mab/keylength.ps">PostScript format</a><br><a href="http://www.cs.berkeley.edu/~daw/js1.html">UNIX sendmail </a>can be exploited to gain root access; this attack can be hidden in JavaScript (see next item) and works behind firewalls<br>JAVA and JavaScript pose serious security hazards, not because of any weakness in cryptography, but because security was not part of their original design. Current versions lack features for configurability, authentication, and control over whose applets or scripts are run. Fixes to these security holes will likely incorporate encryption technology.<br><a href="http://www.homeport.org/~adam/java.html">Directions for Java </a>- musings on policies, threats and liabilities of Java, Livescript and other downloadable applets; by Adam Shostack (Dec 1995)<br><a href="http://www.osf.org/~loverso/javascript/index.html">JavaScript security hole page </a>by John LoVerso of OSF Research Institute<br>more to come...<br><a href="http://pauillac.inria.fr/~doligez/ssl/">more on crack of Netscape</a><br><a href="ftp://ftp.ox.ac.uk/pub/math/rsa129/mpqs_sans_math.Z">RSA factorization</a><br><a href="ftp://ftp.bellcore.com/pub/lenstra/rsa129.ps.Z">BellCore </a>report on RSA factorization<br><a href="http://asknpac.npac.syr.edu/">NPAC </a>Northeast Parallel Architectures Center - RSA factorization<br><a href="http://axion.physics.ubc.ca/pgp-attack.html">PGP Attack FAQ </a>- review of how PGP might be attacked or compromised (Feb 1996)<br><a href="ftp://ftp.ox.ac.uk/pub/comp/security">password crackers</a></p><hr color="#FF0000"><p><font color="#FF0000">Crypto Link Farms</font></p><hr color="#FF0000"><dl><p><a href="http://www.hu-berlin.de/~h0271cbj/index.phtml" e="889738584" d="889738433" t="889738708">Alexander Geschonneck's security page</a><br>Security related papers, pages, X.509 information, publications, network security and firewall vendors, security FAQ's.<br><a href="http://www.stack.nl/~galactus/remailers/" e="820883860" d="819599524" t="832534369"><br>Anonymity, privacy, security.</a><br>Very nicely done collection of links to anonymity, privacy, and security resources.<br><a href="http://www-cse.ucsd.edu/users/mihir/crypto-links.html" e="830118883" d="830118867" t="830118867"><br>Bellare - Crypto links</a><br>More link farms, conferences, organizations, electronic commerce, IETF, key forfeiture, crypto people.<br><a href="http://www.cl.cam.ac.uk/Research/Security/OtherSites/all.html" e="836767211" d="836767193" t="836767312"><br>Cambridge Computer Security Group Links</a><br>Huge collections of links to security-related sites - the format is a bit like this list.<br><a href="http://www.excelmail.com/" e="892694843" d="892694758" t="892699062"><br>Comprehensive list of Public Key Infrastructure (PKI) links</a><br>Links to PKI documents, specifications, CA's, and sites with PKI-related useful information.<br><a href="http://www.cs.purdue.edu/coast/archive/data/category_index.html" e="800336620" d="816662771" t="840147117"><br>Coast Security Archive - Category Index</a><br>A large archive of security software, publications, and technical information.<br><a href="http://www.cs.purdue.edu/homes/spaf/hotlists/csec-body.html" e="895445814" d="895445625" t="895445861"><br>COAST Hotlist Contents</a><br>Gene Spaffords crypto and security link farm.<br><a href="http://www.enter.net/~chronos/cryptolog1.html" e="826271375" d="826271350" t="895446097"><br>Crypto-Log: Internet Guide to Cryptography</a><br>Algorithms and mathematics, FTP archives, bibliographies, key escrow, disk, file, and mail encryption, crypto laws, internet security, newsgroups and mailing lists, protocols and standards, steganography, voice encryption, security problems.<br><a href="http://axion.physics.ubc.ca/crypt.html" e="831357094" d="831357077" t="836546090"><br>Cryptography</a><br>PGP, encryption algorithms, legal issues.<br><a href="http://draco.centerline.com:8080/~franl/crypto/" e="800584419" d="816662828" t="816662828"><br>Cryptography: The Study of Encryption</a><br>Crypto newsgroups, papers, cypherpunks, crypto policy, digital cash, and other information sources.<br><a href="http://porthos.itribe.net/CTRS/" e="811108592" d="816061879" t="887148152"><br>Cryptography Technical Report Server (CTRS)</a><br>Various crypto-related tech reports.<br><a href="http://www.iae.nsk.su/pages/CRYPTO/welcome.html" e="834696629" d="834696534" t="879144357"><br>Cryptography URL</a><br>Encryption standards, FAQ's, and FTP sites.<br><a href="http://www.fatmans.demon.co.uk/crypt/index.htm" e="841992021" d="841991966" t="841991966"><br>Datacomms Technologies cryptography archive</a><br>Encryption software, text files and information, resources and links.<br><a href="http://www.pca.dfn.de/eng/team/ske/pem-dok.html#CA" e="854391303" d="854391247" t="860969106"><br>Email security, cryptography and related stuff</a><br>PEM, MIME, and MOSS RFCs, links to CA's, implementations, literature, PGP.<br><a href="http://www.modeemi.cs.tut.fi/~avs/eu-crypto.html" e="852491858" d="852491817" t="852491817"><br>European Cryptography Resources</a><br>Recommendations, drafts, papers, new items, official bodies, research, and government meddling.<br><a href="http://fw4.iti.salford.ac.uk/ice-tel/firewall/sec_jump.html" e="870646455" d="870646444" t="870646444"><br>Firewall Security Jump Page</a><br>Links and summaries of a wide variety of firewall products.<br><a href="http://www.SecurityServer.com/" e="853096181" d="853096178" t="853096178"><br>Gateway to Information Security Home Page</a><br>Links to a large number of security-related sites, books, journals, and related information (imagine this page, but not all lumped together on one page).<br><a href="http://www.geocities.com/capecanaveral/3498" e="836376671" d="836376657" t="836376740"><br>Home-Page of Markus H黚ner</a><br>Security, cryptography, hacking, business on the Internet, security software, satellite hacking.<br><a href="http://www.cs.hut.fi/crypto/" e="842557534" d="842557506" t="842557506"><br>International Cryptographic Software Pages for Encryption, Decryption, Cryptanalysis, Steganography, and Related Methods</a><br>Algorithms, software packages, protocols and standards, books, journals, conferences, newsgroups, mailing lists, crypto links.<br><a href="http://www.interlog.com/~vabiro/links.htm" e="802973108" d="816663032" t="816663032"><br>Links Related to Terrorism, Intelligence, and Crime</a><br>A large number of intelligence, security, law enforcement, disaster planning, terrorism, crime, military, and defense agencies and organizations.<br><a href="http://www.geocities.com/CapitolHill/2358/" e="845441989" d="845441918" t="845441918"><br>Luca Venuti's Home Page - TPC</a><br>Electronic privacy links, organisations, newsgroups.<br><a href="http://www.hkn.de/user/raven/bigbroth.htm" e="889405427" d="889405380" t="889405380"><br>No Big Brother Page</a><br>Links to remailers, anon proxies, crypto and stego software, file wiping tools, privacy and anti-privacy organisations.<br><a href="http://www.ncsa.com/hotlinks.html#add" e="823062933" d="823062907" t="823062907"><br>NCSA Hot Links</a><br>Anti-virus software, firewalls, general security vendors, general infosec links, parental control, privacy, law, and ethics.<br><a href="http://adams.patriot.net/~johnson/neil/sec.html" e="845422452" d="845422433" t="845422663"><br>Neil's Security and Privacy Resources</a><br>Encryption, steganography, special events, research, documents, news, security archives, security organizations.<br><a href="http://www.tezcat.com/web/security/security_top_level.html" e="829898112" d="829898084" t="829898189"><br>Network/Computer Security Technology</a><br>Current events, security web pages, commercial security tools, newsgroups, mailing lists, FAQ's, incident bulletins, conferences/seminars/workshops.<br><a href="http://netaccess.on.ca/ugali/crypt/index.html" e="800327970" d="816663214" t="868840245"><br>PGP Resources</a><br>Resources related to PGP such as mailer add-ons and front-ends, key servers, and related information.<br><a href="http://www.rivertown.net/~pgp/" e="833866149" d="833866126" t="833866126"><br>PGP-Users Mailing List Home Page</a><br>PGP-related information, remailers, privacy information, security and crypto links.<br><a href="http://www.assist.mil/ASSIST/policies/crypt.html" e="884584580" d="884584500" t="884584500"><br>Pointers to sites with encryption material</a><br>Links to FTP sites with email, voice, disk, file, comms encryption, and general crypto toolkits and libraries.<br><a href="http://www.dpmms.cam.ac.uk/~rgep/crypto.html" e="879806068" d="879804624" t="879804624"><br>Richard Pinch: Cryptography page</a><br>Links to research groups, associations, publications, companies, government institutions, standards, e-commerce, elliptic curves and factoring, historical, newsgroups and publications.<br><a href="http://mats.gmd.de/markus/internet/Internet_secure_docs.html" e="800336004" d="816666216" t="886558735"><br>SAIC Security - Security Documents</a><br>Firewalls, WWW security, intrusion detection, Unix security, the internet worm, general network security, and trusted systems.<br><a href="http://www.patriot.net/users/johnson/html/neil/sec/sec.htm" e="824784165" d="824784063" t="868840263"><br>Security and Privacy Issues</a><br>Research, PGP, cypherpunks, SHTTP, crypto software, online banking.<br><a href="http://bbs.seker.es/~alvy/cripto.html" e="837114945" d="0" t="0"><br>Spanish Crypto Resources</a><br>Spanish crypto and security-related companies, magazines, and events.<br><a href="http://www.dcs.warwick.ac.uk/~tinsley/" e="838929677" d="838929593" t="838929593"><br>Steganography</a><br>Stego papers, references, research groups, related resources.<br><a href="http://reality.sgi.com/rchiang/TI-Cryptography.html" e="884590108" d="884584764" t="885197437"><br>Technical Information - Cryptography</a><br>Links to other crypto sites, source code archives, companies and organisations, peope, and reference information.<br><a href="http://www.zeuros.co.uk/firewall/" e="831712229" d="831711881" t="831711881"><br>The Rotherwick Firewall Resource - Point of Attack</a><br>Firewall basics, white papers, products, manufacturers, books, papers, training, mailing lists, links to other firewall-related resources.<br><a href="http://www.epm.ornl.gov/~dunigan/security.html" e="825904585" d="825904570" t="825904774"><br>Tom Dunigan's Security page</a><br>PGP, S/Key, Kerberos, crypto API's, secure applications, commercial providers, government agencies, intrusion detection, vulnerabilities.<br><a href="http://www.interaccess.com/trc/t_links.html" e="803352689" d="816663319" t="816663319"><br>TSA (Law Enforcement and Intelligence) Links</a><br>More links to law enforcement and intelligence agencies.<br><a href="http://www.uni-siegen.de/security/" e="877293488" d="877293215" t="877293215"><br>Uni-GH Siegen - Security-Server</a><br>Encryption algorithms, data protection, steganography, ecash, Internet security, viruses, conferences, security standards, newsgroups and mailing lists, RFC, journals.<br><a href="ftp://furmint.nectar.cs.cmu.edu/security/README.html" e="800898150" d="816663375" t="830116658"><br>Vince Cate's Cryptorebel/Cypherpunk Page</a><br>Cypherpunks resources, remailers, digital cash, PGP, and Clipper.<br><a href="http://www.vmeng.com/vinnie/crypto.html" e="866401299" d="866401285" t="866401772"><br>Vinnie's Crypto Links</a><br>Crypto overviews and FAQ's, link farms, encrypted comms, e-commerce, crypto libraries.</p></dl><hr color="#FF0000"><p><font color="#FF0000">Crypto FTP Archives</font></p><hr color="#FF0000"><dl><p><a href="ftp://ftp.funet.fi/pub/crypt/cryptography/" e="835331577" d="835331559" t="835331559">FUNET crypto archive</a><br>PGP, symmetric and asymmetric encryption, crypto libraries, papers.<br><a href="http://www.cryptography.org/" e="883615372" d="883615346" t="883615346"><br>North American Cryptography Archives</a><br>Archive of crypto software, only available from the US and Canada.<br><a href="ftp://ftp.ox.ac.uk/pub/crypto/" e="835331904" d="835331875" t="835331875"><br>Oxford Uni crypto archives</a><br>DES, SSL, cryptanalysis, documentation, PGP, miscellaneous.<br><a href="ftp://ftp.replay.com/pub/replay/pub/" e="833865187" d="833865176" t="833865176"><br>Replay crypto/security archives</a><br>Apache, Applied Crypto files, encryption, Java, PGP, remailers, security, voice encryption files.<br><a href="ftp://ftp.informatik.uni-hamburg.de/pub/virus/crypt/" e="847430021" d="847430017" t="847430017"><br>University of Hamburg crypto archive</a><br>Disk and file encryption, PGP, stego, voice encryption.<br><a href="ftp://ftp.ifi.uio.no/pub/pgp/" e="847429965" d="847429951" t="870043153"><br>University of Oslo PGP archive</a><br>PGP and PGP-related software.<br><a href="ftp://ftp.urec.fr/pub/securite/" e="852871071" d="852871031" t="852871227"><br>UREC archive</a><br>French archive of CERT bulletins, dictionaries, PC, Unix, VMS security software (mostly anti-virus and access control rather than crypto).</p></dl><hr color="#FF0000"><p><font color="#FF0000">Crypto Social Issues</font></p><hr color="#FF0000"><dl><p><a href="http://webjcli.ncl.ac.uk/1997/issue1/akdeniz1.html" e="860442630" d="860442516" t="860442516">[1997] 1 Web JCLI</a><br>Analysis of the UK governments policy on encryption.<br><a href="http://www.qualcomm.com/people/pkarn/export/followup.html" e="860483612" d="860483591" t="860483591"><br>Additional Comments of Philip R. Karn, Jr.</a><br>Phil Karn rebuts inaccurate and bizarre government claims in congressional testimony (this is an example of the kind of misinformation which government advisors often provide to their governments).<br><a href="http://www.computerprivacy.org/" e="892683902" d="892683842" t="892683842"><br>Americans for Computer Privacy</a><br>Computer privacy issues.<br><a href="http://news.bbc.co.uk/hi/english/special_report/1998/encryption/newsid_58000/58499.stm" e="889410736" d="889410571" t="889410571"><br>BBC News - Encryption</a><br>BBC news stories on encryption, including &quot;UK Government dithers on encryption regulation&quot;.<br><a href="http://www.privacy.org/pi/reports/big_bro/" e="820883860" d="818699966" t="818699966"><br>Big Brother Incorporated</a><br>Companies which supply surveillance technology to non-democratic regimes.<br><a href="http://www.brook.edu/ES/POLICY/Polbrf21.htm" e="894321432" d="894321218" t="894321218"><br>Brookings Policy Brief No.21.</a><br>Brookings Institute study of crypto policy (pro-GAK).<br><a href="http://insight.mcmaster.ca/org/efc/pages/doc/crypto-export.html" e="833485390" d="833485315" t="860965379"><br>Canada's export controls</a><br>Summary of the Canadian crypto export situation.<br><a href="http://www.cato.org/pubs/handbook/hb105-19.html" e="894839729" d="894839666" t="894839666"><br>Cato Handbook for Congress: Freedom on the Internet and Other Computer Networks</a><br>Cato Institute study of crypto policy (anti-GAK).<br><a href="http://www.cdt.org/crypto.html" e="811108365" d="816663640" t="816663640"><br>Centre for Democracy and Technology Crypto Page</a><br>CDT information on current US crypto policy<br><a href="http://www2.eff.org/~declan/global/japan/rotenberg.reply.102896" e="846821829" d="846821809" t="846821899"><br>Clipper Roadshow</a><br>US government policy laundering on key escrow.<br><a href="http://www.cnet.com/Content/Features/Dlife/Privacy2/" e="871265178" d="871265132" t="871265132"><br>CNET features - digital life - privacy in the digital age</a><br>Digital privacy (or more specifically, the lack thereof).<br><a href="http://www.thecodex.com/" e="852525348" d="852525269" t="852525527"><br>Codex Surveillance &amp; Privacy Page</a><br>Surveillance, stalking, privacy invasion, eavesdropping, and anything else related to these categories.<br><a href="http://www.bxa.doc.gov/pubcomts.htm" e="857332743" d="857332574" t="857332574"><br>Comments on Encryption Transfers</a><br>Comments on new US export regulations.<br><a href="http://jya.com/bxapctoc.htm" e="857333090" d="857332992" t="857332992"><br>Comments on Encryption Transfers - HTML</a><br>Easier-to-handle HTML versions of the above.<br><a href="http://jya.com/cryptoag.htm" e="845420624" d="845420599" t="845420599"><br>Crypto AG - Der Spiegel (German)</a><br>Allegations of intelligence agencies subverting Crypto AG product security.<br><a href="http://caq.com/CAQ/caq63/caq63madsen.html" e="889737435" d="889737144" t="889737144"><br>Crypto AG: The NSA's Trojan Whore?</a><br>Possible rigging of Crypto AG hardware by the NSA.<br><a href="http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm" e="816057461" d="816663773" t="886972446"><br>Crypto Law Survey</a><br>A survey of crypto laws in various countries.<br><a href="http://cwis.kub.nl/~frw/people/koops/jenc8bjk.htm" e="870066421" d="870066406" t="870066406"><br>Crypto regulation in Europe</a><br>The state of crypto regulation plans in Europe as of May 1997.<br><a href="http://pwp.usa.pipeline.com/~jya/nrcindex.htm" e="833490323" d="833490310" t="833491162"><br>Cryptography's Role in Securing the Information Society</a><br>National Academy of Sciences report on cryptography policy.<br><a href="http://www.counsel.com/cyberspace/privacy.html" e="841952811" d="841952799" t="841952799"><br>Cyberspace Law for Non-Lawyers</a><br>Privacy laws and the Internet.<br><a href="http://www.leeds.ac.uk/law/pgs/yaman/ukdtirep.htm" e="865457342" d="865457324" t="865457324"><br>DTI/UK Encryption Policy</a><br>Reply to the DTI Consultation Paper on Licensing of Trusted Third Parties for the<br>Provision of Encryption Services.<br><a href="http://206.13.40.11/1996/dec/echelon.html" e="886560990" d="886560681" t="886560681"><br>Echelon: Exposing the Global Surveillance System</a><br>Covert Action Quarterly article on wordlwide NSA surveillance.<br><a href="http://techweb.cmp.com/eet/whitepaper/paper1/paper1.html" e="875519486" d="875519481" t="875519481"><br>EE Times - White Paper</a><br>White paper on hackers.<br><a href="http://www.us.net/~steptoe/276915.htm" e="824359479" d="824359366" t="824359366"><br>Emerging Japanese Encryption Policy</a><br>How Japan, Inc, handles encryption policy (a real contrast to the US governments attitude).<br><a href="http://guru.cosc.georgetown.edu/~denning/crypto/Trends.html" e="860704010" d="860703457" t="864620332"><br>Encryption Policy and Market Trends</a><br>Dorothy Dennings 1997 GAK forecast.<br><a href="http://www.epic.org/crypto/" e="809292559" d="816663809" t="886556698"><br>EPIC Cryptography Policy</a><br>EPIC information on current US crypto policy.<br><a href="http://www.epic.org/privacy/" e="808969310" d="816663887" t="858577438"><br>EPIC Privacy Links</a><br>EPIC privacy resources.<br><a href="http://www.dcs.ex.ac.uk/~aba/rsa/" e="857958489" d="857958437" t="857958437"><br>export-a-crypto-system sig</a><br>Diminuitive crypto hacks (well-known algorithms in a few lines of Perl, Python, or C) and how to use them to poke fun at export laws.<br><a href="http://caq.com/CAQ/CAQ59GlobalSnoop.html" e="871264130" d="871264099" t="871264099"><br>Exposing the Global Surveillance System</a><br>Extracts from Nicky Hager's book &quot;Secret Power&quot;.<br><a href="http://www.ustreas.gov/treasury/bureaus/fincen/fincen.html" e="838928716" d="838928672" t="838928672"><br>FinCen</a><br>Big Brother for financial information.<br><a href="http://www.epic.org/open_gov/foia/secrets.html" e="839188457" d="839188387" t="886556785"><br>Former Secrets</a><br>Declassified US government machinations to ban/restrict crypto.<br><a href="http://www.best.com/~geeman/" e="871264815" d="871264457" t="871264457"><br>FUD! Home Page - Crypto legislation</a><br>Contents of and discussion over various US crypto bills.<br><a href="http://www.gilc.org/crypto/crypto-survey.html" e="886972312" d="886972307" t="886972307"><br>GILC -- Cryptography and Liberty</a><br>Survey of encryption policy worldwide.<br><a href="http://gnn.com/gnn/wr/96/01/12/features/nsa/index.html" e="821742712" d="821742702" t="821742702"><br>GNN on Crypto</a><br>Global Network Navigator web review: The NSA vs The Net.<br><a href="http://www.iicm.edu/jucs_2_3/government_cryptography_and_the" e="883951477" d="883951421" t="883951421"><br>Government, Cryptography, and the Right to Privacy</a><br>Paper documenting the overt and covert regulation and restriction of cryptography by governments.<br><a href="http://www.dcs.ex.ac.uk/~aba/grdesign/" e="877995078" d="877995047" t="877995047"><br>GR Design Principles</a><br>GAK-resistant crypto protocol design guidelines.<br></p><dt><a href="http://www.greyarea.com/" e="845423125" d="845423068" t="845423068">Gray Areas Magazine</a><br>Essays and articles on the computer underground (and all sorts of other things).<br><a href="http://www.proliberty.com/references/pgp/" e="893629066" d="893628979" t="893628979"><br>Information About PGP &amp; Encryption</a><br>Information on the creeping takeover of GAK.<br><a href="http://www.ii-mel.com/interception/" e="890604675" d="890604430" t="890616197"><br>Interception</a><br>Technical details on large-scale GSM and ISDN interception techniques.<br><a href="http://www.privacy.org/ipc/" e="830461321" d="830461288" t="830461288"><br>Internet Privacy Coalition</a><br>Attempts to ensure privacy on the internet.<br><a href="http://www.ingenioeren.dk/redaktion/herson.htm" e="856122237" d="856122058" t="857333413"><br>Interview with David Herson - SOGIS</a><br>Interview on European crypto policy.<br><a href="http://online.offshore.com.ai/arms-trafficker/" e="831669633" d="831669570" t="831669570"><br>ITAR Civil Disobedience</a><br>Click on this form to become an international arms trafficker.<br><a href="http://www.crypto.com/key_study/" e="864597190" d="864597172" t="864597301"><br>Key Recovery Study</a><br>The risks of key recovery, key escrow, and trusted third party encryption.<br><a href="http://www.seven77.demon.co.uk/krisis/" e="860703403" d="860703379" t="860703379"><br>KRISIS Home Page</a><br>GAK/EuroClipper home page.<br><a href="http://jya.com/nsazeal.htm" e="853731313" d="853730242" t="885006705"><br>NSA's Influence on New Zealand Crypto Policy</a><br>NSA influence on New Zealand export policy.<br><a href="http://webjcli.ncl.ac.uk/1998/issue1/akdeniz1.html" e="889412735" d="889412552" t="889412552"><br>No Chance for Key Recovery</a><br>Paper on key recovery (GAK) vs human and political rights.<br><a href="http://www.privacy.org/pi/activities/tapping/" e="857334390" d="857334364" t="857334364"><br>Phone Tapping</a><br>Information and resources on government phone tapping plans.<br><a href="http://www.privacyinc.com/" e="875514884" d="875514861" t="875514861"><br>Privacy, Inc.</a><br>Various resources related to the (lack of) privacy, including access to databases and online information search facilities.<br><a href="http://www.privacy.org/pi/" e="841953096" d="841953089" t="841953089"><br>Privacy International Home Page</a><br>Privacy reports, interntional agreements on privacy and human rights, surveillance technologies, ID cards, privacy-related conferences.<br><a href="http://www.tamos.com/privacy/" e="893197170" d="893197158" t="893197158"><br>Privacy on the Net: Practical Issues</a><br>Links and information on various privacy-related issues (cryptography, anonymity, secure communications).<br><a href="http://www.sendfakemail.com/~raph/remailer-list.html" e="855516442" d="855516436" t="855516436"><br>Remailer list</a><br>List of anonymous remailers.<br><a href="http://www.anu.edu.au/people/Roger.Clarke/DV/index.html" e="808968100" d="816664299" t="816664299"><br>Roger Clarke's Privacy Page</a><br>Data surveillance and information privacy information publications, and legislation.<br><a href="http://www.anu.edu.au/people/Roger.Clarke/II/IIRSecy97.html" e="871264240" d="871264201" t="871264201"><br>Roger Clarke's Public Interests on the Electronic Frontier</a><br>Paper discussing various freedoms and rights such as the right to privacy.<br><a href="http://www.roxen.com/crypto/" e="891816083" d="891815859" t="891815859"><br>Roxen's General Export Application for Strong 128-bit Encrypted Denied</a><br>Swedish government refusal of export permit for 128-bit SSL.<br><a href="ftp://songbird.com/pub/rsa.mid" e="870648962" d="0" t="0"><br>RSA as a MIDI file</a><br>RSA encoded as a MIDI file. Technically this is a program and therefore unexportable from the US.<br><a href="http://www.urich.edu/~jolt/v2i1/sergienko.html" e="862780104" d="862780084" t="862780084"><br>Self Incrimination and Cryptographic Keys</a><br>Richmond Journal of Law and Technology article on forced disclosure of crypto keys.<br><a href="http://online.offshore.com.ai/services.html" e="832792013" d="832791940" t="832791940"><br>Services Available from Offshore Information Services Ltd.</a><br>Offshore internet services and accounts in Anguilla.<br><a href="http://www.us.net/softwar/" e="867009889" d="867009833" t="867009833"><br>SOFTWAR Information Security</a><br>Declassified papers and resources on Clipper and key escrow, voice and mail<br>encryption software.<br><a href="http://www5.inm.de/tkg/" e="837755606" d="837755570" t="837755570"><br>Telekommunikationsgesetz</a><br>East German surveillance state-style laws being applied in the unified Germany.<br><a href="http://www.theage.com.au/daily/970603/infotech/infotech5.html" e="865455067" d="865455036" t="865455036"><br>The Age - Computers</a><br>DSD meddling in Australian crypto exports.<br><a href="http://www.fcw.com/pubs/fcw/1998/0413/web-nsareport-4-14-1998.html" e="892695175" d="892695162" t="892695162"><br>Threat and Vulnerability Model for Key Recovery</a><br>NSA report on why GAK is bad (yes, you read that right).<br><a href="ftp://ftp.crl.com:/users/ro/smart/TFP/home.html" e="829036612" d="829036606" t="829036606"><br>Tools For Privacy: Version 1</a><br>An online book covering threats to privacy, cryptography, PGP, and related issues.<br><a href="http://www.trueposition.com/index.htm" e="883617549" d="883617542" t="883617542"><br>TruePosition Wireless Location System Home Page</a><br>Cellular phone tracking.<br><a href="http://www.seven77.demon.co.uk/updated.htm" e="859149596" d="859149585" t="859149585"><br>Updated UK Proposals for Licensing Encryption Services</a><br>Critique of UK crypto licensing/GAK proposal.<br><a href="http://jya.com/nsa-elint.htm" e="892690323" d="892690160" t="892690160"><br>U.S. Electronic Espionage: A Memoir</a><br>First exposure of the NSA and Echelon<br><a href="http://www.efa.org.au/Issues/Crypto/Walsh/" e="868256226" d="868256212" t="868256212"><br>Walsh Report</a><br>Report on Australian crypto policy, originally suppressed by the government, then released after a judicial review.<br><a href="http://www.uiuc.edu/cgi-bin/info" e="809897403" d="809897400" t="809897400"><br>What your Browser is Sending</a><br>See what information your web browser is sending to remote servers.</dt></dl><hr color="#FF0000"><p><font color="#FF0000">Crypto Software</font></p><hr color="#FF0000"><dl><p><a href="http://maga.di.unito.it/security/resources/act.html" e="881618464" d="881618348" t="881618348">Advanced Cryptography Tool</a><br>Crypto tool using PGP 2.6.3i with triple DES and SHA-1.<br><a href="http://www.thegrid.net/positron/productreleases.html" e="893200325" d="893199933" t="893199933"><br>Ambient Empire</a><br>Vigenere cipher cracker, Windows port scanner.<br><a href="http://www.apache.org/" e="842557126" d="842557121" t="842557121"><br>Apache HTTP Server Project</a><br>Apache secure web server.<br><a href="https://www.cypherpunks.to/bsafeeay/" e="883616841" d="883616832" t="883616832"><br>BSAFEeay, a public domain implementation of the BSAFE API</a><br>BSAFE API wrapper around SSLeay.<br><a href="http://fractal.mta.ca/crypto/" e="855516380" d="855516288" t="855516288"><br>Canadian Cryptographic/cryptanalytic software</a><br>Canadian encryption software and companies.<br><a href="http://www.plu.edu/~spillmrj/cap.html" e="886999689" d="886999641" t="886999641"><br>CAP</a><br>Cryptographic analysis program (automatically analyse and break simple ciphers).<br><a href="http://www.doc.ic.ac.uk/~ci2/ssh/" e="891207602" d="891207522" t="891840133"><br>Cedomir Igaly's SSH Page</a><br>Free SSH for Windows.<br><a href="http://www.inka.de/~bigred/devel/cipe.html" e="879571613" d="879571596" t="879571596"><br>CIPE</a><br>Crypto IP encapsulation - encrypting IP routers using Linux.<br><a href="http://web.mit.edu/network/isakmp/ciscokmp.html" e="835904536" d="835904499" t="835904499"><br>Cisco Systems ISAKMP Distribution</a><br>A reference implementation of the IETF's ISAKMP protocol.<br><a href="http://people.delphi.com/gjc/crashme.html" e="879804539" d="879804511" t="879804511"><br>CRASHME: Random input testing.</a><br>Tests resistance of programs to random input.<br><a href="http://jcewww.iaik.tu-graz.ac.at/JavaSecurity/index.htm" e="849482996" d="849482983" t="853719512"><br>cryptiX</a><br>X.509 security package written in Java (page requires a Java-enabled browser to view).<br><a href="http://www.systemics.com/software/cryptix-java/" e="883617899" d="883617762" t="883617762"><br>Cryptix Mirror Index</a><br>Cryptix Java crypto library.<br><a href="http://www.cs.auckland.ac.nz/~pgut001/cryptlib/" e="847047160" d="847047100" t="884992679"><br>cryptlib Information</a><br>Encryption library supporting both low-level direct access to a large number of algorithms and high-level access to functions like cryptGetKey() and cryptCreateSignature().<br><a href="http://www.jim.com/jamesd/Kong/Kong.htm" e="881620438" d="881620437" t="881620437"><br>Crypto Kong</a><br>PGP-like program using elliptic curve crypto.<br><a href="http://www.homeport.org/~adam/crypto/table.html" e="853719809" d="853719806" t="860477569"><br>Cryptographic Libraries: A comparison<

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -