Encryption Technologies Index


Check the bottom of this document for other resources...

Go back to previous directory

FilenameSizeDescription
2XDESFOU.TXT6795Nx2 DES Found Weak
2XISOLAT.TXT102702x Isolated Double-DES: Another Weak Two-Level DES Structure
ANDERSON.TXT72868Anderson's RSA trapdoor can be broken (Postscript file)
CFSDRAFT.TXT94180Cryptographic FIle System (Must run through nroff to read)
CHAUM_DI.TXT34187Unconditional Sender and Recipient Untraceability
CRYPTLES.TXT332312A lesson in Cryptography (Postscript)
CRYPTOGR.TXT65831CRYPTOGRAPHY: TRENDS IN TECHNOLOGY AND POLICY
DES-BREA.TXT276881Breaking DES (Postscript)
IDEAFAST.TXT9830Speed of DES/IDEA implementations
IDEA_PS.TXT242690Overview of IDEA Encryption Method
LADDERBL.TXT4241Large Block DES Newsletter, Vol. I, No. 1
LADDERDE.TXT11088Ladder-DES: A Proposed Candidate to Replace DES
MD4_DOC.TXT30512The MD4 Message Digest Algorithm
MD5-CRYP.TXT6026Excerpt from, "Analysis and Design of Cryptographic Hash Func."
MD5_DOC.TXT37441The MD5 Message-Digest Algorithm
MIMIC_PS.TXT181601Info on MIMIC system (Postscript)
NIST-CRY.TXT346030Public-Key Cryptography (NIST SP 800-2)
NORTONS_.TXT8612Info on Norton Utilities Diskreet program
POLYGONA.TXT8611THE CRYPTOGRAPHIC USES OF POLYGONAL SEQUENCES
RABIN-AL.TXT8111DESCRIPTION OF THE RABIN PUBLIC KEY CRYPTOSYSTEM
RITTER-C.TXT14444Design of Cryptosystem CLOAK
RSAISBRO.TXT12306Public Key Cryptography is Easy to Break
RSA_NEWS.TXT47625CIPHERTEXT, RSA Newsletter, Vol 1, No. 1
SHS_DOC.TXT24687SECURE HASH STANDARD (SHS)
WHY_CRYP.TXT184581Why Cryptosystems Fail (postscript)
CLIPPER.ZIP5990President Clinton Brings Us The CLIPPER Chip, Yeah Boyee!
CRYPT.ZIP3674Simple Cryptology, By A Simple Cryptologist
CRYPTINF.ZIP121826Info On Public Key Encryption From N.I.S.T.
DES.ZIP84828DES Encryption Turbo C Routines
DSS9115.ZIP15240Information On Digital Signature Algorithm (DSA)
MUTATN10.ZIP19735Cryptography For Hackers/Phreakers And Others
NSAPAPER.ZIP9783NSA Papers: Interview W/NSA Concerning Encryption Techniques
ONETIME.ZIP9629One-Time Cypher System For The IBM PC
HANDLES.ZIP14754Anonymity and privacy on the network
NDC5.ZIP3985Crypto program
SKIPJACK.ZIP9690The Skipjack Encryption Algorythm Review
DESBLT.ZIP8872Data Encryption Standard
DESDOC.ZIP8872Data Encryption Standard Fact Sheet
DESVAL.ZIP1563DES Validation List
epw12.zip4959EPW 1.2 EXE & COM File Password Protector
koh101.zip4959KOH Disk Encryption System V1.01
pass.zip3683PassEXe & PassCOM Password Protectors For EXE & COM Files
globs10.zip217512Global Securit 32-bit v1.0 (more secure than PGP?)
hnseek41.zip214108Hide and Seek v4.1 - hides data in .GIF's
puff20.zip368930Puffer v2.0 - Data and Email encryptor for Windoze
stega14.zip14712Steganos v1.4 - Stenographic tools (hide data in img)
attack.txt42820PGP Attack FAQ v2.0
cryptfaq.txt122400Cryptology FAQ v1.0
pgpfaq.txt145330PGP FAQ - very informative - all 3 parts in this file
pgpjump.txt17543PGP Jumpstart Docs - 1 2 3 pgp setup instructions
ppfaq104.txt35664PGP Passphrase FAQ v1.04
rsafaq.txt169559RSA FAQ v2.0 - All 3 parts in this file
secd13c.zip108131SecureDrive V1.3c - create encrypted part. on disk


Furthermore, the Government is in ultra-paranoia mode and I have been forced to not distribute binaries or sources directly from this archive, however you can easily obtain if from the links on our website, which point to the sites of our brothers and sisters in other countries.