Encryption Technologies Index

(Main)
FilenameSizeDescriptionDate
attack.txt42820PGP Attack FAQ v2.01996-02
cryptfaq.txt122400Cryptology FAQ v1.01994
epw12.zip4959EPW 1.2 EXE & COM File Password Protector1987
globs10.zip217512Global Securit 32-bit v1.0 (more secure than PGP?)1995
hnseek41.zip214108Hide and Seek v4.1 - hides data in .GIF's1994
koh101.zip25984KOH Disk Encryption System V1.011993
pass.zip3683PassEXe & PassCOM Password Protectors for EXE & COM Files1995
pgpfaq.txt145330PGP FAQ - very informative - all 3 parts in this file 1995-05-25
pgpjump.txt17543PGP Jumpstart Docs - 1 2 3 pgp setup instructions1996
ppfaq104.txt35664PGP Passphrase FAQ v1.041995-06-16
puff20.zip368930Puffer v2.0 - Data and Email encryptor for Windoze1996
rsafaq.txt169559RSA FAQ v2.0 - All 3 parts in this file1993-09-20
secd13c.zip108131SecureDrive V1.3c - create encrypted part. on disk1994
stega14.zip14712Steganos v1.4 - Stenographic tools (hide data in img)1996-07-10
2XDESFOU.TXT6795Nx2 DES Found Weak1994-02-11
2XISOLAT.TXT102702x Isolated Double-DES: Another Weak Two-Level DES Structure1994-02-16
ANDERSON.TXT72868Anderson's RSA trapdoor can be broken (Postscript file)1991
CFSDRAFT.TXT94180Cryptographic File System (Must run through nroff to read)1993-04-14
CHAUM_DI.TXT34187Unconditional Sender and Recipient Untraceability1988
CLIPPER.ZIP5990President Clinton Brings Us the CLIPPER Chip, Yeah Boyee!1993-04-16
CRYPT.ZIP3674Simple Cryptology, By a Simple Cryptologist1992
CRYPTINF.ZIP121826Info on Public Key Encryption From N.I.S.T.1990-12
CRYPTLES.TXT332312A lesson in Cryptography (Postscript)1991
CRYPTOGR.TXT65831CRYPTOGRAPHY: TRENDS IN TECHNOLOGY AND POLICY1993-12-05
DES.ZIP84828DES Encryption Turbo C Routines1990
DES-BREA.TXT276881Breaking DES (Postscript)1991
DESBLT.ZIP8872Data Encryption Standard1990-06
DESDOC.ZIP8280Data Encryption Standard Fact Sheet1990
DESVAL.ZIP1563DES Validation List1990
DSS9115.ZIP15240Information on Digital Signature Algorithm (DSA)1991
HANDLES.ZIP14754Anonymity and privacy on the network1992
IDEAFAST.TXT9830Speed of DES/IDEA implementations1993-12-07
IDEA_PS.TXT242690Overview of IDEA Encryption Method1992
LADDERBL.TXT4241Large Block DES Newsletter, Vol. I, No. 11994-02-28
LADDERDE.TXT11088Ladder-DES: a Proposed Candidate to Replace DES1994-02-22
MD4_DOC.TXT30512The MD4 Message Digest Algorithm1991-01-09
MD5-CRYP.TXT6026Excerpt from, "Analysis and Design of Cryptographic Hash Func."1993-01
MD5_DOC.TXT37441The MD5 Message-Digest Algorithm1991-07-10
MIMIC_PS.TXT181601Info on MIMIC system (Postscript)1991
MUTATN10.ZIP19735Cryptography for Hackers/Phreakers and Others1991-07-27
NDC5.ZIP3985Crypto program1994
NIST-CRY.TXT346030Public-Key Cryptography (NIST SP 800-2)1991-04
NORTONS_.TXT8612Info on Norton Utilities Diskreet program1993-11-11
NSAPAPER.ZIP9783NSA Papers: Interview W/NSA Concerning Encryption Techniques1992-06
ONETIME.ZIP9629One-Time Cypher System for the IBM PC1993
POLYGONA.TXT8611THE CRYPTOGRAPHIC USES OF POLYGONAL SEQUENCES1991
RABIN-AL.TXT8111DESCRIPTION OF THE RABIN PUBLIC KEY CRYPTOSYSTEM1991-04
RITTER-C.TXT14444Design of Cryptosystem CLOAK1990
RSAISBRO.TXT12306Public Key Cryptography is Easy to Break1994
RSA_NEWS.TXT47625CIPHERTEXT, RSA Newsletter, Vol 1, No. 11993
SHS_DOC.TXT24687SECURE HASH STANDARD (SHS)1992
SKIPJACK.ZIP9690The Skipjack Encryption Algorythm Review1993-07-28
WHY_CRYP.TXT184581Why Cryptosystems Fail (postscript)1991
 

EXPORT WARNING

Files available off of this page are subject to export control. If you reside outside of the United States and Canada and download files in this Export Control area, you will be in violation of ITAR. Using this archive is consent to abide by these regulations. If you reside outside the United States, you can find many of these programs from these sites:

This archive is primarily to serve the North American community until the US regulations catch up with the rest of the world.

 

Return to Main Directory

Return to Hack Canada, Home of this archive.