Encryption Technologies Index |
![]() |
Filename | Size | Description | Date | |
---|---|---|---|---|
![]() | attack.txt | 42820 | PGP Attack FAQ v2.0 | 1996-02 |
![]() | cryptfaq.txt | 122400 | Cryptology FAQ v1.0 | 1994 |
![]() | epw12.zip | 4959 | EPW 1.2 EXE & COM File Password Protector | 1987 |
![]() | globs10.zip | 217512 | Global Securit 32-bit v1.0 (more secure than PGP?) | 1995 |
![]() | hnseek41.zip | 214108 | Hide and Seek v4.1 - hides data in .GIF's | 1994 |
![]() | koh101.zip | 25984 | KOH Disk Encryption System V1.01 | 1993 |
![]() | pass.zip | 3683 | PassEXe & PassCOM Password Protectors for EXE & COM Files | 1995 |
![]() | pgpfaq.txt | 145330 | PGP FAQ - very informative - all 3 parts in this file | 1995-05-25 |
![]() | pgpjump.txt | 17543 | PGP Jumpstart Docs - 1 2 3 pgp setup instructions | 1996 |
![]() | ppfaq104.txt | 35664 | PGP Passphrase FAQ v1.04 | 1995-06-16 |
![]() | puff20.zip | 368930 | Puffer v2.0 - Data and Email encryptor for Windoze | 1996 |
![]() | rsafaq.txt | 169559 | RSA FAQ v2.0 - All 3 parts in this file | 1993-09-20 |
![]() | secd13c.zip | 108131 | SecureDrive V1.3c - create encrypted part. on disk | 1994 |
![]() | stega14.zip | 14712 | Steganos v1.4 - Stenographic tools (hide data in img) | 1996-07-10 |
![]() | 2XDESFOU.TXT | 6795 | Nx2 DES Found Weak | 1994-02-11 |
![]() | 2XISOLAT.TXT | 10270 | 2x Isolated Double-DES: Another Weak Two-Level DES Structure | 1994-02-16 |
![]() | ANDERSON.TXT | 72868 | Anderson's RSA trapdoor can be broken (Postscript file) | 1991 |
![]() | CFSDRAFT.TXT | 94180 | Cryptographic File System (Must run through nroff to read) | 1993-04-14 |
![]() | CHAUM_DI.TXT | 34187 | Unconditional Sender and Recipient Untraceability | 1988 |
![]() | CLIPPER.ZIP | 5990 | President Clinton Brings Us the CLIPPER Chip, Yeah Boyee! | 1993-04-16 |
![]() | CRYPT.ZIP | 3674 | Simple Cryptology, By a Simple Cryptologist | 1992 |
![]() | CRYPTINF.ZIP | 121826 | Info on Public Key Encryption From N.I.S.T. | 1990-12 |
![]() | CRYPTLES.TXT | 332312 | A lesson in Cryptography (Postscript) | 1991 |
![]() | CRYPTOGR.TXT | 65831 | CRYPTOGRAPHY: TRENDS IN TECHNOLOGY AND POLICY | 1993-12-05 |
![]() | DES.ZIP | 84828 | DES Encryption Turbo C Routines | 1990 |
![]() | DES-BREA.TXT | 276881 | Breaking DES (Postscript) | 1991 |
![]() | DESBLT.ZIP | 8872 | Data Encryption Standard | 1990-06 |
![]() | DESDOC.ZIP | 8280 | Data Encryption Standard Fact Sheet | 1990 |
![]() | DESVAL.ZIP | 1563 | DES Validation List | 1990 |
![]() | DSS9115.ZIP | 15240 | Information on Digital Signature Algorithm (DSA) | 1991 |
![]() | HANDLES.ZIP | 14754 | Anonymity and privacy on the network | 1992 |
![]() | IDEAFAST.TXT | 9830 | Speed of DES/IDEA implementations | 1993-12-07 |
![]() | IDEA_PS.TXT | 242690 | Overview of IDEA Encryption Method | 1992 |
![]() | LADDERBL.TXT | 4241 | Large Block DES Newsletter, Vol. I, No. 1 | 1994-02-28 |
![]() | LADDERDE.TXT | 11088 | Ladder-DES: a Proposed Candidate to Replace DES | 1994-02-22 |
![]() | MD4_DOC.TXT | 30512 | The MD4 Message Digest Algorithm | 1991-01-09 |
![]() | MD5-CRYP.TXT | 6026 | Excerpt from, "Analysis and Design of Cryptographic Hash Func." | 1993-01 |
![]() | MD5_DOC.TXT | 37441 | The MD5 Message-Digest Algorithm | 1991-07-10 |
![]() | MIMIC_PS.TXT | 181601 | Info on MIMIC system (Postscript) | 1991 |
![]() | MUTATN10.ZIP | 19735 | Cryptography for Hackers/Phreakers and Others | 1991-07-27 |
![]() | NDC5.ZIP | 3985 | Crypto program | 1994 |
![]() | NIST-CRY.TXT | 346030 | Public-Key Cryptography (NIST SP 800-2) | 1991-04 |
![]() | NORTONS_.TXT | 8612 | Info on Norton Utilities Diskreet program | 1993-11-11 |
![]() | NSAPAPER.ZIP | 9783 | NSA Papers: Interview W/NSA Concerning Encryption Techniques | 1992-06 |
![]() | ONETIME.ZIP | 9629 | One-Time Cypher System for the IBM PC | 1993 |
![]() | POLYGONA.TXT | 8611 | THE CRYPTOGRAPHIC USES OF POLYGONAL SEQUENCES | 1991 |
![]() | RABIN-AL.TXT | 8111 | DESCRIPTION OF THE RABIN PUBLIC KEY CRYPTOSYSTEM | 1991-04 |
![]() | RITTER-C.TXT | 14444 | Design of Cryptosystem CLOAK | 1990 |
![]() | RSAISBRO.TXT | 12306 | Public Key Cryptography is Easy to Break | 1994 |
![]() | RSA_NEWS.TXT | 47625 | CIPHERTEXT, RSA Newsletter, Vol 1, No. 1 | 1993 |
![]() | SHS_DOC.TXT | 24687 | SECURE HASH STANDARD (SHS) | 1992 |
![]() | SKIPJACK.ZIP | 9690 | The Skipjack Encryption Algorythm Review | 1993-07-28 |
![]() | WHY_CRYP.TXT | 184581 | Why Cryptosystems Fail (postscript) | 1991 |
This archive is primarily to serve the North American community until the US regulations catch up with the rest of the world.
Return to Main Directory
Return to Hack Canada, Home of this archive.