💾 Archived View for spam.works › mirrors › textfiles › programming › CRYPTOGRAPHY › index.gmi captured on 2023-11-14 at 11:46:46. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2023-06-16)
-=-=-=-=-=-=-
A goal of all communicators, as far back as time records, is to ensure that
those communications reach the right people and don't fall into the hands
of others. To this end, codes and passwords and ciphers have been created
to make it so anyone intercepting a communication is unable to know what the
message is.
This goal has come into the computer era in the form of encrypted e-mail
and secure networking, and the politics that have arisen as a result are
what have brought a strong awareness of government policy and social
change to computing. This directory contains both technical and political
discussions.
Nx2 DES Found Weak by Terry Ritter of Ritter Software Engineering (February 11, 1994)
Patent for Public Key Cryptographic Apparatus and Method
Cryptographic Communications System and Method Patent (RSA)
Exponentiation cryptographic apparatus and method (1984)
Software cryptographic apparatus and method Patent (1985)
A Call to Arms in 1992 to Free Cryptography
Overview of some Basic Cryptographic Schemes
Discussion of How Different Console Systems Handled Encryption
The Telnet Authetication Option with Encryption Draft, from the IETF (July 1992)
Description of a New Variable-Length Key, 64-Bit Block Cipher (Blow Fish) and Bruce Schneier
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability by David Chaum
Computer Ciphering by Steve Harrison of the San Diego IBM PC User SIG
Statement by the White House Announcing the Clipper Chip (April 16, 1993)
Cracking the Code by Mark. D. Uehling
From Crossbows to Cryptography: Thwarting the State Via Technology
Data Encryption Fast and Secure by Harry J. Smith
Simple Cryptography, by a Simple Cryptographer, typed in by Dave Ferret of The Works
Public Key Cryptography, by James Nechvatal of the Security Technology Group (December, 1990)
FAQ: Cryptography FAQ Version 1.0 (January 11, 1994)
Cryptology as defined by Grolier Electronic Publishing
Cryptography Glossary by Timothy C. May
The Rises of Teaching About Computers and the Law
The Crypto Anarchist Manifesto by Timothy C. May
On the Digital Encryption Standard
The Data Encryption Standard Fact Sheet
A Proposed Federal Information Processing Standard for Digital Signature Standard (DSS) (1991)
DOCUMENTATION: Hide and Seek v1.1: Hide Information in GIF Files
A Quick IDEA, was: Speed of DES/IDEA implementations (Cryptography using IDEA) by Bryan Olson
PRESS RELEASE: NIST Proposes Computer Security "Digital Signature" Standard (1991)
Large Block DES Newsletter (Volume 1, Number 1) February 28, 1994, by Terry Ritter
Ladder-DES: A Proposed Candidate to Replace DES by Terry Ritter (February 22, 1994)
How to Legally Circumvent PGP 2.6's Legal Kludge by Paul Elliott (July 19, 1994)
A Software Encryption Function, by Ralph C. Merkle
Eric thinks this new Cryptography scheme sucks
Norton's InDiskreet, by Peter Gutmann (November 11, 1993)
Information about Anonymous & Privacy-Enhanced Posting (November 20, 1992)
NoiseNet Privacy Echo Frequently Asked Questions (March 16th, 1994)
FAQ: alt.security.PGP (December 19th, 1993)
The PGP User's Guide by Philip Zimmermann (May 22, 1994)
The PGP User's Guide Volume II: Special Topics by Philip Zimmerman (May 22, 1994)
FAQ: Frequently Asked Questions: Alt.Security.PGP (May 25, 1995)
FAQ: Alt.Security.PGP (May 25, 1995)
FAQ: Alt.Security.PGP (May 25, 1995) (Part II)
FAQ: Alt.Security.PGP (May 25, 1995) (Part III)
A Pretty Good Privacy Jump Start
The PGP Time Bomb FAQ (August 16, 1994)
The Cryptographic Uses of Polygonal Sequences by C. David Colston
American POW Communication Codes
Description of the Rabin Public Key Cryptosystem (August 24, 1990)
Ciphertext: The RSA Newsletter Volume 1 Number 1 (Fall, 1993)
Public Key Cryptography is Easy to Break by William H. Payne (October 16, 1990)
Information on the Sapphire Stream Cipher, from Michael Johnson (December 10, 1994)
DOCUMENTATION: Secure Drive v1.3c by Edgar Swank
What is Shareware and What is the ASP? by MacGregor K. Phillips (1994)
The Secure Hash Standard by Dennis Branstad of NIST
Simple Data Encryption or Digital Electronics 101 by The leftist
Skipjack Review: The Skipjack Algorithm by Brickell, Denning, Kent, Maher, Tuchman (July 28, 1993)
Technical Information on Validated DES Devices (May 1991)
A Survey of Data Encryption by John A. Thomas
Zimmerman's PGP: A Cure for the Common Code (October 3, 1993)