A goal of all communicators, as far back as time records, is to ensure that those communications reach the right people and don't fall into the hands of others. To this end, codes and passwords and ciphers have been created to make it so anyone intercepting a communication is unable to know what the message is.
This goal has come into the computer era in the form of encrypted e-mail and secure networking, and the politics that have arisen as a result are what have brought a strong awareness of government policy and social change to computing. This directory contains both technical and political discussions.
Filename |
Size |
Description of the Textfile |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
2xdesfou.txt 6795 | Nx2 DES Found Weak by Terry Ritter of Ritter Software Engineering (February 11, 1994)
| 2xisolat.txt | 10270 | 2x Isolated Double-DES: Another Weak Two-Level DES Structure, by Terry Ritter of Ritter Software Engineering (February 16, 1994)
| 4212582_.par | 19559 | Patent for Public Key Cryptographic Apparatus and Method
| 4405829.riv | 94246 | Cryptographic Communications System and Method Patent (RSA)
| 4424414.hel | 31340 | Exponentiation cryptographic apparatus and method (1984)
| 4562305.gaf | 19925 | Software cryptographic apparatus and method Patent (1985)
| a-crypt.txt | 23673 | A Call to Arms in 1992 to Free Cryptography
| arrl.txt | 19296 | Overview of some Basic Cryptographic Schemes
| atalynx.txt | 9546 | Discussion of How Different Console Systems Handled Encryption
| authenc.txt | 16951 | The Telnet Authetication Option with Encryption Draft, from the IETF (July 1992)
| blowfish.cry | 31630 | Description of a New Variable-Length Key, 64-Bit Block Cipher (Blow Fish) and Bruce Schneier
| breaking.des | 11261 | Is DES Breakable?
| chaum_di.txt | 34187 | The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability by David Chaum
| cipher1.txt | 4374 | Computer Ciphering by Steve Harrison of the San Diego IBM PC User SIG
| clipper.txt | 12777 | Statement by the White House Announcing the Clipper Chip (April 16, 1993)
| code.txt | 17664 | Cracking the Code by Mark. D. Uehling
| crossbow | 29200 | From Crossbows to Cryptography: Thwarting the State Via Technology
| cryp.txt | 16213 | Data Encryption Fast and Secure by Harry J. Smith
| crypt.pri | 15965 | Simple Cryptography, by a Simple Cryptographer, typed in by Dave Ferret of The Works
| crypt.txt | 345988 | Public Key Cryptography, by James Nechvatal of the Security Technology Group (December, 1990)
| cryptfaq.txt | 122400 | FAQ: Cryptography FAQ Version 1.0 (January 11, 1994)
| cryptloj.txt | 12468 | Cryptology as defined by Grolier Electronic Publishing
| crypto.dic | 28115 | Cryptography Glossary by Timothy C. May
| crypto.tch | 12795 | The Rises of Teaching About Computers and the Law
| cryptogr.txt | 65831 | Cryptography: Trends in Techology and Policy, by Hoffman, Ali, Heckler, and Huybrechts (December 5, 1993)
| cryptoma | 3925 | The Crypto Anarchist Manifesto by Timothy C. May
| cryptprg.txt | 346781 | Public Key Cryptography, by James Nechvatal of National Institute of Standards and Technology (December 1990)
| des.txt | 23285 | On the Digital Encryption Standard
| des_nist.txt | 22446 | The Data Encryption Standard Fact Sheet
| dss.txt | 34816 | A Proposed Federal Information Processing Standard for Digital Signature Standard (DSS) (1991)
| hideseek.txt | 8685 | DOCUMENTATION: Hide and Seek v1.1: Hide Information in GIF Files
| ideafast.txt | 9830 | A Quick IDEA, was: Speed of DES/IDEA implementations (Cryptography using IDEA) by Bryan Olson
| intro.txt | 2669 | PRESS RELEASE: NIST Proposes Computer Security "Digital Signature" Standard (1991)
| ladderbl.txt | 4241 | Large Block DES Newsletter (Volume 1, Number 1) February 28, 1994, by Terry Ritter
| ladderde.txt | 11088 | Ladder-DES: A Proposed Candidate to Replace DES by Terry Ritter (February 22, 1994)
| legal_kl.txt | 4095 | How to Legally Circumvent PGP 2.6's Legal Kludge by Paul Elliott (July 19, 1994)
| merkle.txt | 85054 | A Software Encryption Function, by Ralph C. Merkle
| mutation.txt | 20015 | DOCUMENTATION: MUTATi0N: Cryptography for Hackers/Phreakers & Others Version 1.1 by Professor Falken (July 27, 1991)
| ncsatelnpw.hac | 4683 | Eric thinks this new Cryptography scheme sucks
| nist-cry.txt | 346030 | Public-Key Cryptography: NIST Special Publication 800-2 by James Nechvatal of the Security Technology Group (April 1991)
| nortons_.txt | 8612 | Norton's InDiskreet, by Peter Gutmann (November 11, 1993)
| nsapaper.txt | 23411 | Written Response from the NSA Regarding Cyptography, by Joe Abernathy of the Houston Chronicle (June 10, 1992)
| pax.inf | 14112 | Information about Anonymous & Privacy-Enhanced Posting (November 20, 1992)
| pfaq.asc | 8565 | NoiseNet Privacy Echo Frequently Asked Questions (March 16th, 1994)
| pgp.faq | 84116 | FAQ: alt.security.PGP (December 19th, 1993)
| pgp20faq.txt | 9349 | FAQ: PGP Faq
| pgp26mit.txt | 15265 | Questions and Answers about MIT's Release of PGP 2.6 by Hal Abelson, Jeff Schiller, Brian LaMacchia, and Derek Atkins (June 2, 1994)
| pgpdoc1.txt | 81069 | The PGP User's Guide by Philip Zimmermann (May 22, 1994)
| pgpdoc2.txt | 118436 | The PGP User's Guide Volume II: Special Topics by Philip Zimmerman (May 22, 1994)
| pgpfaq.txt | 145330 | FAQ: Frequently Asked Questions: Alt.Security.PGP (May 25, 1995)
| pgpfaq1.txt | 34361 | FAQ: Alt.Security.PGP (May 25, 1995)
| pgpfaq2.txt | 54914 | FAQ: Alt.Security.PGP (May 25, 1995) (Part II)
| pgpfaq3.txt | 56055 | FAQ: Alt.Security.PGP (May 25, 1995) (Part III)
| pgpjump.txt | 17543 | A Pretty Good Privacy Jump Start
| pgptb.txt | 22579 | The PGP Time Bomb FAQ (August 16, 1994)
| polygona.txt | 8611 | The Cryptographic Uses of Polygonal Sequences by C. David Colston
| pow_code.txt | 9912 | American POW Communication Codes
| rabin-al.txt | 8111 | Description of the Rabin Public Key Cryptosystem (August 24, 1990)
| rsa_news.txt | 47625 | Ciphertext: The RSA Newsletter Volume 1 Number 1 (Fall, 1993)
| rsafaq.txt | 169559 | FAQ: Frequently Asked QUestions about Today's Cryptography by Paul Fahn of RSA Laboratories (September 20, 1993)
| rsaisbro.txt | 12306 | Public Key Cryptography is Easy to Break by William H. Payne (October 16, 1990)
| sapphire.txt | 20404 | Information on the Sapphire Stream Cipher, from Michael Johnson (December 10, 1994)
| secdrv.txt | 40944 | DOCUMENTATION: Secure Drive v1.3c by Edgar Swank
| shr_ware.txt | 28061 | What is Shareware and What is the ASP? by MacGregor K. Phillips (1994)
| shs_doc.txt | 24687 | The Secure Hash Standard by Dennis Branstad of NIST
| simpcryp.txt | 4719 | Simple Data Encryption or Digital Electronics 101 by The leftist
| skipjack.txt | 27131 | Skipjack Review: The Skipjack Algorithm by Brickell, Denning, Kent, Maher, Tuchman (July 28, 1993)
| techdes.txt | 42290 | Technical Information on Validated DES Devices (May 1991)
| theory.des | 72211 | A Survey of Data Encryption by John A. Thomas
| ww_pgp_a.txt | 29669 | Zimmerman's PGP: A Cure for the Common Code (October 3, 1993)
| zimmerma.txt | 14505 | The Testimony of Philip Zimmermann to the Subcommittee for Economic Policy, Trade, and the Environment (October 12, 1993)
| |
There are 71 files for a total of 3,194,574 bytes. |