Export Warning

These files are provided for download only to destinations in the United
States of America and Canada, and only to U. S. Citizens, permanent
residents of the United States of America, or Canadian Citizens, as allowed
by current laws in both countries.

If these URLs don't work, please RELOAD THIS PAGE (it changes at least
daily) or go back to the access page.

  ------------------------------------------------------------------------

How to Link

To link to files or directories in this archive, either link to the main
entrance at http://cryptography.org or link to files or directories
directly by appending the path under the changing hidden directory to
http://cryptography.org/cgi-bin/crypto.cgi (for example,
http://cryptography.org/cgi-bin/crypto.cgi/mpj/dlock2.zip links directory
to that file).

  ------------------------------------------------------------------------

The Main Archive

The current URL to the hidden main archive directory is
http://cryptography.org/crypto/9z9Wc2wH/ (or follow one of the links
below).

If you prefer to use ftp instead of http,
ftp://cryptography.org/crypto/9z9Wc2wH/ maps to the same directory.

Directories

   * Blowfish - documentation, sample implementations, and test vectors for
     the Blowfish block cipher.
   * BeOS - cryptographic support for this operating system.
   * Cryptanalysis - crackers for Microsoft Word, PKZIP, etc., plus some
     generally useful information on cracking weakly encrypted files and
     passwords.
   * DES - source code for the NIST Data Encryption Standard in Java, C,
     and assembly.
   * DESX - Algorithm description and sample code for DES eXtended.
   * disk - On-the-fly disk encryption
   * Enigma - Simulation of the Enigma rotor machine cipher.
   * feal - reference code for FEAL
   * file - file encryption utilities
   * FIPS181 - Federal Information Processing Standard 181
   * HASH - MD5, RIPEMD, etc.
   * IDEA - Intenational Data Encryption Algorithm reference source.
   * KerbNet - Kerberos network security implementation.
   * libraries - cryptographic software development libraries
   * Luc - Lucas public key cryptography demo.
   * Mac - CryptDisk, Secure Edit, etc., for the Macintosh
   * Misc - All kinds of interesting unsorted stuff, much of which should
     be in a different directory.
   * mpj - programs and source code written by Michael Paul Johnson
   * Nautilus - Encrypted voice communications software.
   * network - network security software
   * new - stuff that has been uploaded to
     ftp://cryptography.org/pub/incoming that hasn't been sorted, yet.
   * Password_cracking - especially for Unix.
   * pcexpo - some cryptographic files from a PC Expo disk.
   * PEM - Privacy Enhanced Mail
   * pgp - Pretty Good Privacy, the BEST email encryption/signature
     solution
   * pgpfone - Secure voice communications.
   * redoc - C source code.
   * RSA - reference implementations & RSA libraries. (Please observe
     patent restrictions in the USA until September 2000.)
   * SECDRV - Secure Drive and similar on-the-fly disk utilities.
   * SKIP
   * ssh - SSH With Fast x86 DES
   * SSL - Secure Sockets Layer libraries and plug-ins
   * Steg - Steganographic (data hiding) programs

  ------------------------------------------------------------------------

File Encryption

   * 73,911 atbash2.zip Atbash 2 - small, fast DOS program uses Sapphire II
     Stream Cipher and produces voice-readable ciphertext.
   * 176,059 dlock2.zip - This might be the strongest block cipher program
     in this archive. Check it out yourself. Uses the Diamond2 Block
     Cipher. For DOS, Unix, or whatever.
   * 109,692 qcrypt11.zip QuiCrypt - uses the Sapphire II Stream Cipher and
     128-bit keys in the registered, secure mode, and the Sapphire Stream
     Cipher and 40-bit keys in the trial mode.
   * 29,036 qdcrypt.zip Qdcrypt - exportable companion to QuiCrypt and
     Qcrypt that only decrypts those file s. Also includes a way to make a
     self-decrypting executable file to send secure messages to
     correspondents who may not be comfortable with more conventional
     utilities.
   * 12,628 randkey2.zip Random Key generator
   * 135,083 ruby_m5.zip A small hash-style cipher, built for speed and
     small size (not good for a cryptographic hash due to its small 64-bit
     block size)
   * 54,994 sapphire.zip Description of the Sapphire II Stream Cipher and
     cryptographic hash, with source code and working encryption program.

Encryption Algorithm Libraries

   * 78,854 diacrypt.zip 32-bit Delphi components for 10-round Diamond2
     block cipher, the Sapphire II Stream Cipher with feedback, some good
     (pseudo)random number generation tools, and also a CRC-32 unit -- all
     free for the downloading.
   * 176,059 dlock2.zip Code for Diamond2 (128-bit blocks) and Diamond Lite
     (64-bit blocks).
   * 135,083 ruby_m5.zip Small & fast
   * 54,994 sapphire.zip Stream cipher with feedback, also usable as a
     cryptographic hash

KerbNet

This implementation of the Kerberos protocol is available for a variety of
platforms.

Pretty Good Privacy - the best email encryption

Please see Eudora or Network Associates, Inc. for the current latest
official releases, or check the full archive.

Access Control

The CGI program and hidden directory management programs used at this site
are available in noexport.zip for you to use in setting up your own strong
cryptographic software distribution site, if you desire.

Legal Notices

Many of the individual files in this archive are copyrighted, carry
restrictions pertaining to patents, trademarks, export restrictions, or may
even contain trade "secrets." I don't knowingly post anything that I
shouldn't here, but if you find something posted that is not appropriate,
please let me know so that I can remove it. It is your responsibility to
determine what legal restrictions of these may apply to the files and to
comply with them. I claim no "compilation copyright" on this archive, and
you are welcome to mirror or redistribute any or all of this archive as a
Public Domain compilation, subject to the restrictions that may be
documented in the individual packages in this compilation and applicable
law.

[Links to the Holy Bible and lesser things]
