Ciphers Algorithms Cryptography Communication Theory


Contains source code in C for this stream cipher which uses 160 to 2048-bit keys. Short keys are fast on 32-bit processors.








    Top: Science: Math: Applications: Communication Theory: Cryptography: Algorithms: Ciphers

  • CAST 128 Block Cipher - A text-file specification for CAST-128, a freely available cryptography 128-bit block algorithms cipher.
  • FastFlex : A Secure Cryptographic Function - Sourceforge project for FastFlex, a suite of hash cryptography functions and cryptography stream ciphers. Links to documentation and cryptography source code.
  • The CARACACHS Stream Cipher - Contains source code in C for this stream algorithms cipher which cryptography uses 160 to 2048-bit keys. algorithms Short keys are fast cryptography on 32-bit processors.
  • IBM's MARS Block Cipher. - The company\\'s AES proposal using 128 bit blocks. cryptography Contains descriptions, ciphers pseudocode and test vectors.
  • Zodiac Killer Ciphers - The Zodiac Killer terrorized the San Francisco Bay ciphers area in the 1960s and 70s and claimed ciphers to have killed over 30 people. This site ciphers discusses the unsolved cipher messages linked with the ciphers killings.
  • Rabbit Stream Cipher - The Rabbit stream cipher was developed by CRYPTICO A/S in Denmark. It runs in synchronous mode, uses a 128-bit key, and 513 bits of state data. This PDF file includes C source code for Rabbit.[PDF]
  • SN3 Stream Cipher - SN3 is a stream cipher designed by Simeon Maltchev. Somewhat ciphers like ISAAC, it uses three constantly evolving blocks of state ciphers data which update each other. The C source code for ciphers SN3 is also provided.
  • TEA - a Tiny Encryption Algorithm - TEA is a very small, efficient algorithm offering algorithms a moderate cryptography level of security
  • Camellia - Information about the block cipher jointly developed by ciphers NTT and cryptography Mitsubishi Electric in Japan in 2000. ciphers C source code is cryptography also provided.
  • ISAAC - a fast cryptographic random number generator - A stream cipher developed by Robert Jenkins. It cryptography was inspired cryptography by RC4.
  • BMGL: Synchronous Key-stream Generator - Describes the BMGL stream cipher developed by Johan Hastad of the Royal Inst. of Technology and Mats Naslund of Ericsson Research in Sweden. BMGL, like Snow2, uses features of the Rijndael cipher. Source code is not available here.[PDF]
  • Konton2: A Stream Cipher - Konton2 is a stream cipher which does not algorithms resemble RC4 and does not use shift registers. algorithms The C source code for Konton2 is provided.
  • Noekeon block cipher - A block cipher with a block length and a key cryptography length of 128 bits.
  • The Mugi Stream Cipher - Describes the MUGI stream cipher developed at Hitachi. algorithms MUGI is similar to, and based on, Panama. algorithms The link here is to the English home algorithms page of the MUGI site. Source code is algorithms not available at this site.
  • German Enigma Cipher - Description and examples of the enigma cipher.
  • The Snow Stream Cipher - Describes the Snow stream cipher: both Snow 1.0 submitted to cryptography the NESSIE project and Snow 2.0. Snow is the work cryptography of Patrik Ekdahl and Thomas Johansson of the I.T. Dept. cryptography at Lund Univ., Sweden. The C source code for Snow cryptography is also provided.
  • Rail Fence Cipher - Description and examples of rail fence ciphers.
  • Helix Stream Cipher - Document describes the Helix stream cipher, devised by Niels Ferguson, ciphers Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, and Tadayoshi ciphers Kohno. The cipher produces a MAC for every plaintext it ciphers encrypts. Source code is not included in this document, b[PDF]
  • Serpent Block Cipher Homepage - Describes the 128-bit block cipher designed to replace cryptography DES. It algorithms was a finalist in the AES cryptography competition.
  • RC6 Home at RSA - Block cipher proposed by RSA as an AES candidate.
  • Twofish - A freely available 128-bit block cipher designed by algorithms Counterpane Systems (Bruce Schneier et al.).
  • Sosemanuk Stream Cipher - Sosemanuk borrows features of the Snow stream cipher cryptography and the algorithms Serpent block cipher. The C source cryptography code for the cipher algorithms is available from the cryptography Ecrypt site.[PDF]
  • Scream: A Software Efficient Stream Cipher - Describes the Scream stream cipher developed at IBM cryptography by Shai algorithms Halevi, Don Coppersmith, and Charanjit Jutla. cryptography Scream is based on algorithms SEAL. Source code is cryptography not available here.[PDF]
  • Hiji Bij Bij - Describes a stream cipher devised by Palash Sarkar ciphers and the cryptography Cryptology Research Group at the India ciphers Statistical Institute. Like many cryptography new stream ciphers, it ciphers has two parts to its state, cryptography one part ciphers updated linearly and one part updated non-linearly. The cryptography ciphers linear p
  • AES Algorithm (Rijndael) Information - This is NIST\\'s home page for the Rijndael cryptography block cipher, ciphers now the Advanced Encryption Standard (AES). cryptography It has links to ciphers the specification and source cryptography code.
  • CS2 Block Cipher - This PDF document describes to CS2 block cipher developed by algorithms Tom St Denis. CS2 is based on the CS cipher algorithms developed by Serge Vaudenay and takes advantage of work St algorithms Denis has done on the pseudo-Hadamard transform. Source code is algorithms not included, but test vect[PDF]
  • Anubis Block Cipher web site - Describes the 128-bit variable-length key NESSIE candidate. The ciphers C source code is available here.
  • HC-256 Stream Cipher - HC-256 is a stream cipher developed by Hongjun algorithms Wu at cryptography the Institute for Infocomm Research in algorithms Singapore. It uses a cryptography very large state data algorithms set which it updates and reads cryptography from pseudo-randomly. algorithms It seems similar in basic design to SN3 cryptography algorithms and also borrows some ideas[PDF]
  • VMPC function and stream cipher - Describes the VMPC one-way function and a stream cryptography cipher based on it, designed by Bartosz cryptography Zoltak. Pseudo code and test-vectors are available here. cryptography The algorithm is similar to RC4 and cryptography VERY simple.
  • Khazad Block Cipher web site - Describes the 64-bit block cipher, 128-bit key NESSIE cryptography finalist.
  • The Blowfish Encryption Algorithm - A freely available symmetric block cipher designed by cryptography Bruce Schneier algorithms as a drop-in replacement for DES cryptography or IDEA. Allows variable-length algorithms keys up to 448 cryptography bits.


   MySQL - Cache Direct


  
Twitter