version 1.36, 1999/09/22 07:20:19 |
version 1.37, 1999/09/22 18:33:43 |
|
|
</head> |
</head> |
|
|
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E"> |
<BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E"> |
|
|
<img alt="[OpenBSD]" height=200 width=200 SRC="images/blowfish.jpg"> |
<img alt="[OpenBSD]" height=200 width=200 SRC="images/blowfish.jpg"> |
|
<p> |
|
<h2><font color=#e00000>Cryptography</font><hr></h2> |
|
|
<h3><font color=#e00000><strong>Cryptography</strong></font></h3> |
|
<hr> |
|
|
|
<strong>Index</strong><br> |
<strong>Index</strong><br> |
<a href=#why>Why do we ship cryptography?</a>.<br> |
<a href=#why>Why do we ship cryptography?</a>.<br> |
<a href=#disclosure>Full Disclosure policy</a>.<br> |
<a href=#disclosure>Full Disclosure policy</a>.<br> |
|
|
|
|
<dl> |
<dl> |
<a name=why></a> |
<a name=why></a> |
<li><h3><font color=#e00000><strong>Why do we ship cryptography?</strong></font></h3><p> |
<li><h3><font color=#e00000>Why do we ship cryptography?</font></h3><p> |
|
|
In three words: <strong>because we can</strong>.<p> |
In three words: <strong>because we can</strong>.<p> |
|
|
|
|
|
|
<p> |
<p> |
<a name=prng></a> |
<a name=prng></a> |
<li><h3><font color=#e00000><strong>Pseudo Random Number Generators</strong></font></h3><p> |
<li><h3><font color=#e00000>Pseudo Random Number Generators</font></h3><p> |
|
|
A Pseudo Random Number Generator (PRNG) provides applications with a stream of |
A Pseudo Random Number Generator (PRNG) provides applications with a stream of |
numbers which have certain important properties for system security:<p> |
numbers which have certain important properties for system security:<p> |
|
|
|
|
<p> |
<p> |
<a name=hash></a> |
<a name=hash></a> |
<li><h3><font color=#e00000><strong>Cryptographic Hash Functions</strong></font></h3><p> |
<li><h3><font color=#e00000>Cryptographic Hash Functions</font></h3><p> |
|
|
A Hash Function compresses its input data to a string of |
A Hash Function compresses its input data to a string of |
constant size. For a Cryptographic Hash Function it is infeasible to find: |
constant size. For a Cryptographic Hash Function it is infeasible to find: |
|
|
|
|
<p> |
<p> |
<a name=trans></a> |
<a name=trans></a> |
<li><h3><font color=#e00000><strong>Cryptographic Transforms</strong></font></h3><p> |
<li><h3><font color=#e00000>Cryptographic Transforms</font></h3><p> |
|
|
Cryptographic Transforms are used to encrypt and decrypt data. These |
Cryptographic Transforms are used to encrypt and decrypt data. These |
are normally used with an encryption key for data encryption and with |
are normally used with an encryption key for data encryption and with |
|
|
|
|
<p> |
<p> |
<a name=people></a> |
<a name=people></a> |
<li><h3><font color=#e00000><strong>International Cryptographers Wanted</strong></font></h3><p> |
<li><h3><font color=#e00000>International Cryptographers Wanted</font></h3><p> |
|
|
Of course, our project needs people to work on these systems. If any |
Of course, our project needs people to work on these systems. If any |
non-American cryptographer who meets the constraints listed earlier is |
non-American cryptographer who meets the constraints listed earlier is |
|
|
|
|
<p> |
<p> |
<a name=papers></a> |
<a name=papers></a> |
<li><h3><font color=#e00000><strong>Further Reading</strong></font></h3><p> |
<li><h3><font color=#e00000>Further Reading</font></h3><p> |
|
|
A number of papers have been written by OpenBSD team members, about |
A number of papers have been written by OpenBSD team members, about |
cryptographic changes they have done in OpenBSD. The postscript |
cryptographic changes they have done in OpenBSD. The postscript |