=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/crypto.html,v retrieving revision 1.41 retrieving revision 1.42 diff -c -r1.41 -r1.42 *** www/crypto.html 1999/10/01 22:46:10 1.41 --- www/crypto.html 1999/10/02 00:28:27 1.42 *************** *** 27,35 ****


-
!
  • Why do we ship cryptography?

    In three words: because we can.

    --- 27,34 ----


    !

    Why do we ship cryptography?

    In three words: because we can.

    *************** *** 68,79 **** Today cryptography is an important means for enhancing the security of an operating system. The ! cryptography utilized in OpenBSD can be classified into three ! different aspects, which will be described later.

    -

    !
  • SSH soon built in

    What is the first thing most people do after installing OpenBSD? They install Secure Shell (ssh) from the ports tree or the packages on --- 67,77 ---- Today cryptography is an important means for enhancing the security of an operating system. The ! cryptography utilized in OpenBSD can be classified into various ! aspects, described as follows.

    !

    SSH soon built in

    What is the first thing most people do after installing OpenBSD? They install Secure Shell (ssh) from the ports tree or the packages on *************** *** 93,99 **** But this way almost everyone will get ssh built-in.

    !

  • Pseudo Random Number Generators

    A Pseudo Random Number Generator (PRNG) provides applications with a stream of numbers which have certain important properties for system security:

    --- 91,97 ---- But this way almost everyone will get ssh built-in.

    !

    Pseudo Random Number Generators

    A Pseudo Random Number Generator (PRNG) provides applications with a stream of numbers which have certain important properties for system security:

    *************** *** 137,143 ****

    !

  • Cryptographic Hash Functions

    A Hash Function compresses its input data to a string of constant size. For a Cryptographic Hash Function it is infeasible to find: --- 135,141 ----

    !

    Cryptographic Hash Functions

    A Hash Function compresses its input data to a string of constant size. For a Cryptographic Hash Function it is infeasible to find: *************** *** 171,177 ****

    !

  • Cryptographic Transforms

    Cryptographic Transforms are used to encrypt and decrypt data. These are normally used with an encryption key for data encryption and with --- 169,175 ----

    !

    Cryptographic Transforms

    Cryptographic Transforms are used to encrypt and decrypt data. These are normally used with an encryption key for data encryption and with *************** *** 207,213 ****

    !

  • International Cryptographers Wanted

    Of course, our project needs people to work on these systems. If any non-American cryptographer who meets the constraints listed earlier is --- 205,211 ----

    !

    International Cryptographers Wanted

    Of course, our project needs people to work on these systems. If any non-American cryptographer who meets the constraints listed earlier is *************** *** 216,222 ****

    !

  • Further Reading

    A number of papers have been written by OpenBSD team members, about cryptographic changes they have done in OpenBSD. The postscript --- 214,220 ----

    !

    Further Reading

    A number of papers have been written by OpenBSD team members, about cryptographic changes they have done in OpenBSD. The postscript *************** *** 234,247 **** slides. -

  • -


    OpenBSD www@openbsd.org
    ! $OpenBSD: crypto.html,v 1.41 1999/10/01 22:46:10 louis Exp $ --- 232,243 ---- slides.


    OpenBSD www@openbsd.org
    ! $OpenBSD: crypto.html,v 1.42 1999/10/02 00:28:27 deraadt Exp $