=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/crypto.html,v retrieving revision 1.41 retrieving revision 1.42 diff -c -r1.41 -r1.42 *** www/crypto.html 1999/10/01 22:46:10 1.41 --- www/crypto.html 1999/10/02 00:28:27 1.42 *************** *** 27,35 ****
In three words: because we can.
--- 27,34 ----
In three words: because we can.
*************** *** 68,79 **** Today cryptography is an important means for enhancing the security of an operating system. The ! cryptography utilized in OpenBSD can be classified into three ! different aspects, which will be described later.
-
What is the first thing most people do after installing OpenBSD? They install Secure Shell (ssh) from the ports tree or the packages on --- 67,77 ---- Today cryptography is an important means for enhancing the security of an operating system. The ! cryptography utilized in OpenBSD can be classified into various ! aspects, described as follows.
What is the first thing most people do after installing OpenBSD? They install Secure Shell (ssh) from the ports tree or the packages on *************** *** 93,99 **** But this way almost everyone will get ssh built-in.
A Pseudo Random Number Generator (PRNG) provides applications with a stream of numbers which have certain important properties for system security:
--- 91,97 ---- But this way almost everyone will get ssh built-in.
A Pseudo Random Number Generator (PRNG) provides applications with a stream of numbers which have certain important properties for system security:
*************** *** 137,143 ****
A Hash Function compresses its input data to a string of constant size. For a Cryptographic Hash Function it is infeasible to find: --- 135,141 ----
A Hash Function compresses its input data to a string of constant size. For a Cryptographic Hash Function it is infeasible to find: *************** *** 171,177 ****
Cryptographic Transforms are used to encrypt and decrypt data. These are normally used with an encryption key for data encryption and with --- 169,175 ----
Cryptographic Transforms are used to encrypt and decrypt data. These are normally used with an encryption key for data encryption and with *************** *** 207,213 ****
Of course, our project needs people to work on these systems. If any non-American cryptographer who meets the constraints listed earlier is --- 205,211 ----
Of course, our project needs people to work on these systems. If any non-American cryptographer who meets the constraints listed earlier is *************** *** 216,222 ****
A number of papers have been written by OpenBSD team members, about cryptographic changes they have done in OpenBSD. The postscript --- 214,220 ----
A number of papers have been written by OpenBSD team members, about cryptographic changes they have done in OpenBSD. The postscript *************** *** 234,247 **** slides. - -