[BACK]Return to crypto.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/crypto.html between version 1.36 and 1.37

version 1.36, 1999/09/22 07:20:19 version 1.37, 1999/09/22 18:33:43
Line 11 
Line 11 
 </head>  </head>
   
 <BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">  <BODY BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#23238E">
   
 <img alt="[OpenBSD]" height=200 width=200 SRC="images/blowfish.jpg">  <img alt="[OpenBSD]" height=200 width=200 SRC="images/blowfish.jpg">
   <p>
   <h2><font color=#e00000>Cryptography</font><hr></h2>
   
 <h3><font color=#e00000><strong>Cryptography</strong></font></h3>  
 <hr>  
   
 <strong>Index</strong><br>  <strong>Index</strong><br>
 <a href=#why>Why do we ship cryptography?</a>.<br>  <a href=#why>Why do we ship cryptography?</a>.<br>
 <a href=#disclosure>Full Disclosure policy</a>.<br>  <a href=#disclosure>Full Disclosure policy</a>.<br>
Line 33 
Line 31 
   
 <dl>  <dl>
 <a name=why></a>  <a name=why></a>
 <li><h3><font color=#e00000><strong>Why do we ship cryptography?</strong></font></h3><p>  <li><h3><font color=#e00000>Why do we ship cryptography?</font></h3><p>
   
 In three words:  <strong>because we can</strong>.<p>  In three words:  <strong>because we can</strong>.<p>
   
Line 77 
Line 75 
   
 <p>  <p>
 <a name=prng></a>  <a name=prng></a>
 <li><h3><font color=#e00000><strong>Pseudo Random Number Generators</strong></font></h3><p>  <li><h3><font color=#e00000>Pseudo Random Number Generators</font></h3><p>
   
 A Pseudo Random Number Generator (PRNG) provides applications with a stream of  A Pseudo Random Number Generator (PRNG) provides applications with a stream of
 numbers which have certain important properties for system security:<p>  numbers which have certain important properties for system security:<p>
Line 121 
Line 119 
   
 <p>  <p>
 <a name=hash></a>  <a name=hash></a>
 <li><h3><font color=#e00000><strong>Cryptographic Hash Functions</strong></font></h3><p>  <li><h3><font color=#e00000>Cryptographic Hash Functions</font></h3><p>
   
 A Hash Function compresses its input data to a string of  A Hash Function compresses its input data to a string of
 constant size. For a Cryptographic Hash Function it is infeasible to find:  constant size. For a Cryptographic Hash Function it is infeasible to find:
Line 155 
Line 153 
   
 <p>  <p>
 <a name=trans></a>  <a name=trans></a>
 <li><h3><font color=#e00000><strong>Cryptographic Transforms</strong></font></h3><p>  <li><h3><font color=#e00000>Cryptographic Transforms</font></h3><p>
   
 Cryptographic Transforms are used to encrypt and decrypt data. These  Cryptographic Transforms are used to encrypt and decrypt data. These
 are normally used with an encryption key for data encryption and with  are normally used with an encryption key for data encryption and with
Line 191 
Line 189 
   
 <p>  <p>
 <a name=people></a>  <a name=people></a>
 <li><h3><font color=#e00000><strong>International Cryptographers Wanted</strong></font></h3><p>  <li><h3><font color=#e00000>International Cryptographers Wanted</font></h3><p>
   
 Of course, our project needs people to work on these systems.  If any  Of course, our project needs people to work on these systems.  If any
 non-American cryptographer who meets the constraints listed earlier is  non-American cryptographer who meets the constraints listed earlier is
Line 200 
Line 198 
   
 <p>  <p>
 <a name=papers></a>  <a name=papers></a>
 <li><h3><font color=#e00000><strong>Further Reading</strong></font></h3><p>  <li><h3><font color=#e00000>Further Reading</font></h3><p>
   
 A number of papers have been written by OpenBSD team members, about  A number of papers have been written by OpenBSD team members, about
 cryptographic changes they have done in OpenBSD.  The postscript  cryptographic changes they have done in OpenBSD.  The postscript

Legend:
Removed from v.1.36  
changed lines
  Added in v.1.37