[BACK]Return to crypto.html CVS log [TXT][DIR] Up to [local] / www

Diff for /www/crypto.html between version 1.41 and 1.42

version 1.41, 1999/10/01 22:46:10 version 1.42, 1999/10/02 00:28:27
Line 27 
Line 27 
 <p>  <p>
 <hr>  <hr>
   
 <dl>  
 <a name=why></a>  <a name=why></a>
 <li><h3><font color=#e00000>Why do we ship cryptography?</font></h3><p>  <h3><font color=#e00000>Why do we ship cryptography?</font></h3><p>
   
 In three words:  <strong>because we can</strong>.<p>  In three words:  <strong>because we can</strong>.<p>
   
Line 68 
Line 67 
   
 Today cryptography is an important means for enhancing the <a  Today cryptography is an important means for enhancing the <a
 href=security.html>security</a> of an operating system.  The  href=security.html>security</a> of an operating system.  The
 cryptography utilized in OpenBSD can be classified into three  cryptography utilized in OpenBSD can be classified into various
 different aspects, which will be described later.<p>  aspects, described as follows.<p>
   
 <dl>  
 <a name=ssh></a>  <a name=ssh></a>
 <li><h3><font color=#e00000>SSH soon built in</font></h3><p>  <h3><font color=#e00000>SSH soon built in</font></h3><p>
   
 What is the first thing most people do after installing OpenBSD?  What is the first thing most people do after installing OpenBSD?
 They install Secure Shell (ssh) from the ports tree or the packages on  They install Secure Shell (ssh) from the ports tree or the packages on
Line 93 
Line 91 
 But this way almost everyone will get ssh built-in.<p>  But this way almost everyone will get ssh built-in.<p>
   
 <a name=prng></a>  <a name=prng></a>
 <li><h3><font color=#e00000>Pseudo Random Number Generators</font></h3><p>  <h3><font color=#e00000>Pseudo Random Number Generators</font></h3><p>
   
 A Pseudo Random Number Generator (PRNG) provides applications with a stream of  A Pseudo Random Number Generator (PRNG) provides applications with a stream of
 numbers which have certain important properties for system security:<p>  numbers which have certain important properties for system security:<p>
Line 137 
Line 135 
   
 <p>  <p>
 <a name=hash></a>  <a name=hash></a>
 <li><h3><font color=#e00000>Cryptographic Hash Functions</font></h3><p>  <h3><font color=#e00000>Cryptographic Hash Functions</font></h3><p>
   
 A Hash Function compresses its input data to a string of  A Hash Function compresses its input data to a string of
 constant size. For a Cryptographic Hash Function it is infeasible to find:  constant size. For a Cryptographic Hash Function it is infeasible to find:
Line 171 
Line 169 
   
 <p>  <p>
 <a name=trans></a>  <a name=trans></a>
 <li><h3><font color=#e00000>Cryptographic Transforms</font></h3><p>  <h3><font color=#e00000>Cryptographic Transforms</font></h3><p>
   
 Cryptographic Transforms are used to encrypt and decrypt data. These  Cryptographic Transforms are used to encrypt and decrypt data. These
 are normally used with an encryption key for data encryption and with  are normally used with an encryption key for data encryption and with
Line 207 
Line 205 
   
 <p>  <p>
 <a name=people></a>  <a name=people></a>
 <li><h3><font color=#e00000>International Cryptographers Wanted</font></h3><p>  <h3><font color=#e00000>International Cryptographers Wanted</font></h3><p>
   
 Of course, our project needs people to work on these systems.  If any  Of course, our project needs people to work on these systems.  If any
 non-American cryptographer who meets the constraints listed earlier is  non-American cryptographer who meets the constraints listed earlier is
Line 216 
Line 214 
   
 <p>  <p>
 <a name=papers></a>  <a name=papers></a>
 <li><h3><font color=#e00000>Further Reading</font></h3><p>  <h3><font color=#e00000>Further Reading</font></h3><p>
   
 A number of papers have been written by OpenBSD team members, about  A number of papers have been written by OpenBSD team members, about
 cryptographic changes they have done in OpenBSD.  The postscript  cryptographic changes they have done in OpenBSD.  The postscript
Line 233 
Line 231 
     <a href=papers/crypt-paper.ps>paper</a> and      <a href=papers/crypt-paper.ps>paper</a> and
     <a href=papers/crypt-slides.ps>slides</a>.      <a href=papers/crypt-slides.ps>slides</a>.
 </ul>  </ul>
   
 </dl>  
   
 <p>  <p>
 <hr>  <hr>

Legend:
Removed from v.1.41  
changed lines
  Added in v.1.42