Crypt/GeneratePassword version 0.02
===================================
This module lets you generate secure random passwords
with a reasonable amount of pronounceability. It avoids
the problems associated with the FIPS-181 NIST standard
as used by Crypt::RandPasswd. See perldoc for more
details.
This module implements a chaining block cipher using a one
way hash. This method of encryption is the same that is
used by radius (RFC2138) and is also described in Applied
Cryptography.
Two interfaces are provided in the module. The first is
straight block encryption/decryption the second does base64
mime encoding/decoding of the encrypted/decrypted blocks.
The idea is the two sides have a shared secret that
supplies one of the keys and a randomly generated block of
bytes provides the second key. The random key is passed in
cleartext between the two sides.
An example client and server are packaged as modules with
this module. They are used in the tests.
This module implements a chaining block cipher using a one
way hash. This method of encryption is the same that is
used by radius (RFC2138) and is also described in Applied
Cryptography.
Two interfaces are provided in the module. The first is
straight block encryption/decryption the second does base64
mime encoding/decoding of the encrypted/decrypted blocks.
The idea is that the two sides have a shared secret that
supplies one of the keys and a randomly generated block of
bytes provides the second key. The random key is passed in
cleartext between the two sides.
An example client and server are packaged as modules with
this module. They are used in the tests.
This is Crypt::NULL. Perl module for NULL Encryption Algorithm.
The NULL Encryption Algorithm is a symmetric block cipher described in
RFC 2410 by Rob Glenn and Stephen Kent.
This module implements NULL encryption. It supports the Crypt::CBC.
This module provides a standard (non-OO) interface to the OpenSSL EC (Elliptic
Curve) library. Some OO Calls are supported.
Most of the functions described in openssl/ec.h are supported.
Loki97 is 128-bit block cipher that accepts a variable-length key. It was
designed by Lawrie Brown, Josef Pieprzyk, and Jennifer Seberry. The default
key length in this implementation is 128 bits. Loki97 was one of the 15
candidates for the AES.
Crypt::OpenSSL::RSA provides the ability to RSA encrypt
strings which are somewhat shorter than the block size of
a key. It also allows for decryption, signatures and
signature verification.
A simple implementation of the RC4 algorithm, developed by RSA
Security, Inc. Here is the description from RSA's website:
RC4 is a stream cipher designed by Rivest for RSA Data Security
(now RSA Security). It is a variable key-size stream cipher with
byte-oriented operations. The algorithm is based on the use of a
random permutation. Analysis shows that the period of the cipher
is overwhelmingly likely to be greater than 10100. Eight to sixteen
machine operations are required per output byte, and the cipher can
be expected to run very quickly in software. Independent analysts
have scrutinized the algorithm and it is considered secure.
Based substantially on the "RC4 in 3 lines of perl" found at
http://www.cypherspace.org
Seamus Venasse <svenasse@polaris.ca>
The axTLS project is an SSL client/server library using the TLSv1
protocol. It is designed to be small and fast, and is suited to
embedded projects. A web server is included.
This is a pure perl implementation of the new AES Rijndael. You want
to use Crypt::Rijndael where available. This implementation is really
slow, but I am working on it.