Crypt::Random::TESHA2 implements userspace voodoo entropy. You should use a
proper O/S supplied entropy source such as /dev/random or the Win32 Crypt API.
Perl binding to modified RSA library (yamrsa) for encrypting Yandex auth token
This is an implementation of the Automated Password Generator standard,
defined in FIPS Publication 181, "Standard for Automated Password Generator":
This is a pure perl implementation of the new AES Rijndael. You want
to use Crypt::Rijndael where available. This implementation is really
slow, but I am working on it.
bsmtrace is a BSM based intrusion detection system, utilizing audit trails
and real-time audit event analysis through auditpipe(4). This host based
IDS operates using a finite state machine principles with a flexible
sequence driven signature system.
Perl XS interface for a portable traditional crypt function.
This module implements TEA, the Tiny Encryption Algorithm, and some Modes of
Use, in Perl and JavaScript.
The $key is a sufficiently longish string; at least 17 random 8-bit bytes for
single encryption.
Crypt::Tea_JS can be used for secret-key encryption in general, or, in
particular, to communicate securely between browser and web-host. In this case,
the simplest arrangement is for the user to enter the key into a JavaScript
variable, and for the host to retrieve that user's key from a database. Or, for
extra security, the first message (or even each message) between browser and
host could contain a random challenge-string, which each end would then turn
into a signature, and use that signature as the encryption-key for the session
(or the reply).
Crypt::xDBM_File encrypts/decrypts the data in a gdbm, ndbm, sdbm (and
maybe even berkeleyDB, but I didn't test that) file. It gets tied to a
hash and you just access the hash like normal. The crypt function can
be any of the CPAN modules that use encrypt, decrypt, keysize, blocksize
(so Crypt::IDEA, Crypt::DES, Crypt::Blowfish, ... should all work)
***IMPORTANT*** Encryption keys (the key you pass in on the tie line)
will be padded or truncated to fit the keysize(). Data (the key/values of
the hash) is padded to fill complete blocks of blocksize().
The padding is stripped before being returned to the user so you shouldn't
need to worry about it (except truncated keys). Read the doc that comes
with crypt function to get an idea of what these sizes are. If keysize
or blocksize returns a zero the default is set to 8 bytes (64 bits).
The Digest::MD5::M4p module is cloned from the Digest::MD5 module
to support a variant Apple iTunes implementation of the MD5 algorithm.
MD5 sums (see RFC 1321 - The MD5 Message-Digest Algorithm) are used as a
one-way hash of data. Due to the nature of the formula used, it is impossible
to reverse it.
This module provides functions to search several online MD5 hashes database and
return the results (or return undefined if no match found).