Authen::PluggableCaptcha is a fully modularized and extensible system for
making Pluggable Catpcha (Completely Automated Public Turing Test to Tell
Computers and Humans Apart) tests.
Pluggable? All Captcha objects are instantiated and interfaced via the main
module, and then manipulated to require various submodules as plug-ins.
Authen::PluggableCaptcha borrows from the functionality in
Apache::Session::Flex
SASL is a generic mechanism for authentication used by several network
protocols. Authen::SASL::Cyrus provides an implementation framework
that all protocols should be able to share.
The XS framework makes calls into the existing libsasl2.so shared
library to perform SASL client connection functionality, including
loading existing shared library mechanisms.
Business::PayPal::EWP - Perl extension for PayPal's Encrypted Website Payments
with Encrypted Web Payments. It contains a single function, SignAndEncrypt
which takes the plaintext form code, private key file, public key file, and
PayPal's public certificate, and will return the signed and encrypted code
needed by paypal.
The dining cryptographers' protocol is documented in Bruce Schneier's book
as a kind of "cryptographic ouija board". It works as follows:
A number of cryptographers are dining at a circular table. At the end of
the meal, the waiter is summoned and asked for the bill. He replies,
"Thank you, sir. The bill has been paid." The cryptographers now have the
problem of working out whether someone at the table paid the bill, or
whether the NSA has paid it as some sort of veiled threat. The protocol
proceeds.
Each cryptographer flips a coin, and shows the result ONLY to the
participant on his RIGHT. Each cryptographer then compares his coin with
that on his LEFT, and raises his hand if they show different faces. If any
participant paid the bill, he "cheats" and does the opposite, that is, he
raises his hand if the coins show the same face. Now, the hands are
counted. An odd number means that someone at the table paid the bill. An
even number means that the NSA paid.
Crypt::OpenPGP is a pure-Perl implementation of the OpenPGP standard[1].
In addition to support for the standard itself, Crypt::OpenPGP claims
compatibility with many other PGP implementations, both those that
support the standard and those that preceded it.
Crypt::OpenPGP provides signing/verification, encryption/decryption,
keyring management, and key-pair generation; in short it should provide
you with everything you need to PGP-enable yourself. Alternatively it can
be used as part of a larger system; for example, perhaps you have a
web-form-to-email generator written in Perl, and you'd like to encrypt
outgoing messages, because they contain sensitive information.
Crypt::OpenPGP can be plugged into such a scenario, given your public
key, and told to encrypt all messages; they will then be readable only by
you.
This module currently supports RSA and DSA for digital signatures, and
RSA and ElGamal for encryption/decryption. It supports the symmetric
ciphers 3DES, Blowfish, IDEA, Twofish, and Rijndael (AES). Rijndael is
supported for key sizes of 128, 192, and 256 bits. Crypt::OpenPGP
supports the digest algorithms MD5, SHA-1, and RIPE-MD/160. And it
supports ZIP and Zlib compression.
Crypt-OpenSSL-CA - Model of an X509v3 Certification Authority
This package performs the cryptographic operations necessary to issue
X509 certificates and certificate revocation lists (CRLs). It is
implemented as a Perl wrapper around the popular OpenSSL library. All
certificate and CRL extensions supported by OpenSSL are available, and
then some.
Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen
as a candidate for the Advanced Encryption Standard. It has been
selected as one of the five finalists in the AES competition.
Serpent is faster than DES and more secure than Triple DES. It
provides users with a very high level of assurance that no shortcut
attack will be found. To achieve this, the algorithm's designers
limited themselves to well understood cryptography mechanisms, so
that they could rely on the wide experience and proven techniques
of block cipher cryptanalysis. The algorithm uses twice as many
rounds as are necessary to block all currently known shortcut
attacks. This means that Serpent should be safe against as yet
unknown attacks that may be capable of breaking the standard 16
rounds used in many types of encryption today. However, the fact
that Serpent uses so many rounds means that it is the slowest of
the five AES finalists. But this shouldn't be an issue because it
still outperforms Triple DES. The algorithm's designers maintain
that Serpent has a service life of at least a century.
This module implements the twofish cipher in a less braindamaged (read:
slow and ugly) way than the existing "Crypt::Twofish" module.
Although it is "Crypt::CBC" compliant you usually gain nothing by using
that module (except generality), since "Crypt::Twofish2" can work in
either ECB or CBC mode.
The chrootuid command combines chroot(8) and su(1) into one program,
so that there is no need to have commands such as /usr/bin/su in the
restricted environment. Access to the file system is restricted to
the newroot subtree and privileges are restricted to those of the
newuser account (which must be a known account in the unrestricted
environment).
See also jail(8)
Network Security Services (NSS) is a set of libraries designed to support
cross-platform development of security-enabled server applications.
Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7,
PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security
standards.