This is a pure perl implementation of the new AES Rijndael. You want
to use Crypt::Rijndael where available. This implementation is really
slow, but I am working on it.
bsmtrace is a BSM based intrusion detection system, utilizing audit trails
and real-time audit event analysis through auditpipe(4). This host based
IDS operates using a finite state machine principles with a flexible
sequence driven signature system.
BitDefender Console Antivirus
BeeCrypt is an open source cryptography library that contains highly
optimized C and assembler implementations of many well-known algorithms
including Blowfish, MD5, SHA-1, Diffie-Hellman, and ElGamal. Unlike
some other crypto libraries, BeeCrypt is not designed to solve one
specific problem, like file encryption, but to be a general purpose
toolkit which can be used in a variety of applications.
The BeeCrypt library currently includes:
- Entropy sources for initializing pseudo-random generators
- Pseudo-random generators: FIPS-186, Mersenne Twister
- Block ciphers: Blowfish
- Hash functions: MD5, SHA-1, SHA-256
- Keyed hash functions: MD5/HMAC, SHA-1/HMAC, SHA-256/HMAC
- Multi-precision integer library, with assembler-optimized routines
- Probabilistic primality testing, with optimized small prime trial
division
- Discrete logarithm parameter generation over a prime field
- Diffie-Hellman key agreement
- DHAES encryption scheme
- ElGamal signature scheme (two variants)
- Basic RSA primitives and key pair generation
dehydrated is a pure BASH implementation of the ACME
protocol used by Lets Encrypt.
The single exported subroutine in this module is for generating a salt
suitable for being fed to crypt() and other similar functions.
The Crypt::SaltedHash module provides an object oriented interface to create
salted (or seeded) hashes of clear text data. The original formalization of
this concept comes from RFC-3112 and is extended by the use of different
digital agorithms.
Serpent was designed by Ross Anderson, Eli Biham and Lars Knudsen
as a candidate for the Advanced Encryption Standard. It has been
selected as one of the five finalists in the AES competition.
Serpent is faster than DES and more secure than Triple DES. It
provides users with a very high level of assurance that no shortcut
attack will be found. To achieve this, the algorithm's designers
limited themselves to well understood cryptography mechanisms, so
that they could rely on the wide experience and proven techniques
of block cipher cryptanalysis. The algorithm uses twice as many
rounds as are necessary to block all currently known shortcut
attacks. This means that Serpent should be safe against as yet
unknown attacks that may be capable of breaking the standard 16
rounds used in many types of encryption today. However, the fact
that Serpent uses so many rounds means that it is the slowest of
the five AES finalists. But this shouldn't be an issue because it
still outperforms Triple DES. The algorithm's designers maintain
that Serpent has a service life of at least a century.
Shark is 64-bit block cipher that accepts a 128-bit key. It was
designed by Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon
Bosselaers, and Erik De Win.
The current MD5 module is just a wrapper around the Digest::MD5
module. It is provided so that legacy code that rely on the old
interface still work and get the speed benefit of the new module.