ecrypto /

Filename Size Date modified Message
0 B
7.2 KB
1.2 KB
2.1 KB
106 B
4.0 KB
24.5 KB
11.9 KB
8.6 KB
2.6 KB
8.4 KB
1.9 KB
16.3 KB
8.5 KB
2.1 KB
488 B
3.1 KB
6.3 KB
4.5 KB
3.6 KB
27.6 KB
6.4 KB
15.0 KB
this is the Ecrypto library, a group of files implementing strong
crypto in elisp.  it is made up of the following:

idea.el
  this file contains the code for the IDEA cipher.  it is reasonably
  secure, in terms of cleaning up intermediate computations.  the
  functions in it operate on 16-bit vectors.  CBC and a CBC-based
  package transform are provided.  XEmacs: this file was removed due
  to supposed patent problems.

md5.el, md5-old.el, sha1.el, sha1-old.el
  code for the MD5 and SHA-1 hash algorithms.  md5.el and sha1.el are
  the actual implementations, geared towards speed and data security
  (ie, wiping possibly sensitive data).  both files have to be
  compiled before being loaded.  md5-old.el and sha1-old.el are
  the original implementations, much more readable, less optimized,
  but slower and likely to leave secure data around for the GC to
  clean up.

ascii-armor.el
  provides routines for converting a vector of 16-bit numbers into its
  equivalent ascii-armor, and vice versa.  it could be easily extended
  to work for octet-streams, but hasn't, yet.

rc16.el
  code for Julian Assange's extension of RC4 to 16 bits.

rander.el
  this code attempts to provide cryptographically secure random
  numbers, but probably fails.  it draws together various sources of
  randomness from within emacs, including the microsecond timings of
  keypresses, though your emacs may not provide such timings.  this
  code should be considered somewhat untrustworthy.  it uses rc16.el
  for its core.

paranoid.el
  a slight modification to comint-read-noecho.  it leaves even less
  possibly sensitive data lying around for the GC to clean up. 

NOTES
----------------------------------------
IDEA is patented, but i believe that this software, which is GPL'd,
doesn't require any license fee or registration.  Diffie-Hellman was
patented, but that expired in 1997.  RC4 was a trade secret, it is no
longer, and so RC16 (which is based on RC4) is safe to use (with
credit to Julian Assange).

until this code has been extensively tested and examined by multiple
parties, i wouldn't trust it any more than a Cracker-Jack Secret
Decoder Ring.

enjoy.

ray jones
rjones@pobox.com
Tip: Filter by directory path e.g. /media app.js to search for public/media/app.js.
Tip: Use camelCasing e.g. ProjME to search for ProjectModifiedEvent.java.
Tip: Filter by extension type e.g. /repo .js to search for all .js files in the /repo directory.
Tip: Separate your search with spaces e.g. /ssh pom.xml to search for src/ssh/pom.xml.
Tip: Use ↑ and ↓ arrow keys to navigate and return to view the file.
Tip: You can also navigate files with Ctrl+j (next) and Ctrl+k (previous) and view the file with Ctrl+o.
Tip: You can also navigate files with Alt+j (next) and Alt+k (previous) and view the file with Alt+o.