[Announce] New version of Systemics crypto library for Perl

Gary Howland gary at systemics.com
Tue Jun 25 20:43:49 PDT 1996


The Systemics Cryptix crypto library for Perl is now available for
download at http://www.systemics.com/software/

Apart from much tidying up, there have been several signigicant additions
to the library, include a Blowfish implementation, RSA encryption
(including key generation routines), CFB and CBC block cipher mode modules,
and a cryptographically secure random stream generator.

This library is not currently on CPAN, since several modules are not
in a suitable state for CPAN distribution.  However, if anyone can
rectify this, then we are happy to place them on CPAN.

Enjoy!

P.S. - PGP library on it's way soon (hopefully this weekend!)



                        CRYPTIX LIBRARY FOR PERL (V1.1)
                                       
   
     _________________________________________________________________
   
Description

   This library contains a suite of cryptographic and mathematical
   modules for Perl. Many of the more CPU intensive algorithms have been
   implemented in C as Perl extensions.
   
Features

  Perl extensions
  
   All of the following have been implemented as Perl extensions in C:

     * Crypt::Blowfish module (Blowfish implementation by A.M. Kuchling).
     * Crypt::DES module (DES implementation by Eric Young).
     * Crypt::IDEA module.
     * Crypt::MD5 module (based on an implementation by Neil Winton and
       Data Security, Inc.)
     * Crypt::SHA module (based on an implementation by Uwe Hollerbach
       and based on code from NIST and Peter C. Gutmann)
     * Math::BigInteger module (based on code from Eric Young).
       This module implements arbitrary length integers and some
       associated mathematical functions.
     * Math::PRSG - Pseudo random sequence generator
       This module implements a 160 bit LFSR for use in generating pseudo
       random sequences.
     * Math::TrulyRandom module, based on code from Don Mitchell and Matt
       Blaze (AT&T).
       This module generates "truly random" numbers, based on interrupt
       timing discrepancies.
       
Perl modules

   All of the following have been implemented in Perl:

     * Crypt::CBC module
       This module implements CBC block cipher mode.
     * Crypt::CFB module
       This module implements CFB block cipher mode.
     * Crypt::CSRandomStream module
       This module implements a cryptographically secure random stream.
       It implements the Stream::DataInput interface.
     * Crypt::DES3EDE module
       This module implements triple DES (EDE mode).
     * Crypt::HashMD5
       This module implements an MD5 hash, which derives from
       Crypt::MessageDigest.
     * Crypt::HashSHA
       This module implements an SHA hash, which derives from
       Crypt::MessageDigest.
     * Crypt::MessageDigest
       This module implements the Crypt::MessageDigest base class.
     * Crypt::RSAKey
       This module implements the RSA key base class.
     * Crypt::RSAKeyGen
       This module is used for the generation of RSA key pairs.
     * Crypt::RSAPublicKey
       This module implements an RSA public key, which derives from
       Crypt::RSAKey.
     * Crypt::RSASecretKeyPair
       This module implements an RSA public/secret key pair, which
       derives from Crypt::RSAKey.
     * Math::MPI module
       This module implements the reading and writing of Philip
       Zimmermans MPI format large integers.
     * Math::PseudoRandomStream module
       This module implements a pseudo random data stream. It implements
       the Stream::DataInput interface.
     * Math::Random module
       This module contains a collection of various random number
       routines.
     * Math::TestPrime module
       This module is used to test the primality of an instance of
       Math::BigInteger.
     * Stream::DataEncoding
     * Stream::DataInput
     * Stream::DataOutput
     * Stream::FileInput
     * Stream::FileOutput
     * Stream::Streamable
     * Stream::StringInput
     * Stream::StringOutput
       
Copyright

   This library includes (or is derived from) software developed by (and
   owned by) the following:
     * Peter C. Gutmann
     * Uwe Hollerbach &ltuh at alumni.caltech.edu>
     * A.M. Kuchling
     * Don Mitchell and Matt Blaze (AT&T)
     * NIST
     * RSA Data Security, Inc.
     * Neil Winton &ltN.Winton at axion.bt.co.uk>
     * Eric Young &lteay at mincom.oz.au>
       
   
   Other parts of the library are covered by the following licence:
   
   Copyright (c) 1995, 1996 Systemics Ltd (http://www.systemics.com/) All
   rights reserved.
   
   This library and applications are FREE FOR COMMERCIAL AND
   NON-COMMERCIAL USE as long as the following conditions are adhered to.
   
   
   Copyright remains with Systemics Ltd, and as such any Copyright
   notices in the code are not to be removed. If this code is used in a
   product, Systemics should be given attribution as the author of the
   parts used. This can be in the form of a textual message at program
   startup or in documentation (online or textual) provided with the
   package.
   
   Redistribution and use in source and binary forms, with or without
   modification, are permitted provided that the following conditions are
   met:
    1. Redistributions of source code must retain the copyright notice,
       this list of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright
       notice, this list of conditions and the following disclaimer in
       the documentation and/or other materials provided with the
       distribution.
    3. All advertising materials mentioning features or use of this
       software must display the following acknowledgement:
       
        This product includes software developed by Systemics Ltd
                (http://www.systemics.com/)
                
   
   THIS SOFTWARE IS PROVIDED BY SYSTEMICS LTD ``AS IS'' AND ANY EXPRESS
   OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
   WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
   DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR
   ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
   GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
   INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
   IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
   OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
   ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
   
   The licence and distribution terms for any publically available
   version or derivative of this code cannot be changed. i.e. this code
   cannot simply be copied and put under another distribution licence
   [including the GNU Public Licence.]
   
   
     _________________________________________________________________






More information about the cypherpunks-legacy mailing list