implementation of MD4 (like `Digest::Perl::MD5'). Because of this, it is
slow but avoids platform specific complications. For efficiency you
should use `Digest::MD4' instead of this module if it is available.
WWW: http://search.cpan.org/dist/Digest-Perl-MD4
PR: ports/90771
Submitted by: Gabor Kovesdan
Secure Hash Standard. It gives Perl programmers a convenient way
to calculate SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512 message
digests. The module can handle all types of input, including
partial-byte data.
Digest::SHA::PurePerl is written entirely in Perl. If your platform
has a C compiler, you should install the functionally-equivalent
(but much faster) Digest::SHA module.
WWW: http://search.cpan.org/dist/Digest-SHA-PurePerl
PR: ports/90773
Submitted by: Gabor Kovesdan
of MD5. It is written in perl only and because of this it is slow but it
works without C-Code. You should use "Digest::MD5" instead of this
module if it is available. This module is only usefull for
computers where you cannot install "Digest::MD5" (e.g. lack of a
C-Compiler).
WWW: http://search.cpan.org/dist/Digest-Perl-MD5
PR: ports/90772
Submitted by: Gabor Kovesdan
algorithm presented in "Fast Hashing of Variable Length Text Strings"
- ACM 1990. This hashing technique yields good distribution of hashed results
for variable length input strings on the range 0-255, and thus, it is well
suited for data load balancing.
If you prefer a fast implementation, you might want to
consider Digest::Pearson instead.
WWW: http://search.cpan.org/dist/Digest-Pearson-PurePerl
PR: ports/90770
Submitted by: Gabor Kovesdan
certificate elements. It is based on the generic ASN.1 module by Graham Barr,
on the x509decode example by Norbert Klasen and contributions on the
perl-ldap-dev-Mailinglist by Chriss Ridd.
WWW: http://search.cpan.org/dist/Crypt-X509
PR: ports/90716
Submitted by: Gabor Kovesdan
salted (or seeded) hashes of clear text data. The original formalization of
this concept comes from RFC-3112 and is extended by the use of different
digital agorithms.
WWW: http://search.cpan.org/dist/Crypt-SaltedHash
PR: ports/90698
Submitted by: Gabor Kovesdan
designed by Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon
Bosselaers, and Erik De Win.
WWW: http://search.cpan.org/dist/Crypt-Shark
PR: ports/90699
Submitted by: Gabor Kovesdan
1760) implemented in Perl. It exports the function `key' by default, and
may optionally export the function `compute'.
`compute_md4', `compute_md5', `key_md4', and `key_md5' are provided as
convenience functions for selecting either MD4 or MD5 hashes. The
default is MD4; this may be changed with with the `$Crypt::SKey::HASH'
variable, assigning it the value of `MD4' or `MD5'. You can access any
of these functions by exporting them in the same manner as `compute' in
the above example.
Most S/Key systems use MD4 hashing, but a few (notably OPIE) use MD5.
WWW: http://search.cpan.org/dist/Crypt-SKey
PR: ports/90695
Submitted by: Gabor Kovesdan
designed by Lawrie Brown, Josef Pieprzyk, and Jennifer Seberry. The default
key length in this implementation is 128 bits. Loki97 was one of the 15
candidates for the AES.
WWW: http://search.cpan.org/dist/Crypt-Loki97
PR: ports/90694
Submitted by: Gabor Kovesdan
looking for a hash pointer in the caller program called $ptr2_License. The
hash contains the path to the License file and an optional 'private' key list
of modules which will decrypt only with the 'private' key. OR, a hash key of
'next' with no particular value that indicates to look to the next caller on
the stack for the License pointer. If the pointer is not present or the
License file is not found successfully, then no further action is taken. If the
License file is successfully opened, and the contents validated then the
attached encrypted module is loaded and the seconds remaining until License
expiration are returned or now() in the case of no expiration. Undef is
returned for an expired license (module fails to load).
WWW: http://search.cpan.org/dist/Crypt-License
PR: ports/90693
Submitted by: Gabor Kovesdan
Paulo S. L. M. Barreto, Khazad is a NESSIE finalist for legacy-level block
ciphers. Khazad has many similarities with Rijndael, and has an extremely
high rate of diffusion.
WWW: http://search.cpan.org/dist/Crypt-Khazad
PR: ports/90692
Submitted by: Gabor Kovesdan
used during World War II. The cipher calculations are based on actual Enigma
values and the resulting ciphered values are as would be expected from an
Enigma Machine.
The implementation allows for all of the Rotors and Reflectors available to the
real world Enigma to be used. A Steckerboard has also been implemented,
allowing letter substitutions to be made.
WWW: http://search.cpan.org/dist/Crypt-Enigma
PR: ports/90683
Submitted by: Gabor Kovesdan
chroot_safe, a tool to chroot any application in a sane
manner without requring binaries, shared libraries etc
within the chroot or any support from the application. Works
with any dynamically linked application.
WWW: http://sourceforge.net/projects/chrootsafe
PR: ports/90341
Submitted by: Gabor Kovesdan <gabor.kovesdan@t-hosting.hu>
symmetrical block cipher with a 256-bit key from the former Soviet
Union. Please read the Pod documentation contained in the module
itself for additional information, including the rationale behind
the writing of this module.
WWW: http://search.cpan.org/dist/Crypt-GOST_PP
PR: ports/90685
Submitted by: Gabor Kovesdan
key developed in the former Soviet Union. Some information on it
is available at http://vipul.net/gost/ .
This module implements GOST encryption. It supports the Crypt::CBC
interface, with the functions described below. It also provides
an interface that is backwards- compatible with Crypt::GOST 0.41,
but its use in new code is discouraged.
WWW: http://search.cpan.org/dist/Crypt-GOST
PR: ports/90684
Submitted by: Gabor Kovesdan
Encryption Algorithm (DEA) is a semi-strong encryption and
decryption algorithm.
The module is 100 % compatible to Crypt::DES but is implemented
entirely in Perl. That means that you do not need a C compiler
to build and install this extension.
WWW: http://search.cpan.org/dist/Crypt-DES_PP
PR: ports/90682
Submitted by: Gabor Kovesdan
The protocol was shown to be INSECURE. This module is therefore released for
purely academic curiosity.
WWW: http://search.cpan.org/dist/Crypt-Chimera
PR: ports/90681
Submitted by: Gabor Kovesdan
stream ciphers, invented by Martin Boesgaard, Mette Vesterager,
Thomas Pedersen, Jesper Christiansen, and Ove Scavenius of Cryptico A/S.
WWW: http://search.cpan.org/dist/Crypt-Rabbit
PR: ports/90615
Submitted by: Gabor Kovesdan
or you intend to send information through the Internet. Another reason might
be to assure users cannot modify their previously entered data in a follow-up
step of a long Web transaction where you don't want to deal with server-side
session data. The goal of Crypt::Lite was to have a pretty simple way to
encrypt and decrypt data without the need to install and compile huge
packages with lots of dependencies.
Crypt::Lite generates every time a different encrypted hash when you
re-encrypt the same data with the same secret string. Nevertheless you
are able to make double or tripple-encryption with any data to increase
the security. Decryption works also on hashes that have been encrypted
on a foreign host (try this with an unpatched IDEA installation ;-).
WWW: http://search.cpan.org/dist/Crypt-Lite
PR: ports/90614
Submitted by: Gabor Kovesdan
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports
the add method.
WWW: http://search.cpan.org/dist/Crypt-Ctr
PR: ports/90613
Submitted by: Gabor Kovesdan
constructs a stream cipher from a block cipher or cryptographic hash funtion
and returns it as an object. Any block cipher in the Crypt:: class can be
used, as long as it supports the blocksize and keysize methods. Any hash
function in the Digest:: class can be used, as long as it supports the
add method.
WWW: http://search.cpan.org/dist/Crypt-CFB
PR: ports/90611
Submitted by: Gabor Kovesdan
blowfish and twofish algorithms in that it too has a table-based decoder.
Derivation from FairKeys code by Jon Lech Johanson at nanocrew.net.
If you don't know what that is, don't bother looking here further. This is
a Pure Perl implementation. I doubt there is any need for xs coding for
what would mainly be processing 16 bytes at a time. This code is part of an
ongoing effort to clone portions of the Apple iTMS in Perl for portability.
See www.hymn-project.org for prior efforts by others.
WWW: http://search.cpan.org/dist/Crypt-AppleTwoFish
PR: ports/90610
Submitted by: Gabor Kovesdan
presented in "Fast Hashing of Variable Length Text Strings" - ACM 1990. This
hashing technique yields good distribution of hashed results for variable
length input strings on the range 0-255, and thus, it is well suited for
data load balancing.
The implementation is in C, so it is fast. If you prefer a pure Perl version
and can tolerate slower speed, you might want to consider
Digest::Pearson::PurePerl instead.
WWW: http://search.cpan.org/dist/Digest-MD5-Pearson
PR: ports/90578
Submitted by: Gabor Kovesdan
one-way hash of data. Due to the nature of the formula used, it is impossible
to reverse it.
This module provides functions to search several online MD5 hashes database and
return the results (or return undefined if no match found).
WWW: http://search.cpan.org/dist/Digest-MD5-Reverse
PR: ports/90576
Submitted by: Gabor Kovesdan
developed by Bob Jenkins from within Perl programs. The algorithm takes as
input a message of arbitrary length and produces as output a 32-bit
"message digest" of the input in the form of an unsigned long integer.
See http://burtleburtle.net/bob/hash/doobs.html for more information.
WWW: http://search.cpan.org/dist/Digest-JHash
PR: ports/90564
Submitted by: Gabor Kovesdan
ElfHash generates resonably 32 bit integer value from a string in a
reasonably short period of time.
WWW: http://search.cpan.org/dist/Digest-Elf
PR: ports/90561
Submitted by: Gabor Kovesdan
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).
WWW: http://search.cpan.org/dist/Digest-EMAC
PR: ports/90560
Submitted by: Gabor Kovesdan
Unlike HMAC, which reuses an existing one-way hash function, such as
MD5, SHA-1 or RIPEMD-160, EMAC reuses an existing block cipher to
produce a secure message authentication code (MAC).
WWW: http://search.cpan.org/dist/Digest-DMAC
PR: ports/90550
Submitted by: Gabor Kovesdan
32-bit unsigned value for any variable-length input string. An equivalent pure
Perl version is also available: Digest::DJB::PurePerl.
WWW: http://search.cpan.org/dist/Digest-DJB
PR: ports/90549
Submitted by: Gabor Kovesdan
functions with the correct parameters for CRC-CCITT, CRC-16 and CRC-32.
WWW: http://search.cpan.org/dist/Digest-CRC
PR: ports/90546
Submitted by: Gabor Kovesdan
in RFC 1950. The interface provided by this module is specified in Digest,
but no functional interface is provided.
WWW: http://search.cpan.org/dist/Digest-Adler32
PR: ports/90545
Submitted by: Gabor Kovesdan
Yuliang Zheng, Josef Pieprzyk, and Jennifer Seberry. The number of rounds can
be 3, 4, or 5, while the hash length can be 128, 160, 192, 224, or 256 bits.
Thus, there are a total of 15 different outputs. For better security, however,
this module implements the 5-round, 256-bit output.
WWW: http://search.cpan.org/dist/Digest-Haval256
PR: ports/90534
Submitted by: Gabor Kovesdan