110 lines
4.1 KiB
Plaintext
110 lines
4.1 KiB
Plaintext
|
Welcome to the BeeCrypt crypto library!
|
||
|
|
||
|
Copyright (c) 1997-2000 Virtual Unlimited B.V.
|
||
|
|
||
|
Author: Bob Deblier <bob@virtualunlimited.com>
|
||
|
|
||
|
This library is free software; you can redistribute it and/or
|
||
|
modify it under the terms of the GNU Lesser General Public
|
||
|
License as published by the Free Software Foundation; either
|
||
|
version 2.1 of the License, or (at your option) any later version.
|
||
|
|
||
|
This library is distributed in the hope that it will be useful,
|
||
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||
|
Lesser General Public License for more details.
|
||
|
|
||
|
You should have received a copy of the GNU Lesser General Public
|
||
|
License along with this library; if not, write to the Free Software
|
||
|
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
|
||
|
|
||
|
For the specifics of this license, see file 'LICENSE', included in this
|
||
|
distribution.
|
||
|
|
||
|
|
||
|
|
||
|
About BeeCrypt:
|
||
|
|
||
|
This library is an ongoing project of Virtual Unlimited B.V. Its goal is to
|
||
|
provide strong and fast cryptography for use by our products, but we're
|
||
|
not limiting the use to that. We're releasing it under the LGPL license,
|
||
|
because we feel that cryptography should be open to inspection by everybody,
|
||
|
and available for use by everybody to safeguard privacy.
|
||
|
|
||
|
Note that depending on where you are, the use of cryptography may be limited
|
||
|
or forbidden by law. Before using this library, make sure you are legally
|
||
|
entitled to do so.
|
||
|
|
||
|
For more on Virtual Unlimited B.V. and our products please consult our website:
|
||
|
|
||
|
http://www.virtualunlimited.com
|
||
|
|
||
|
<plug>
|
||
|
Most of the algorithms are implemented from reliable sources such as:
|
||
|
|
||
|
"Handbook of Applied Cryptography"
|
||
|
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone
|
||
|
CRC Press
|
||
|
|
||
|
"Applied Cryptography", second edition
|
||
|
Bruce Schneier
|
||
|
Wiley
|
||
|
|
||
|
For crypto enthusiasts these books are invaluable background material.
|
||
|
|
||
|
IEEE P1363 "Standard Specifications for Public Key Cryptography" is a very
|
||
|
interesting draft standard, which we will try to comply with.
|
||
|
</plug>
|
||
|
|
||
|
The structures in the library are geared towards exchange with Java
|
||
|
and its security and cryptography classes. We already have quite a number
|
||
|
of cryptographic classes developed in Java, which will be released in the
|
||
|
future in another open source project.
|
||
|
|
||
|
Included in the library are:
|
||
|
- entropy sources for initializing pseudo-random generators
|
||
|
- pseudo-random generators: FIPS-186, Mersenne Twister
|
||
|
- block ciphers: Blowfish
|
||
|
- hash functions: SHA-1
|
||
|
- keyed hash functions: SHA-1/HMAC
|
||
|
- multi-precision integer library, with assembler-optimized routines
|
||
|
- probabilistic primality testing, with optimized small prime trial division
|
||
|
- discrete logarithm parameter generation over a prime field
|
||
|
- Diffie-Hellman key agreement
|
||
|
- ElGamal signature scheme (two variants)
|
||
|
|
||
|
Planned for the near future are:
|
||
|
- compliance with and compliance statements for IEEE P1363
|
||
|
- DHAES
|
||
|
- DSA (i.e. the rest of FIPS-186)
|
||
|
- more blockciphers (Twofish, Rijndael, ... )
|
||
|
- more hash functions (RIPEMD-160, HAVAL, ... )
|
||
|
- Elliptic Curves (ECDSA, ... )
|
||
|
|
||
|
The library has been tested on the following platforms:
|
||
|
- Solaris 2.6 Sparc, Solaris 2.7 Sparc
|
||
|
- includes assembler optimization for ultrasparc
|
||
|
- Linux glibc 2.x x86
|
||
|
- includes assembler optimization (tuned for Pentium Pro and higher)
|
||
|
- Linux glibc 2.x ppc
|
||
|
- includes assembler optimization (generic 32-bit PowerPC)
|
||
|
- Win32 (Windows 95, 98, NT 4.0)
|
||
|
- includes assembler optimization (tuned for Pentium Pro and higher)
|
||
|
- once the entropy provider bug is fixed (see BUGS), the library should
|
||
|
work fine on Windows 2000.
|
||
|
Planned platforms for the near future are:
|
||
|
- Solaris Intel
|
||
|
- FreeBSD x86
|
||
|
|
||
|
Consult file 'DOCUMENTATION' on how to use the library. There is also a program
|
||
|
called 'beetest.c' included which gives an example of how to use the API. You
|
||
|
can also use it to test whether your compiled library works.
|
||
|
|
||
|
If you want to report bugs, make suggestions, contribute fixes or
|
||
|
enhancements, please see our website: http://beecrypt.virtualunlimited.com
|
||
|
or contact me at beecrypt@virtualunlimited.com
|
||
|
|
||
|
Sincerely
|
||
|
|
||
|
Bob Deblier
|