Sophie

Sophie

distrib > Mageia > 1 > i586 > by-pkgid > e8773dc1178a3ee82e29ab36424dc729 > files > 1130

libbeecrypt-devel-4.2.1-6.mga1.i586.rpm

\hypertarget{index_intro_sec}{}\section{Introduction}\label{index_intro_sec}
BeeCrypt started its life when the need for a portable and fast cryptography library arose at Virtual Unlimited in 1997. I'm still trying to make it faster, easier to use and more portable, in addition to providing better documentation.\hypertarget{index_license_sec}{}\section{License}\label{index_license_sec}
BeeCrypt is released under the following license:

This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version.

This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.

You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-\/1307 USA

Legal disclaimer: note that depending on where you are, the use of cryptography may be limited or forbidden by law. Before using this library, make sure you are legally entitled to do so.\hypertarget{index_features_sec}{}\section{Features}\label{index_features_sec}
Included in the library are: 
\begin{DoxyItemize}
\item entropy sources for initializing pseudo-\/random generators 
\item pseudo-\/random generators 
\begin{DoxyItemize}
\item FIPS-\/186 
\end{DoxyItemize}
\item block ciphers 
\begin{DoxyItemize}
\item AES 
\item Blowfish 
\end{DoxyItemize}
\item hash functions 
\begin{DoxyItemize}
\item MD5 
\item RIPEMD-\/128 
\item RIPEMD-\/160 
\item RIPEMD-\/256 
\item RIPEMD-\/320 
\item SHA-\/1 
\item SHA-\/224 
\item SHA-\/256 
\item SHA-\/384 
\item SHA-\/512 
\end{DoxyItemize}
\item keyed hash functions (a.k.a. message authentication codes) 
\begin{DoxyItemize}
\item HMAC-\/MD5 
\item HMAC-\/SHA-\/1 
\item HMAC-\/SHA-\/224 
\item HMAC-\/SHA-\/256 
\item HMAC-\/SHA-\/384 
\item HMAC-\/SHA-\/512 
\end{DoxyItemize}
\item multi-\/precision integer library, with assembler-\/optimized routines for a range of processors; optimized to perform well on both 32-\/bit and 64-\/bit machines; uses Barrett modular reduction instead of the more common usual Montgomery algorithm; also implements sliding windows 
\item probabilistic primality testing, with optimized small prime trial division 
\item discrete logarithm parameter generation over a prime field 
\item Diffie-\/Hellman key agreement 
\item DHAES encryption scheme 
\item DSA signature scheme 
\item ElGamal signature scheme (two variants) 
\item RSA keypair generation with chinese remainder theorem variables 
\item RSA public \& private key operations 
\item OpenMP support 
\end{DoxyItemize}\hypertarget{index_testing_sec}{}\section{Testing}\label{index_testing_sec}
The library has been tested on the following platforms: 
\begin{DoxyItemize}
\item Cygwin 
\item Darwin/MacOS X 
\item Linux glibc 2.x alpha 
\item Linux glibc 2.x arm 
\item Linux glibc 2.x ia64 
\item Linux glibc 2.x m68k 
\item Linux glibc 2.x ppc 
\item Linux glibc 2.x s390 
\item Linux glibc 2.x s390x 
\item Linux glibc 2.x sparc 
\item Linux glibc 2.x x86 
\item Linux glibc 2.x x86\_\-64/amd64 
\item Solaris 2.\mbox{[}6789\mbox{]} sparc (with Forte or GNU compilers) 
\item Solaris 2.\mbox{[}78\mbox{]} x86 (with Forte or GNU compilers) 
\item Tru64 Unix alpha 
\item Win32 (Windows 95, 98, NT 4.0, 2000, XP) 
\end{DoxyItemize}\hypertarget{index_porting_sec}{}\section{Porting}\label{index_porting_sec}
The library is currently in the process of being ported to: 
\begin{DoxyItemize}
\item MinGW 
\item AIX (shared libraries don't seem to work in 64-\/bit mode) 
\end{DoxyItemize}

The structures in the library are geared towards exchange with Java and its security and cryptography classes. This library can also be accessed from Java by installing BeeCrypt for Java, a JCE 1.2 crypto provider and the counterpart of this library.\hypertarget{index_future_sec}{}\section{The Future}\label{index_future_sec}

\begin{DoxyItemize}
\item compliance with and compliance statements for IEEE P1363 
\item switch from OSS to ALSA for entropy gathering 
\item experiments with CUDA (AES, MD6?) 
\item more blockciphers (Twofish, ... ) 
\item more hash functions (SHA-\/3 candidates, MD2, MD4, Tiger) 
\item more hash functions (MD2, MD4, Tiger, ...) 
\item Elliptic Curves (ECDSA, ... ) 
\item RSA signatures as specified by RFC-\/2440. 
\end{DoxyItemize}

Let us know which one you'd prefer to see added first.