Home Alt. Media Cyber Rights Cypherpunks Anonymity Ban Spam Cryptography Environment Government Watchdogs Health Peace NVCD Privacy Think List Think Archives 9:11 Response The Drug War Yet More Links
EPIC Privacy Threat Index

Activism: Cypherpunks: Cryptography

See also: Cypherpunks, Anonymity, Ban Spam, Privacy, Cyber Rights and Big Brother

May 7, 1999: The Ninth Circuit Court rules Software is Protected Speech and Export Controls are
Unconstitutional Prior Restraint

Here, with no restrictions, posted from within the 9th Circuit, is the RSA Algorithm in Perl:

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>

Contents: Algorithms, Documentation, Protocols and Other stuff

Algorithms and Code

AES - Advanced Encryption Standard
The government's successor to the broken DES based on the Finnish Rijndael algorithm.
"An international volunteer effort to produce robust, open-source cryptographic software libraries."
Cryptix maintains an excellent resources page.
home of crypto++, a public domain crypto library
cryptopp links to algorithms, products and libraries
Netscape Security Services (NSS)
NSS for Java (JSS)
based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson
a free Java-only implementation of the SSLv3 and TLSv1 (RFC2246) protocols
PGP - Pretty Good Privacy
The International PGP Home Page (EFF)
PGP (Pretty Good Privacy) is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. PGP can also be used to apply a digital signature to a message without encrypting it. Find out more, and use this valuable tool for democracy!
GPG - The GNU Privacy Guard
GPG is the Free Software (GNU) version of PGP
See also: the xPrivacy Guard
PGP/GPGKey Servers
List of Public Key Servers (from PGPi)
The WWW Based PGP 5.0 Key Server System
University of Paderborn
More links
PGP 2.6.2 Hypertext documentation
PGP 2.6.2: FAQ, Known Bugs, and Improvements
PGP - MIT distribution page
PGPfone - turns your desktop or notebook computer into a secure telephone
A Simple Distributed Security Infrastructure (SDSI)
SPKI/SDSI Certificates
Common Data Security Architecture (CDSA) by Intel
CDSA sourceforge code repository
a Python implementation of the SPKI Certificate standard
XML Security Suite for Java (IBM)
This is essentially an implementation of public standards. Please email and ask them to release this excellent enabling technology - otherwise, we (or someone else) will simple have to recreate it.

Documentation and Resources

A Cryptographic Compendium
by John Savard
Cryptography A-Z
SSH Communications Security (Finland)
Cryptography FAQ
from RSA Labs
Cryptography and Security resources
compiled by Ron Rivest
OpenBSD Crypto Page
the OpenBSD project has embedded cryptography into numerous places in the operating system
Standard Cryptographic Algorithm Naming
an excellent source of references for definitions and cryptanalysis of various algorithms.


a new suite of internet protocols that perform the function of DNS, TCP, and UDP in a manner that's both untraceable and untappable.
IP Security Protocol (ipsec)
designed to flexibly support combinations of authentication, integrity, access control, and confidentiality
Linux FreeS/WAN
The idea is to deploy PC-based boxes that will sit between your local area network and the Internet (near your firewall or router) which opportunistically encrypt your Internet packets

Other stuff
Purveyors of Stronghold, a secure apache-based web-server
Data Hiding
the concealing of information in some other form of media
ReadThis! Java Encoder/Decoder
Works in conjunction with ReadThis! Palm software
Secure Shell (SSH)
SSH Communications Security (Finland)
Makers of SSH IPSEC Express
    Creative Commons by-nc-sa. 1994-2004.
This Site Supports Free Speech
valid html Creative Commons License anybrowser created with Emacs supports Freedom of Expression and