Sophie

Sophie

distrib > Mageia > 4 > x86_64 > by-pkgid > d1d38291248b5ff58339d3d2ddb22ecd > files > 1252

lib64beecrypt-devel-4.2.1-13.mga4.x86_64.rpm

\hypertarget{index_intro_sec}{}\section{Introduction}\label{index_intro_sec}
Bee\-Crypt started its life when the need for a portable and fast cryptography library arose at Virtual Unlimited in 1997. I'm still trying to make it faster, easier to use and more portable, in addition to providing better documentation.\hypertarget{index_license_sec}{}\section{License}\label{index_license_sec}
Bee\-Crypt is released under the following license\-:

This library is free software; you can redistribute it and/or modify it under the terms of the G\-N\-U Lesser General Public License as published by the Free Software Foundation; either version 2.\-1 of the License, or (at your option) any later version.

This library is distributed in the hope that it will be useful, but W\-I\-T\-H\-O\-U\-T A\-N\-Y W\-A\-R\-R\-A\-N\-T\-Y; without even the implied warranty of M\-E\-R\-C\-H\-A\-N\-T\-A\-B\-I\-L\-I\-T\-Y or F\-I\-T\-N\-E\-S\-S F\-O\-R A P\-A\-R\-T\-I\-C\-U\-L\-A\-R P\-U\-R\-P\-O\-S\-E. See the G\-N\-U Lesser General Public License for more details.

You should have received a copy of the G\-N\-U Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, M\-A 02111-\/1307 U\-S\-A

Legal disclaimer\-: note that depending on where you are, the use of cryptography may be limited or forbidden by law. Before using this library, make sure you are legally entitled to do so.\hypertarget{index_features_sec}{}\section{Features}\label{index_features_sec}
Included in the library are\-: 
\begin{DoxyItemize}
\item entropy sources for initializing pseudo-\/random generators 
\item pseudo-\/random generators 
\begin{DoxyItemize}
\item F\-I\-P\-S-\/186 
\end{DoxyItemize}
\item block ciphers 
\begin{DoxyItemize}
\item A\-E\-S 
\item Blowfish 
\end{DoxyItemize}
\item hash functions 
\begin{DoxyItemize}
\item M\-D5 
\item R\-I\-P\-E\-M\-D-\/128 
\item R\-I\-P\-E\-M\-D-\/160 
\item R\-I\-P\-E\-M\-D-\/256 
\item R\-I\-P\-E\-M\-D-\/320 
\item S\-H\-A-\/1 
\item S\-H\-A-\/224 
\item S\-H\-A-\/256 
\item S\-H\-A-\/384 
\item S\-H\-A-\/512 
\end{DoxyItemize}
\item keyed hash functions (a.\-k.\-a. message authentication codes) 
\begin{DoxyItemize}
\item H\-M\-A\-C-\/\-M\-D5 
\item H\-M\-A\-C-\/\-S\-H\-A-\/1 
\item H\-M\-A\-C-\/\-S\-H\-A-\/224 
\item H\-M\-A\-C-\/\-S\-H\-A-\/256 
\item H\-M\-A\-C-\/\-S\-H\-A-\/384 
\item H\-M\-A\-C-\/\-S\-H\-A-\/512 
\end{DoxyItemize}
\item multi-\/precision integer library, with assembler-\/optimized routines for a range of processors; optimized to perform well on both 32-\/bit and 64-\/bit machines; uses Barrett modular reduction instead of the more common usual Montgomery algorithm; also implements sliding windows 
\item probabilistic primality testing, with optimized small prime trial division 
\item discrete logarithm parameter generation over a prime field 
\item Diffie-\/\-Hellman key agreement 
\item D\-H\-A\-E\-S encryption scheme 
\item D\-S\-A signature scheme 
\item El\-Gamal signature scheme (two variants) 
\item R\-S\-A keypair generation with chinese remainder theorem variables 
\item R\-S\-A public \& private key operations 
\item Open\-M\-P support 
\end{DoxyItemize}\hypertarget{index_testing_sec}{}\section{Testing}\label{index_testing_sec}
The library has been tested on the following platforms\-: 
\begin{DoxyItemize}
\item Cygwin 
\item Darwin/\-Mac\-O\-S X 
\item Linux glibc 2.\-x alpha 
\item Linux glibc 2.\-x arm 
\item Linux glibc 2.\-x ia64 
\item Linux glibc 2.\-x m68k 
\item Linux glibc 2.\-x ppc 
\item Linux glibc 2.\-x s390 
\item Linux glibc 2.\-x s390x 
\item Linux glibc 2.\-x sparc 
\item Linux glibc 2.\-x x86 
\item Linux glibc 2.\-x x86\-\_\-64/amd64 
\item Solaris 2.\mbox{[}6789\mbox{]} sparc (with Forte or G\-N\-U compilers) 
\item Solaris 2.\mbox{[}78\mbox{]} x86 (with Forte or G\-N\-U compilers) 
\item Tru64 Unix alpha 
\item Win32 (Windows 95, 98, N\-T 4.\-0, 2000, X\-P) 
\end{DoxyItemize}\hypertarget{index_porting_sec}{}\section{Porting}\label{index_porting_sec}
The library is currently in the process of being ported to\-: 
\begin{DoxyItemize}
\item Min\-G\-W 
\item A\-I\-X (shared libraries don't seem to work in 64-\/bit mode) 
\end{DoxyItemize}

The structures in the library are geared towards exchange with Java and its security and cryptography classes. This library can also be accessed from Java by installing Bee\-Crypt for Java, a J\-C\-E 1.\-2 crypto provider and the counterpart of this library.\hypertarget{index_future_sec}{}\section{The Future}\label{index_future_sec}

\begin{DoxyItemize}
\item compliance with and compliance statements for I\-E\-E\-E P1363 
\item switch from O\-S\-S to A\-L\-S\-A for entropy gathering 
\item experiments with C\-U\-D\-A (A\-E\-S, M\-D6?) 
\item more blockciphers (Twofish, ... ) 
\item more hash functions (S\-H\-A-\/3 candidates, M\-D2, M\-D4, Tiger) 
\item more hash functions (M\-D2, M\-D4, Tiger, ...) 
\item Elliptic Curves (E\-C\-D\-S\-A, ... ) 
\item R\-S\-A signatures as specified by R\-F\-C-\/2440. 
\end{DoxyItemize}

Let us know which one you'd prefer to see added first.