Cryptography The cryptography directory contains software and other information that allow users to encrypt their data and communications. Cryptographic algorithms and protocols ensure confidentiality, maintain integrity, enforce non-repudiation and provide authentication. o Algorithms This directory contains source code and documentation for over 60 cryptographic algorithms. The main use for this information and software is in research and software development. For ease of use, we recommend that software developers investigate the cryptographi libraries directory (see below). o Applications # Scatterchat Scatterchat is a secure instant messaging client (based upon the Gaim software) that provides end-to-end encryption, integrated onion-routing with EFF's Tor, secure file transfers, and easy-to-read documentation. Its security features include resiliency against partial compromise through perfect forward secrecy, immunity from replay attacks, and limited resistance to traffic analysis... all reinforced through a pro-actively secure design. # Freenet Freenet is a large-scale peer-to-peer network which pools the power of member computers around the world to create a massive virtual information store open to anyone to freely publish or view information of all kinds. This directory contains a number of freenet clients. # GnuPG GnuPG stands for GNU Privacy Guard and is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC 2440. # Mail Encryption This directory contains a number of utilities to assist with encryption of email, primarily using PGP. Utilities include anonvelope, anubis, caesarion, herbrip, mixmaster and mixminion (anonymous remailers), pgp4pine, pgpdomo, pgpsendmail, premail. # PGP PGPi is the international variant of PGP (Pretty Good Privacy), a public key encryption program originally written by Phil Zimmermann in 1991. PGP is the de-facto standard for email encryption. # Secure Shell The SSH protocol suite of network connectivity tools are an increasingly widely used replacement for telnet, rlogin and ftp and other such programs that transmit all traffic (including authentication information such as passwords) without encryption. SSH encrypts all traffic. This directory contains SSH implementations for a number of operating system platforms, including Microsoft Windows (SSH Communications, PuTTY, WinSSHd), Unix (OpenSSH, lsh, dropbear), Apple Mac OS (MacSSH, Fugu) etc. o Filesystems This directory contains a number of cryptographic and steganographic filesystems for Unix operating systems, including CFS, RubberHose, StegFS, SFS and TCFS. As an alternative to these filesystems, you may like to enquire whether your operating system contains encrypted loopback filesystem support (such as the vnd devices in BSD) or whether your PGP application offers encrypted filesystems (such as PGPdisk in the commercial PGP package). o Hashes This directory contains source code and documentation for around 15 cryptographic hashes. The main use for this information and software is in research and software development. For ease of use, however, we recommend software developers investigating the cryptographic libraries directory (see below) because a number of these libraries also offer hashing functionality. o Libraries # Cryptix Cryptix is an international volunteer effort to produce robust, open-source cryptographic software libraries. Cryptix products are free, both for commercial and non-commercial use and are being used by developers all over the world. Development is currently focused on Java. # Cryptlib cryptlib is a powerful security toolkit which allows even inexperienced crypto programmers to easily add encryption and authentication services to their software. The high-level interface provides anyone with the ability to add strong security capabilities to an application in as little as half an hour, without needing to know any of the low-level details which make the encryption or authentication work # Crypto++ Crypto++ is a free C++ class library of cryptographic schemes. One purpose of Crypto++ is to act as a repository of public domain (not copyrighted) source code. Although the library is copyrighted as a compilation, the individual files in it (except for a few exceptions listed in the license) are in the public domain # mcrypt and libmcrypt mcrypt and libmcrypt are an application and library that implement a number of block and stream ciphers under a GPL license. libmcrypt is often used by PHP programmers when incorporating encryption functionality into their scripts. # mhash mhash is a free (GNU LGPL) library which provides a uniform interface to a large number of hash algorithms. These algorithms can be used to compute checksums, message digests, and other signatures. # mod_ssl mod_ssl provides strong cryptography for the Apache webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with the help of the OpenSSL toolkit (see below). # OpenSSL OpenSSL is a widely-used, robust, commercial-grade, full-featured and open source library implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a full-strength general cryptography toolkit. # prng and entropy This directory contains a number of Pseudo-Random Number Generators (PRNGs) and pieces of software designed to gather entropy (randomness) from a number of sources inside your computer. Some are designed to operate on operating systems that do not natively provide PRNG services. o Network Encryption Network Encryption encompasses things such as IPSec, secure tunnelling applications etc. Please refer to the "network-security" information page, linked below. o Voice Encryption (ciphony) This directory contains a number of utilities that enable Internet users to encrypt voice communications between users. Such utilities include pgpfone, Speak Freely "Afterlife Development", and RAT. (Note: This list of software and information available at Wiretapped is not exhaustive. Users are encouraged to browse and search the archive and read any available "-README.txt" files that are available)