->To: Multiple recipients of list VOXERS-AT-LARGE
-> <VOXERS-AT-LARGE@USA.NET>
->
->-----BEGIN PGP SIGNED MESSAGE-----
->
->now here's a crypto lib for java weenies!
->
->Forwarded message:
->
->> The Systemics Cryptix crypto library for Java is now available for
->> download at http://www.systemics.com/software/
->>
->> The library is FREE FOR COMMERCIAL AND NON-COMMERCIAL USE.
->>
->> Apart from much tidying up, there have been several signigicant additions
->> to the library, including a Blowfish implementation, RSA encryption
->> (including key generation routines), CFB and CBC block cipher mode modules,
->> and a cryptographically secure random InputStream.
->>
->> Enjoy!
->>
->> CRYPTIX 1.1 - CRYPTOGRAPHIC EXTENSIONS FOR JAVA
->>
->>
->> _________________________________________________________________
->>
->> DESCRIPTION
->>
->> This library contains a suite of cryptographic classes for Java. Some
->> of the classes have been implemented in native code for performance
->> reasons, and have been tested on Windows 95, Windows NT, Solaris,
->> Linux and IRIX.
->>
->> The package documentation is available on line.
->>
->> FEATURES
->>
->> All of the following have been implemented:
->> * java.crypt.BlockCipher
->> This class is a base class for all block ciphers.
->> * java.crypt.Blowfish (based on code from A.M. Kuchling, Bryan Olson
->> and Bruce Schneier)
->> An implementation of Bruce Schneier's Blowfish block cipher.
->> * java.crypt.CipherFeedback
->> A class for implementing the cipher feedback mode of block cipher
->> encryption.
->> * java.crypt.CSRandomStream
->> A cryptographically secure pseudo random input-stream.
->> * java.crypt.DES (based on code from Eric Young)
->> An implementation of the DES block cipher.
->> * java.crypt.HashMD5
->> An class encapsulating MD5 hashes.
->> * java.crypt.HashSHA
->> An class encapsulating SHA hashes.
->> * java.crypt.IDEA
->> An implementation of the IDEA block cipher algorithm. Based on
->> native libraries.
->> * java.crypt.MD5 (based on code from RSA Data Security, Inc.)
->> An implementation of the MD5 message digest algorithm. Based on
->> native libraries.
->> * java.crypt.MD5OutputStream
->> An output stream the creates an MD5 hash of its input.
->> * java.crypt.MessageDigest
->> A base class for all messsage digest algorithms.
->> * java.crypt.MessageDigestOutputStream
->> A class for using message digest functions to hash an output
->> stream.
->> * java.crypt.MessageHash
->> A base class for classes encapsulating hashes.
->> * java.crypt.rsa.PublicKey
->> An RSA public key.
->> * java.crypt.rsa.RSAKeyGen
->> A class for generating RSA public/secret key pairs.
->> * java.crypt.rsa.SecretKey
->> An RSA secret key.
->> * java.crypt.SHA (based on code from NIST and Peter C. Gutmann)
->> An implementation of NISTs SHA message digest algorithm. Based on
->> native libraries.
->> * java.crypt.SHAOutputStream
->> An output stream the creates an SHA hash of its input.
->> * java.crypt.StreamCipher
->> A base class for stream ciphers.
->> * java.math.BigInteger (based on code from Eric Young).
->> This class implements arbitrary length integers and some
->> associated mathematical functions. Based on native libraries.
->> * java.math.MPI
->> A class for converting BigIntegers to and from MPI format
->> integers.
->> * java.math.PRNG
->> A class for generating a pseudo random sequence with a period of
->> 2**160.
->> * java.math.RandomStream
->> An input stream that is random.
->> * java.math.TestPrime
->> A class for testing the primality of BigIntegers.
->>
->> COPYRIGHT
->>
->> This library includes (or is derived from) software developed by (and
->> owned by) the following:
->> * Peter C. Gutmann
->> * A.M. Kuchling
->> * NIST
->> * Bryan Olson
->> * RSA Data Security, Inc.
->> * Bruce Schneier
->> * Eric Young <eay@mincom.oz.au>
->>
->>
->> Other parts of the library are covered by the following licence:
->>
->> Copyright (c) 1995, 1996 Systemics Ltd (http://www.systemics.com/) All
->> rights reserved.
->>
->> This library and applications are FREE FOR COMMERCIAL AND
->> NON-COMMERCIAL USE as long as the following conditions are adhered to.
->>
->>
->> Copyright remains with Systemics Ltd, and as such any Copyright
->> notices in the code are not to be removed. If this code is used in a
->> product, Systemics should be given attribution as the author of the
->> parts used. This can be in the form of a textual message at program
->> startup or in documentation (online or textual) provided with the
->> package.
->>
->> Redistribution and use in source and binary forms, with or without
->> modification, are permitted provided that the following conditions are
->> met:
->> 1. Redistributions of source code must retain the copyright notice,
->> this list of conditions and the following disclaimer.
->> 2. Redistributions in binary form must reproduce the above copyright
->> notice, this list of conditions and the following disclaimer in
->> the documentation and/or other materials provided with the
->> distribution.
->> 3. All advertising materials mentioning features or use of this
->> software must display the following acknowledgement:
->>
->> This product includes software developed by Systemics Ltd
->> (http://www.systemics.com/)
->>
->>
->> THIS SOFTWARE IS PROVIDED BY SYSTEMICS LTD ``AS IS'' AND ANY EXPRESS
->> OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
->> WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
->> DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR
->> ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
->> DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
->> GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
->> INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
->> IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
->> OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
->> ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
->>
->> The licence and distribution terms for any publically available
->> version or derivative of this code cannot be changed. i.e. this code
->> cannot simply be copied and put under another distribution licence
->> [including the GNU Public Licence.]
->>
->>
->> _________________________________________________________________
->>
->
->
->- --
->Greg Vassie C y p h e r N e t
->greg@cypher.net -tH3 r3v0lUt10n w1lL b3 3n[rYpT3d-
->finger for PGP key
->
->-----BEGIN PGP SIGNATURE-----
->Version: 2.6.2
->
->iQCVAwUBMeUnR5UJ8q9eE2KBAQEfpQQAlEX7THx45fAeD/5tqo/sguEg6x+mr+80
->2TNTFhCcYKRSR+aqtHjBv5TLKrpxmM4wu77FaMl6RORIe9uiFwRGwFl0LjB+SztF
->7LjP3pWjjLXHbIgrslhb/qfcC3vIDL7JVqJ2zFjgPBqUcc87BOH//0ammtO2xh3z
->fG0AaGbA5uQ=
->=bpNm
->-----END PGP SIGNATURE-----
->
->----------------------------------------------------------------------------
->To make your own scary monster, place donkey's
->head on girl's body to make Donkey-Girl!
->----------------------------------------------------------------------------
->
--
-= -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Do or do not. There is no try.
... YODA
-=-=-=-=-=-=-= -=-=-=-=-=-=-=-=-
tbyars@earthlink.net