Crypto
Last Updated: 7/6/2013 11:26:08 PM




Visit our newest sister site!
Hundreds of free aircraft flight manuals
Civilian • Historical • Military • Declassified • FREE!

diggcode.txt
2029 bytes.
Digg.com censored for revealing HD-DVD code

pan_rar.txt
15954 bytes. by pan (2009)
How to recover a RAR key in Linux

wpadweak.pdf
351208 bytes. by S. Rublev (2009)
WPAD technology weaknesses
Cryptography  
pegasus1.htm
4028 bytes. by Galldor (1999)
Pegasus Mail (all) weak password crypto
Advisory   Cryptography   Windows  
fcrypt.c
25183 bytes.
Eric Yong's Fcrypt C source - part of a Netscape SSL implementation

stegdetn.pdf
822440 bytes. by Provos, Honeyman (2001)
Detecting Steganographic Content on the Internet
Cryptography  
public.pdf
288780 bytes. by T. Moh (1997)
A Public Key System With Signature And Master Key Functions
Cryptography  
macneilc.txt
12436 bytes.
Open Sesame - McNeil-Lehrer News Hour report on Clipper
Cryptography  
key_st~1.txt
64508 bytes. (1996)
The Risks of Key Recovery, Key Escrow, and Trusted 3rd Party Encryption Various Authors

perlcss1.gif
29450 bytes. (2001)
A picture of the source code for the smallest known Perl implementation of a CSS descrambler.

perlcss2.gif
32797 bytes. (2001)
A picture of the source code for a slightly larger, but much faster Perl implementation of a CSS descrambler.

dcsshaik.txt
31723 bytes. (2001)
Astounding! The DeCSS Haiku!

tinycss.gif
24636 bytes. (2001)
Here is the smallest known C implementation of a CSS descrambler.

decssdst.htm
58311 bytes. (2000)
42 ways to Distribute DeCSS (or just about anything else "they" don't want you to know!) by Samuel Hocevar
Cryptography  
cipher.txt
31719 bytes.
64 bit codes

ptpkzip.txt
25859 bytes.
A Known Plaintext Attack on the PKZip Stream Cipher
Cryptography  
narafile.htm
395395 bytes. by CIA (2003)
A list of declassified CIA documents, mostly relating to early crypto and pre-WWII espionage
Cryptography   Espionage  
099.pdf
287572 bytes. by E.Filiol (2002)
A New Statistical Testing for Symmetric Ciphers and Hash Functions
Cryptanalysis  
a5-1.c
11687 bytes. (1999)
A Pedagogical Implementation of A5/1
Cryptography  
aprime~1.pdf
461450 bytes. (2001)
A Primer on Mobile Application Security
Cellular   Cryptography  
12-00.pdf
142057 bytes. (2000)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
Cryptography  
steganog.txt
6218 bytes.
A synopsis of Steganography
Steganography  
a5.txt
16183 bytes.
A5, the GSM encryption algorithm. Once thought to be too good for Saddam Hussein, now even the government admits it sucks...

g-312.pdf
1189632 bytes. (2000)
About the Abwehr G-312 Enigma machine
Cryptography  
ih99-s~1.pdf
143135 bytes.
Adobe Acrobat paper on StegFS and the Steganographic File System concept
Steganography  
confeb92.txt
85299 bytes.
Air Force Cryptologic Support Center's Newsletter, "The Connection" February 92

americ~1.txt
9706 bytes. (1988)
American Vietnam P.O.W. Code
Cryptography  
a5attack.txt
5692 bytes. (2003)
An attack on A5
Cellular   Cryptanalysis  
encrypti.txt
48004 bytes.
An Introduction to the Use of Encryption
Cryptography  
apx.pl
3476 bytes. (2002)
AppendX Simple steganography in Perl
Steganography  
asoft3~1.htm
5563 bytes. by ByteRage (2001)
ArGoSoft FTP Server 1.2.2.2 password decryption FTP:
Advisory   Cryptography  
stego.txt
4547 bytes.
Article about Cypherella and her mighty creation, Stego, the picture encoding privacy scheme

pra04456.pdf
199332 bytes. by Brandt/Myers/Lomonaco (1997)
Aspects of entangled translucent eavesdropping in quantum cryptography
Cryptanalysis  
marking.pdf
458700 bytes. (1998)
Attacks on Copyright Marking Systems
Steganography  
snakeoil.txt
31427 bytes.
Avoiding Crypto "Snake Oil" products.
Cryptography   Frequently Asked Questions  
800_1sec.txt
92877 bytes.
Bibliography of encryption texts

blowfish.txt
18137 bytes.
Blowfish Source Code!

lesson2.txt
2307 bytes. by HeadTrip (2001)
Breaking Cue:Cat Encryption for Complete Fucking Retards
Cryptography  
breakms.c
57197 bytes. (1997)
BreakMS - Break Microsoft Private Key Encryption with a dictionary attack
Cryptanalysis  
bgate2.htm
3662 bytes. by S. Alexander (2000)
BrowseGate 2.80.2 weak password encryption
Advisory   Cryptography   Exploit   Windows  
cesar~1.htm
1348 bytes. by ByteRage (2001)
CesarFTP v0.98b Directory Traversal, Weak Password Encryption
Advisory   Cryptography  
citrix3.htm
2699 bytes. by D. Song (2000)
Citrix ICA Basic Encryption
Advisory   Cryptography  
clippers.txt
9729 bytes. (1994)
Clinton announces Clipper is scaled back!
Cryptography   Press Release  
newdes.c
6796 bytes.
Code to implement the NEWDES algorithm

ccc.htm
2972 bytes. by R. Scott (2001)
Computer Associates' CCC\Harvest 5.0 weak encryption
Advisory   Cryptography   Windows  
crypto_1.txt
19363 bytes.
CPSR letter on cryptography policy

bt40.txt
1630 bytes. (2003)
Cracking preshared keys
Cryptanalysis  
crackean.txt
3600 bytes. by Moe1 (1999)
Cracking the EAN Barcode System
Cryptography  
ibm4758c.htm
2840 bytes. (2001)
Cracking the IBM 4758 Crypto Co-Processor
Cryptanalysis   Exploit  
crcrev.txt
36429 bytes. (1999)
CRC and how to reverse it
Cryptography  
modified.txt
10307 bytes.
Crypt-decrypt program based on a WWII algorithm (Modified Enigma)

cssanlys.txt
16756 bytes. (1999)
Cryptanalysis of a Contents Scrambling System by Frank A. Stevenson
Cryptography  
044.pdf
344378 bytes. by Courtois/Pieprzyk (2002)
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
Cryptanalysis  
pptpcryp.pdf
169442 bytes. (1999)
Cryptanalysis of Microsoft's PPTP Authentication Extensions
Cryptography  
ttm.pdf
200340 bytes. by Goubin/Courtois (2002)
Cryptanalysis of the TTM Cryptosystem
Cryptanalysis  
crypglos.txt
28469 bytes.
Crypto Glossary

hk_crypt.txt
34587 bytes.
Cryptography

crypto~1.txt
4495 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial - Intro
Cryptography  
part1.pdf
459189 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 1 of 8
Cryptography  
part2.pdf
431402 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 2 of 8
Cryptography  
part3.pdf
335679 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 3 of 8
Cryptography  
part4.pdf
112492 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 4 of 8
Cryptography  
part5.pdf
409249 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 5 of 8
Cryptography  
part6.pdf
197346 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 6 of 8
Cryptography  
part7.pdf
471526 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 7 of 8
Cryptography  
part8.pdf
83999 bytes. by P. Gutmann (1998)
Cryptography and Data Security Tutorial Part 8 of 8
Cryptography  
voynich.txt
9853 bytes.
Cryptography and John Dee - A true mystery

cryptref.txt
34087 bytes.
Cryptography references

crypfq01.txt
5254 bytes.
Cryptogrphy Faq Part 1

crypfq10.txt
17487 bytes.
Cryptogrphy Faq Part 10

crypfq02.txt
4098 bytes.
Cryptogrphy Faq Part 2

crypfq03.txt
8840 bytes.
Cryptogrphy Faq Part 3

crypfq04.txt
10136 bytes.
Cryptogrphy Faq Part 4

crypfq05.txt
20981 bytes.
Cryptogrphy Faq Part 5

crypfq06.txt
4773 bytes.
Cryptogrphy Faq Part 6

crypfq07.txt
3519 bytes.
Cryptogrphy Faq Part 7

crypfq08.txt
18253 bytes.
Cryptogrphy Faq Part 8

crypfq09.txt
8047 bytes.
Cryptogrphy Faq Part 9

cryptol1.txt
8235 bytes. (2000)
Cryptology Part 1
Cryptanalysis  
cuteftp.doc
1085 bytes.
CuteFTP 4.0.19 Password Encryption Routine
Cryptography  
mimic.pl
49566 bytes. (2001)
CyberArmy Spam Steganograpy SPM:
Source Code   Steganography  
desblt.txt
24471 bytes.
Data Encryption Standard

decrypt.txt
33577 bytes.
Decrypting The Puzzle Palace

decsspls.c
8460 bytes. (2002)
DeCSSPlus Alleged to be an improvement on the controversial DeCSS code

bt1419.txt
8568 bytes. (2003)
defeating Lotus Sametime "encryption"
Cryptanalysis  
bt32.txt
5819 bytes. (2003)
Defeating HTML "Encryption"
Cryptanalysis   World Wide Web  
defpgplm.doc
24064 bytes. by JD Glaser (1999)
Defeating PGP in NT with LanMan
Cryptography   Windows  
des_algo.txt
9358 bytes.
DES Algorithm changes

descrypt.txt
35357 bytes.
DES encryption shell

desval.txt
3074 bytes.
DES Validation List

blowfsh1.txt
30242 bytes.
Description of a new Variable-Length key, 64-bit block cipher (Blowfish)
Cryptography  
encryp~2.txt
8974 bytes. (1999)
Die Grundlagen der Verschlüsselung - The Basics of Cryptography in German
Cryptography   In German  
dpa.pdf
222534 bytes. by Kocher/Jaffe/Jun (1999)
Differential Power Analysis - White Paper
Cryptanalysis  
cslbull.txt
16637 bytes.
Digital Signature Standard

plaineng.htm
17973 bytes. (2000)
Dr. David S. Touretzky describes CSS Decryption in English.
Cryptography  
ei.txt
5632 bytes.
Encryption Information

merkle1.txt
6035 bytes.
Encryption paper from usenet (very technical)

enigma.txt
7407 bytes.
Enigma encryption simulation

euro-scr.htm
135041 bytes.
European Scrambling Systems FAQ 01/97

eurocryp.txt
27117 bytes.
Everything you wanted to know about Eurocrpyt
Cryptography  
merkle2.txt
9793 bytes.
Explanation of above by John Gilmore

cryt_faq.txt
123217 bytes.
FAQ for sci.crypt

fastdes.txt
8687 bytes.
Fast DES routines available from various Internet sites

flash-b.pdf
157815 bytes. (2002)
FLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography  
flash-c.pdf
84813 bytes. (2002)
FLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography  
pgpfaq.txt
25340 bytes.
Frequently asked questions about PGP encryption

a_crypt.txt
22476 bytes.
From CPSR: U.S. wants to outlaw the use & export of cryptography

zimpgp.txt
31462 bytes. (1993)
From sci.crypt: Secrets Agent. Story about computer encryption by a criminal
Cryptography  
ffp.pdf
173300 bytes. by THC (2002)
Fuzzy Fingerprints - Attacking Vulnerabilities in the Human Brain
Cryptography  
gpgman.pdf
204377 bytes. (2001)
Gnu Privacy Handbook
Cryptography  
gnupg3~1.htm
31125 bytes. by Fish Stiqz (2001)
GnuPG format string weakness
Advisory   Cryptography   Unix  
gnupg2.htm
5021 bytes. by F. Weimer (2000)
GnuPG trust issues
Advisory   Cryptography  
gpg1.htm
11007 bytes. by J. Small (2000)
GPG 1.0.3 can fail to detect message tampering
Advisory   Cryptography  
stopclip.gif
27254 bytes.
Grafitti: "Fuck Clipper, Stop the NSA"
Cryptography  
handbo~1.pdf
4857327 bytes. (1996)
Handbook of Applied Cryptography
Cryptography  
hdcp~1.htm
1532 bytes. by N. Ferguson (2001)
High-bandwidth Digital Content Protection system cracked
Advisory   Cryptography  
087.pdf
233169 bytes. by Courtois (2002)
Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt
Cryptography  
010.pdf
340426 bytes. by Courtois/Finiasz/Sendrier (2002)
How to achieve a McEliece based Digital Signature Scheme
Cryptography  
md5-attk.pdf
188863 bytes. by Xiaoyun Wang, Hongbo Yu (2005)
How to break MD5 and other hash functions
Cryptanalysis  
legal_kl.txt
4095 bytes.
How to legally circumvent PGP's "legal_kludge"

rot13.c
336 bytes.
How to ROT13 in C

icip00wm.pdf
59890 bytes.
Image Watermarking with Better Resilience
Steganography  
tr_cs91_.txt
32345 bytes.
Improving resistance to Differential Cryptanalysis and the redesign of LOKI

dns.txt
133944 bytes.
Info on Reverse and Double Reverse Lookups

cryptprg.txt
345946 bytes.
Info on state-of-the-art public key cryptography

clipper.txt
38364 bytes.
Info on the "Clipper" encryption chip

des.txt
22454 bytes.
Info on the DES standard in Encryption

ipgp0201.txt
21027 bytes.
Info-PGP Digest, 2.01

ipgp0202.txt
24168 bytes.
Info-PGP Digest, 2.02

ipgp0203.txt
29750 bytes.
Info-PGP Digest, 2.03

ipgp0204.txt
35834 bytes.
Info-PGP Digest, 2.04

ipgp0205.txt
43035 bytes.
Info-PGP Digest, 2.05

sslcrack.txt
6656 bytes.
Information on cracking Netscape's SSL encryption protocol

pgptrix.txt
74190 bytes.
Informative text file on PGP encryption and encryption in general

sp800-32.pdf
261376 bytes. by NIST (2001)
Introduction to Public Key Technology and the Federal PKI Infrastructure
Crayola Book   Cryptography  
iomega.htm
1925 bytes. by Aberrant (1999)
Iomega Jaz One-Step Backup password protected by weak XOR
Advisory   Cryptography  
pkeyring.txt
36209 bytes.
Jason's Public Key Compilation List 0.9

cuecatd.htm
6695 bytes. by D. Hull (2000)
JavaScript CueCat Decoder
Accessory   Cryptography  
a6121.htm
640 bytes. (2003)
JpegX password bypass
Steganography  
encryp~3.txt
9473 bytes. (1999)
La base de la Cryptographie - The Basics of Cryptography in french
Cryptography   In French  
csslect.txt
24187 bytes. (2000)
Lecture Notes from a lecture given at CMU on CSS
Cryptography  
oech03.pdf
242617 bytes. (2003)
Making a Faster Cryptanalytic Time-Memory Trade-Off
Cryptanalysis  
meekscrp.txt
11086 bytes.
Meeks on Cryptography

mmaker.htm
7850 bytes. by M. Power (2000)
Meeting Maker weak password cipher
Advisory   Cryptography   Windows  
merkle.txt
84223 bytes.
Merkle's paper on encryption

hmail1~1.htm
8755 bytes. by G. Duchemin (2001)
Messenger/Hotmail bug inpassword encryption
Advisory   Cryptography   Windows  
msdrm.txt
26565 bytes. by Beale Screamer (2001)
Microsoft's Digital Rights management Scheme
Cryptography  
800-20.pdf
1275531 bytes. by NIST (2000)
Modes of Operation Validation System for the Triple Data Encryption Algorithm
Cryptography  
mondo2k.txt
5049 bytes.
Mondo 2000 article on Senate bills S266 and S618 trying to include back doors in encrption software & PGP freeware that cam

crypto_2.txt
20964 bytes.
More from CPSR on the government and cryptography

v7-2065.htm
1549 bytes. by Gerardo Richarte (2005)
more MD5 colliding examples
Cryptography  
pkcs.htm
9755 bytes. by D. Bleichenbacher (1998)
Most software using PKCS#1 - ciphertext attack on SSL
Advisory   Cryptography   World Wide Web  
ntscpcrk.txt
3201 bytes.
Netscape Security has been cracked with $584 worth of computer time on a graphics workstation!

crypt-pw.htm
3994 bytes. by J. Lewis (1999)
Netsol's Auth Scheme Crypt-PW self-salting password encryption
Advisory   Cryptography  
cryptp~1.htm
9624 bytes. by P. Ajamian (2001)
Network Solutions Crypt-PW Weak Encryption
Advisory   Cryptography  
fips196.pdf
163546 bytes. (1997)
NIST FIPS-196: Entity Authentication Using Public Key Cryptography
Cryptography  
fips-197.pdf
279457 bytes. (2001)
NIST FIPS-197: The Advanced Encryption Standard
Cryptography  
csspab.txt
5453 bytes.
NIST Privacy Board Resolutions on Clipper technology

cracking.txt
19401 bytes.
Non-guessable random number generation in C

omnis.htm
5943 bytes. by E. Stevens (2000)
Omnis RAD environment weak field encryption
Advisory   Multi Platform   Cryptography  
crackpgp.txt
5533 bytes.
On "cracking" PGP

gsma3a8.txt
5714 bytes.
On A3 and A8 algorithms(sic) in GSM
Cryptography  
attakrip.txt
9877 bytes.
On Attacking RIPEM Systems
Cryptography  
111.pdf
255183 bytes. by Fuller/Millan (2002)
On Linear Redundancy in the AES S-Box
Cryptanalysis  
jsac98.pdf
159495 bytes. (1998)
On The Limits of Steganography
Steganography  
gsm-a5.txt
9501 bytes.
On the weakness of the A5 encryption algorithm used by GSM
Cryptography  
openssl2.htm
11867 bytes. by OpenSSL Advisory (2001)
OpenSSL up to 0.9.6a pseudorandom number generator design error
Advisory   Cryptography  
passwdex.htm
5676 bytes. by D. Roethlisberger (2000)
PassWD v1.2 weak cipher decoding
Cryptography   Exploit   Password Hacking  
passwd~1.htm
7098 bytes. by D. Roethlisberger (2001)
PassWD2000 v2.x weak encryption
Advisory   Cryptography  
pgp6.htm
3366 bytes. by ICZ (2001)
PGP - discover private keys!
Advisory   Cryptography  
pgp1.htm
3033 bytes. by P. Pedersen (2000)
PGP - what happens when two users have the same Key ID!
Advisory   Cryptography  
pgp2.htm
8825 bytes. by Caronni, Roessler, Waldvogel (2000)
PGP 5.0 randomness flaw
Advisory   Cryptography  
pgp5.htm
2012 bytes. by M. Kjorling (2001)
PGP 7.0 Key import code vulnerability
Advisory   Cryptography   Windows  
ciack070.htm
5959 bytes. by CIAC (2000)
PGP Additional Decryption Keys (ADKs) Vulnerability
Advisory   Cryptography  
pgp32.htm
1353 bytes. by USSR Labs (2000)
PGP Certificate Server Version 2.5.0, 2.5.1 Solaris/Win null memory problem
Advisory   Cryptography  
pgp7.htm
5576 bytes. by P. Birgersson (2001)
PGP Desktop Security 7.0 flaws in the Split Key implementation
Advisory   Cryptography  
pgp.txt
17224 bytes. (1999)
PGP Encryption for Beginners
Cryptography  
pgpstart.txt
27206 bytes.
PGP Startup Guide - DOS version

pgp4.htm
8293 bytes. by Young, Senderek, Early (2000)
PGP-5.5.3i, PGP-6.5.1i ADKs bug
Advisory   Cryptography  
pgp4pine.htm
6144 bytes. by V. Brennen (2001)
Pgp4pine-1.75-6 fails to properly identify expired keys
Advisory   Cryptography   Unix  
pgpf_sit.hqx
979695 bytes.
PGPFone for Macintosh
Cryptography   Macintosh/MacOS  
pgpfund.txt
4239 bytes.
Phil Zimmerman Defense Fund info. Phil Zimmerman is the author of the PGP

p-02580.txt
6701 bytes. (2001)
Phil Zimmermann: "No regrets" about developing PGP
Cryptography   Cyber Culture  
whthsecr.txt
29512 bytes. (1998)
Press briefing from the White House on Encryption.
Cryptography   Legal Info  
clipfact.txt
5108 bytes.
Press release on the hazards of Clipper

primes.txt
21041 bytes.
Primes, codes, and the National Security Agency

des_prob.txt
3946 bytes.
Problems with DES encryption by Ratsnatcher

nist_sec.txt
25358 bytes.
Proposed NIST Secure Hash Standard

pskatack.pdf
170493 bytes. (2003)
PSK Cracking using IKE Aggressive Mode
Cryptography   Internet  
pub_key.txt
345982 bytes.
Public Key Cryptography

crypt.txt
345952 bytes. (1990)
Public Key Cryptography
Cryptography  
800-2.txt
346035 bytes. by NIST (1991)
Public-Key Cryptography
Cryptography  
quartz-b.pdf
205901 bytes. by Courtois/Goubin/Patarin (2001)
Quartz, an asymmetric signature scheme for short signatures on PC
Cryptography  
rta51.htm
58584 bytes. by Biryukov/Shamir/Wagner (2000)
Realtime Cryptanalysis of A5/1 on a PC
Cryptanalysis  
sp800.pdf
229834 bytes. (2001)
Recommendation for Block Cipher Modes of Operation
Cryptography  
pgp2x.pdf
74244 bytes.
Replacing PGP 2.x with GPG
Cryptography  
clipfoia.txt
24532 bytes.
Results of Freedom of Information request about Clipper chip

rfc1319.txt
26638 bytes.
RFC 1319: MD2 Message-Digest Algorithm

rfc1320.txt
33555 bytes.
RFC 1320: MD4 Message-Digest Algorithm

rfc1321.txt
36427 bytes.
RFC 1321: MD5 Message-Digest Algorithm

rfc1421.txt
106296 bytes.
RFC 1421: Privacy Enhancement for Internet Electronic Mail, Part I: Message Encryption and Authentication Procedures

rfc1422.txt
87917 bytes.
RFC 1422: Privacy Enhancement for Internet Electronic Mail, Part II: Certificate-Based Key Management

rfc1423.txt
34083 bytes.
RFC 1423: Privacy Enhancement for Internet Electronic Mail, Part III: Algorithms, Modes, and Identifiers

rfc1424.txt
18058 bytes.
RFC 1424: Privacy Enhancement for Internet Electronic Mail, Part IV: Key Certification and Related Services

glossary.htm
433703 bytes. (1999)
Ritter's Crypto Glossary
Cryptography   Frequently Asked Questions  
szarka.asc
1640 bytes.
Rob Szarka, Sea of Noise (PGP Public Key)

cryp5210.htm
6762 bytes. (2002)
RSA and Diffie-Hellman keys are broken up to 1024bits in seconds
Cryptanalysis   Exploit  
rsa.txt
7407 bytes.
RSA encryption

cryp1faq.txt
53636 bytes. (1993)
RSA Encryption FAQ 1/3
Cryptography   Frequently Asked Questions  
cryp2faq.txt
60549 bytes. (1993)
RSA Encryption FAQ 2/3
Cryptography   Frequently Asked Questions  
cryp3faq.txt
55364 bytes. (1993)
RSA Encryption FAQ 3/3
Cryptography   Frequently Asked Questions  
cdc327.txt
14006 bytes. (1997)
S/KEY Vulnerabilities - Mudge

powcodes.txt
20261 bytes. (1994)
Sapphire Stream Cipher
Cryptography  
atalynx.txt
8500 bytes.
sci.crypt partial thread on the use of encryption in video games to prevent thir
Cryptography  
fip180-1.pdf
140819 bytes. (1995)
Secure Hash Standard
Cryptography  
securid.htm
14628 bytes. by I.C. Wiener (2001)
SecurID Token Emulator with Token Secret Import - easily breakable algorithm
Advisory   Cryptography  
pgp-ba~1.htm
21558 bytes. (2000)
Serious Bug in PGP!
Advisory   Cryptography  
sflash-b.pdf
155321 bytes. (2002)
SFLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography  
sflash-c.pdf
84549 bytes. (2002)
SFLASH, a Fast, Asymmetric Signature Scheme for Low-Cost Smartcards
Cryptography  
cdc_226.txt
15600 bytes. (1993)
Simple Cryptology by Dave Ferret

simpcryp.txt
3884 bytes.
Simple Encryption

skipjack.txt
27131 bytes.
Skipjack Review - includes the algorithm
Cryptography  
snowworx.txt
5311 bytes.
Snow - how whitespace encryption works
Steganography  
rsa_tatt.gif
45527 bytes.
Someone tattoed the "RSA in 3 lines of Perl" code on his arm!!!
Cryptography  
stegfaq.txt
15769 bytes.
Steganography FAQ
Frequently Asked Questions   Steganography  
submit.txt
138495 bytes.
Submissions to NIST CSSAB on encryption and CLIPPER technology initiative

zimmtest.txt
17709 bytes.
Testimony of Philip Zimmermann to the Subcommittee on Science, Technology and Space, of the U.S. Senate Committee on Commerce,

breakdes.txt
11051 bytes. (1993)
Text on "breaking" DES encryption. Tells about the new decryption techniques, etc.
Cryptography  
s_box_ex.txt
9322 bytes.
Text on the "S" boxes for DES. Talks mostly about the weaknesses of DES

sdmi.htm
44794 bytes.
The banned paper - "Reading Between the Lines - the SDMI Challenge"

encryp~1.txt
8428 bytes. (1999)
The Basics of Cryptography
Cryptography  
schneier.c
13165 bytes.
The Blowfish Algorithm

cloak.txt
14139 bytes. (1990)
The Cloak Crypto Scheme
Cryptography  
upc.txt
261 bytes. (2001)
The CueCat UPC-A Cipher (or why writing a program to "decode" CueCat output is trivial)
Cryptography  
chaum_di.txt
34191 bytes. by Chaum
The Dining Cryptographers Problem

pooshe.htm
182004 bytes. (2000)
The DVD Logo made out of the CSS descrambler source code!
Cryptography  
history.txt
9359 bytes. (1988)
The History of Enigma
Cryptography  
pgpup.txt
20671 bytes. (1993)
The Internet Code Ring! An Interview with Phil Zimmerman
Cryptography  
fips-198.pdf
177180 bytes. (2002)
The Keyed-Hash Message Authentication Code (HMAC)
Cryptography  
faults.txt
5011 bytes.
The Next Stage of Differential Fault Analysis

pgpatack.txt
33090 bytes. (1995)
The PGP Attack FAQ, beta v.10 on the theoretical possibility of cracking RSA
Cryptography   Frequently Asked Questions  
ppfaq104.txt
35664 bytes.
The PGP Passphrase FAQ

rijndael.pdf
1043552 bytes. (1999)
The Rijndael (AES) Specification
Cryptography  
key_st.txt
64508 bytes. (1997)
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
Cryptography  
perlrsa2.gif
13230 bytes.
The RSA algorithm on a bumpersticker - Slightly more readable OCR font
Cryptography  
perl_rsa.gif
13240 bytes.
The RSA algorithm on a bumpersticker ...Conveniently OCRable
Cryptography  
sapphire.txt
27496 bytes.
The Sapphire II Stream Cipher
Cryptography  
fips1802.pdf
296515 bytes. (2002)
The Secure Hash Standard
Cryptography  
page1.gif
40746 bytes. (2000)
This is not DeCSS, it is a PICTURE of DeCSS, for study of the process. 1 of 3
Cryptography  
page2.gif
28079 bytes. (2000)
This is not DeCSS, it is a PICTURE of DeCSS, for study of the process. 2 of 3
Cryptography  
page3.gif
12964 bytes. (2000)
This is not DeCSS, it is a PICTURE of DeCSS, for study of the process. 3 of 3
Cryptography  
gpg106sg.txt
761 bytes. (2001)
This is the signature for the GnuPG 1.06 Tarball
Cryptography  
timing.pdf
211673 bytes. by P. Kocher (1995)
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
Cryptanalysis  
yeltsinb.txt
13072 bytes.
Translation of Boris Yeltsin's decree banning crypto in Russia
Cryptography   Legal Info  
cryptec.pdf
229457 bytes. by T. Moh (2002)
TTM - A Fast Public Key System With Signature And Master Key Functions
Cryptography  
ca200104.txt
7503 bytes. by CERT (2001)
Unauthentic "Microsoft Corporation" certificates
Advisory   Cryptography  
st04-018.htm
8496 bytes. by CERT (2004)
Understanding Digital Signatures
Cryptography  
st04-019.htm
6520 bytes. by CERT (2004)
Understanding Encryption
Cryptography  
upccode.txt
5787 bytes.
UPC Codes cracked
Cryptography  
conmar93.txt
47659 bytes.
USAF Cryptologic Support Center Newsletter 03/10/93

arrl.txt
18465 bytes.
Use of public key encryption on BBS networks

techdes.txt
41459 bytes.
Validated hardware DES devices

schemes.doc
111104 bytes. (2000)
Watermarking Schemes Evaluation
Steganography  
securid.ps
570661 bytes.
Weaknesses in SecurID
Cryptography  
rc4_ksa.pdf
329823 bytes. (2001)
Weaknesses in the Key Scheduling Algorithm of RC4
Wireless   Cryptography  
zippass.txt
4807 bytes.
Zip Encryption: Is it secure?

skey.txt
11048 bytes.
Description of the S/KEY One-time password system

skeyflaw.txt
11419 bytes.
Vulnerabilities in the S/KEY One-time password system


lol, wtf?
1 Whoa, bro... Access denied for user 'root'@'localhost' (using password: NO)



The bar is open!

The new 10,000 drink recipe archive has arrived!

It's back! TUCoPS Text Archive

System Security - General Information - Countersecurity Techniques - Password Security - Internet - Broken Security Apps - Browsers - Web - Web Servers - Apache - IIS - Sites - Web Apps - CMS, Portals - e-Commerce - Blogs - Wiki - Guestbooks - Adminware - PHP - Web Forums - Popular Web Forums - Networks - Wireless - Unix - HP/UX - SGI - BSD - SCO - SunOS/Solaris - Unix-like Platforms - Cisco - Oracle - VMWare - Citrix - Network Appliances - Macintosh - Apple(multi) - HP(multi) - IBM(multi) - Microsoft(multi) - Handhelds - Games - Linux - Linux Apps A-M - Linux Apps N-Z - Red Hat/Fedora - Slackware - Debian - Mandriva/Mandrake - Gentoo - SuSE - Conectiva - Trustix - Ubuntu - Retro Linux - Antique Systems - Dialup BBSes Windows Windows Apps Windows Network Vulns
Telecom Security - General Telecom Security - Phreak Boxes - Major Cellular Brands - Other Cellular Brands - Cellular Misc. - Number Lists - Caller ID - Public Phones - Voice Mail - Asterisk - Technical System Info
/etc - Hardware Hacks - Crypto - Malware - PC Hacks - Radio Hacks - Television Hacks - Scams - Physical Security - Espionage - Privacy - Wetware Hacks - Hacker Counterculture - The Law - Totally Miscellaneous


Hardware 99
Are you working with older hardware like us? If you're using the same equipment we are, you probably need service information complete with vacuum tube pinouts and daily coal requirements. This archive isn't quite that old but it is a definite help to anyone who has a PC that is not brand-new anymore. And it's free!

It's Back!
PC Game Sniper 2007
Thousands of cheats, hints, hacks and walkthroughs for PC Games!

Food!
Our parent site, THC BBS, has returned and brought a huge new text archive with it, containing over 61,000 recipes! And like everything at the AOH complex, it's free!

Security and Computing Freedom Archives

InfoSec News 2005
InfoSec News 2006
InfoSec News 2007
InfoSec News 2008
InfoSec News 2009

InfoSec News 2010

PoliTech 2005
PoliTech 2006
PoliTech 2007
PoliTech 2008
PoliTech 2009


Over 4,000 default passwords
Updated Oct.02,2011



Bored? Play some Games!


Text files by
The Fixer, El Oscuro
AOH Staff
and AOH Contributors
!
Phone Sounds
More Phone Sounds
The Fixer's Phreak Box Review
Box Review Handy Index!
Orange Boxing FAQ
Beating Caller ID FAQ
S.O.B. Orange Box
(NEW Version 1.94 2009)

More Caller ID Info
Phrack, Inc.!
Latest (final???) Issue: #63

Updated Nov.26/2006
More Payphone Info

Click here to get it!


It's Back! Check it out now!
New Site: Things I Shot!
Put your cell cam to good use!

The Web Page You Have Reached is now...
This is a Recording (formerly The Web Page You Have Reached)
And you thought we had a lot of telephone sounds!

Rancho Nevada - the biggest, baddest, best BBS game ever written!


easter egg #71

Site design & layout copyright © 1986-2014 THC