1996-07-09 - [Announcement] - Crypto library for Java available

Header Data

From: Gary Howland <gary@systemics.com>
To: N/A
Message Hash: 034e0f8ab9e29344c8b2b4a3a1130592e375d09b7deb1795d2f7db56ca10da0f
Message ID: <31E159E2.1CFBAE39@systemics.com>
Reply To: N/A
UTC Datetime: 1996-07-09 00:57:30 UTC
Raw Date: Tue, 9 Jul 1996 08:57:30 +0800

Raw message

From: Gary Howland <gary@systemics.com>
Date: Tue, 9 Jul 1996 08:57:30 +0800
Subject: [Announcement] - Crypto library for Java available
Message-ID: <31E159E2.1CFBAE39@systemics.com>
MIME-Version: 1.0
Content-Type: text/plain


The Systemics Cryptix crypto library for Java is now available for
download at http://www.systemics.com/software/

The library is FREE FOR COMMERCIAL AND NON-COMMERCIAL USE.

Apart from much tidying up, there have been several signigicant additions
to the library, including a Blowfish implementation, RSA encryption
(including key generation routines), CFB and CBC block cipher mode modules,
and a cryptographically secure random InputStream.

Enjoy!

                CRYPTIX 1.1 - CRYPTOGRAPHIC EXTENSIONS FOR JAVA


     _________________________________________________________________

                                  DESCRIPTION

   This library contains a suite of cryptographic classes for Java. Some
   of the classes have been implemented in native code for performance
   reasons, and have been tested on Windows 95, Windows NT, Solaris,
   Linux and IRIX.

   The package documentation is available on line.

                                   FEATURES

   All of the following have been implemented:
     * java.crypt.BlockCipher
       This class is a base class for all block ciphers.
     * java.crypt.Blowfish (based on code from A.M. Kuchling, Bryan Olson
       and Bruce Schneier)
       An implementation of Bruce Schneier's Blowfish block cipher.
     * java.crypt.CipherFeedback
       A class for implementing the cipher feedback mode of block cipher
       encryption.
     * java.crypt.CSRandomStream
       A cryptographically secure pseudo random input-stream.
     * java.crypt.DES (based on code from Eric Young)
       An implementation of the DES block cipher.
     * java.crypt.HashMD5
       An class encapsulating MD5 hashes.
     * java.crypt.HashSHA
       An class encapsulating SHA hashes.
     * java.crypt.IDEA
       An implementation of the IDEA block cipher algorithm. Based on
       native libraries.
     * java.crypt.MD5 (based on code from RSA Data Security, Inc.)
       An implementation of the MD5 message digest algorithm. Based on
       native libraries.
     * java.crypt.MD5OutputStream
       An output stream the creates an MD5 hash of its input.
     * java.crypt.MessageDigest
       A base class for all messsage digest algorithms.
     * java.crypt.MessageDigestOutputStream
       A class for using message digest functions to hash an output
       stream.
     * java.crypt.MessageHash
       A base class for classes encapsulating hashes.
     * java.crypt.rsa.PublicKey
       An RSA public key.
     * java.crypt.rsa.RSAKeyGen
       A class for generating RSA public/secret key pairs.
     * java.crypt.rsa.SecretKey
       An RSA secret key.
     * java.crypt.SHA (based on code from NIST and Peter C. Gutmann)
       An implementation of NISTs SHA message digest algorithm. Based on
       native libraries.
     * java.crypt.SHAOutputStream
       An output stream the creates an SHA hash of its input.
     * java.crypt.StreamCipher
       A base class for stream ciphers.
     * java.math.BigInteger (based on code from Eric Young).
       This class implements arbitrary length integers and some
       associated mathematical functions. Based on native libraries.
     * java.math.MPI
       A class for converting BigIntegers to and from MPI format
       integers.
     * java.math.PRNG
       A class for generating a pseudo random sequence with a period of
       2**160.
     * java.math.RandomStream
       An input stream that is random.
     * java.math.TestPrime
       A class for testing the primality of BigIntegers.

                                   COPYRIGHT

   This library includes (or is derived from) software developed by (and
   owned by) the following:
     * Peter C. Gutmann
     * A.M. Kuchling
     * NIST
     * Bryan Olson
     * RSA Data Security, Inc.
     * Bruce Schneier
     * Eric Young &lteay@mincom.oz.au>


   Other parts of the library are covered by the following licence:

   Copyright (c) 1995, 1996 Systemics Ltd (http://www.systemics.com/) All
   rights reserved.

   This library and applications are FREE FOR COMMERCIAL AND
   NON-COMMERCIAL USE as long as the following conditions are adhered to.


   Copyright remains with Systemics Ltd, and as such any Copyright
   notices in the code are not to be removed. If this code is used in a
   product, Systemics should be given attribution as the author of the
   parts used. This can be in the form of a textual message at program
   startup or in documentation (online or textual) provided with the
   package.

   Redistribution and use in source and binary forms, with or without
   modification, are permitted provided that the following conditions are
   met:
    1. Redistributions of source code must retain the copyright notice,
       this list of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright
       notice, this list of conditions and the following disclaimer in
       the documentation and/or other materials provided with the
       distribution.
    3. All advertising materials mentioning features or use of this
       software must display the following acknowledgement:

        This product includes software developed by Systemics Ltd
                (http://www.systemics.com/)


   THIS SOFTWARE IS PROVIDED BY SYSTEMICS LTD ``AS IS'' AND ANY EXPRESS
   OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
   WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
   DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR
   ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
   DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
   GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
   INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
   IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
   OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
   ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

   The licence and distribution terms for any publically available
   version or derivative of this code cannot be changed. i.e. this code
   cannot simply be copied and put under another distribution licence
   [including the GNU Public Licence.]


     _________________________________________________________________





Thread