Hi people, I where trying to find a good source of the algorithms for implementation of each of them, I have finded some specification http://csrc.nist.gov/ .

Because there are only centrated in FIPS-approved algos.


mmm, watching more deeply in what I have finded I see this one http://www.tcs.hut.fi/~helger/crypto/

I guess with this two is more than suficient, there are another one that you have?
Posted on 2004-12-04 14:31:41 by rea
http://fp.gladman.plus.com/cryptography_technology/index.htm
Posted on 2004-12-05 11:37:13 by f0dder
http://fp.gladman.plus.com/cryptography_technology/index.htm
Posted on 2004-12-05 11:37:18 by f0dder
Posted on 2004-12-05 15:13:36 by drizz
Thanks.

I have finded a algo that look easy to implement (not like DES), I some time a go... much time a go was trying to implement DES, was very hard, now I read that is designed for by encrypted by hardwre and not specifically software, pheraphs that was the reason for what I find it dificult ;), lol, tigger look like a "easy" algo :), I need a hash for do a little programm related to signatures of files :).... I can use hash for this porpuose?... or is like I understand :D.
Posted on 2004-12-05 19:49:13 by rea
i'm not competent enough to talk about cryptography,
but are you sure you can't use something simpler regarding signatures (altough tiger is easy 8) you can find .asm on my www)
Posted on 2004-12-06 12:47:22 by drizz
Yes, I select it because aparently is easy :), let my try first, then I go with your one.

What more simple than a hash?
Posted on 2004-12-06 14:17:37 by rea
Try using SHA
Posted on 2004-12-07 04:41:37 by roticv
But in the paper say that tigger is a little more fast than SHA or at more the same speed, even in 32 bits (because is suposed to be optimized for 64-bits), anyway, havent readed muchs about SHA :), I will look at.
Posted on 2004-12-07 08:56:15 by rea
Taking a look at your page drizz, nice (havent do it before ;) ) will check your crypto library :).
Posted on 2004-12-10 21:32:36 by rea