[comp.lang.pascal] DES encryption

00156811@ysub.ysu.edu (04/26/91)

HELP!!!!!

I need a source for the DES encryption routine using full DES cipher feedback
mode of operation.  It should have the capability of single or dual keys,
dual keys means you can have a master key for the installer and if the user
forgets the password, the installer could retreive the data using the master
password (key).  It should also have the capability of compressing the data
as it encrypts the file.

             Thanks
             Robert R. Dell

buckland@cheddar.ucs.ubc.ca (Tony Buckland) (04/27/91)

In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
>I need a source for the DES encryption routine using full DES cipher feedback
>mode of operation.

 Please note that this group extends beyond U.S. boundaries, so
 any followup should be governed by U.S. regulations on export of
 encryption methods.

cctr132@csc.canterbury.ac.nz (Nick FitzGerald, CSC, Uni. of Canterbury, NZ) (04/29/91)

In article <1991Apr26.200513.1844@unixg.ubc.ca>, buckland@cheddar.ucs.ubc.ca
(Tony Buckland) writes:
> In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
>>I need a source for the DES encryption routine using full DES cipher feedback
>>mode of operation.
> 
>  Please note that this group extends beyond U.S. boundaries, so
>  any followup should be governed by U.S. regulations on export of
>  encryption methods.

Well, in NZ we all read the fine articles in DDJ last Sept-Nov (can't
remember exactly) about DES encryption _and the source code_ for implementing
it.  Doesn't provide all the original poster requested, but might be a useful
start (yeah, yeah - source is in C and I limited my followup to the Pascal
group).

Enjoy

---------------------------------------------------------------------------
 Nick FitzGerald, PC Applications Consultant, CSC, Uni of Canterbury, N.Z. 
 Internet: n.fitzgerald@csc.canterbury.ac.nz        Phone: (64)(3) 642-337 

buckland%cheddar.ucs.ubc.ca@cunyvm.cuny.edu (Tony Buckland) (04/30/91)

>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
>>I need a source for the DES encryption routine using full DES cipher feedback
>>mode of operation.

> Please note that this group extends beyond U.S. boundaries, so
> any followup should be governed by U.S. regulations on export of
> encryption methods.

What is this all about. Are encryption routines controlled by government
in the United States of 'Great' America ???? I thougt it was a free country.
I'm glad to live in Belgium then !!!!

Greetings from Belgium with no encryption regulations,
Johan Berteloot
University of Antwerp

ts@uwasa.fi (Timo Salmi) (05/01/91)

In article <26707@adm.brl.mil> buckland%cheddar.ucs.ubc.ca@cunyvm.cuny.edu (Tony Buckland) writes:
>>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
:
>> Please note that this group extends beyond U.S. boundaries, so
>> any followup should be governed by U.S. regulations on export of
>> encryption methods.
>
>What is this all about. Are encryption routines controlled by government
>in the United States of 'Great' America ???? I thougt it was a free country.
>I'm glad to live in Belgium then !!!!

It is about legislation living in a world apart from today's
realities of international communication.  Just unrealistic remnants
of a nation state with respect to the free flow of information. 

...................................................................
Prof. Timo Salmi
Moderating at garbo.uwasa.fi anonymous ftp archives 128.214.12.37
School of Business Studies, University of Vaasa, SF-65101, Finland
Internet: ts@chyde.uwasa.fi Funet: gado::salmi Bitnet: salmi@finfun

Kai_Henningsen@ms.maus.de (Kai Henningsen) (05/01/91)

Tony Buckland buckland%cheddar.ucs.ubc.ca @ SUB schrieb am 26.04.1991, 18:05

TB>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
TB>>I need a source for the DES encryption routine using full DES cipher
feedback
TB>>mode of operation.
TB>
TB> Please note that this group extends beyond U.S. boundaries, so
TB> any followup should be governed by U.S. regulations on export of
TB> encryption methods.

By the way, also note that most people find these regulations quite offensive
(and not sensible as well, as they are quite easily circumvented) ...

MfG Kai

rodney@tyrell.stgt.sub.org (Rodney Volz) (05/02/91)

In article <1991Apr26.200513.1844@unixg.ubc.ca> buckland@cheddar.ucs.ubc.ca (Tony Buckland) writes:
>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
>>I need a source for the DES encryption routine using full DES cipher feedback
>
> Please note that this group extends beyond U.S. boundaries, so
> any followup should be governed by U.S. regulations on export of
> encryption methods.

What about GNU login, which is available in other countries as well?
When exactly do the export restrictions apply?

Are the U.S. Government regulations concerning DES or simillar
algorithms still considered?

-Rodney
-- 
                     Rodney Volz - 7000 Stuttgart 1 - FRG
 ============> ...uunet!mcsun!unido!gtc!aragon!tyrell!rodney <=============
  rodney@tyrell.gtc.de * rodney@delos.stgt.sub.org * rodney@mcshh.hanse.de 
  \_____________ May your children and mine live in peace. ______________/

bobb@vice.ICO.TEK.COM (Bob Beauchaine) (05/02/91)

In article <26707@adm.brl.mil> buckland%cheddar.ucs.ubc.ca@cunyvm.cuny.edu (Tony Buckland) writes:
>>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
>>>I need a source for the DES encryption routine using full DES cipher feedback
>>>mode of operation.
>

  Try _Numerical_Methods_in_Pascal_, sorry author unknown.  It's an
  overall excellent book on coding and choosing most general purpose
  numerical routines, including DES.

  BTW, it should not be a problem for international use since the
  DES standard states that *NO* DES implementation in software is
  considered secure.

/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ 

Bob Beauchaine bobb@vice.ICO.TEK.COM 

C: The language that combines the power of assembly language with the 
   flexibility of assembly language.

richardw@uunet.uu.net (05/03/91)

|>From: Bob Beauchaine <uunet!vice.ico.tek.com!bobb>
|
|
|  BTW, it should not be a problem for international use since the
|  DES standard states that *NO* DES implementation in software is
|  considered secure.

That's not the point.  The point is, *use* of the DES algorithm is regulated
by the federal government here in the States.  Outside of US borders, most
countries have fewer restrictions (I don't remember what the COCOM rules are
about DES).  If you write something for use strictly within the US, then there
are no rules -- as yet.  However, if you code up the the DES algorithm, then
transmit it outside of the country, you risk serious attention from the
government.

The warning was that if someone posts code for DES, then it will get relayed
all over the world, and people at the US Department of State will get very
annoyed, because that counts as *unlicensed export of encryption technology*.
They have a very heavy hand for dealing with things like that.

If you want the algorithm itself, it's written up in a variety of places.  One
of the nicer ones was in a French book, actually.  You can also find it in
Andy Tannebaum's "Computer Networks," Dorothy Denning's "Cryptography," or
you can even write to the US government printing office and ask for a copy of
the original spec.  Costs about US$10.

I'm not saying this is the way life should be.  If you don't like it, write
to your congresscritter.

-Richard Ward
Distributed Security Group
uunet!microsoft!richardw
microsoft!richardw@uunet.uu.net
The above has no relation to Microsoft corporate policy.