00156811@ysub.ysu.edu (04/26/91)
HELP!!!!! I need a source for the DES encryption routine using full DES cipher feedback mode of operation. It should have the capability of single or dual keys, dual keys means you can have a master key for the installer and if the user forgets the password, the installer could retreive the data using the master password (key). It should also have the capability of compressing the data as it encrypts the file. Thanks Robert R. Dell
buckland@cheddar.ucs.ubc.ca (Tony Buckland) (04/27/91)
In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes: >I need a source for the DES encryption routine using full DES cipher feedback >mode of operation. Please note that this group extends beyond U.S. boundaries, so any followup should be governed by U.S. regulations on export of encryption methods.
cctr132@csc.canterbury.ac.nz (Nick FitzGerald, CSC, Uni. of Canterbury, NZ) (04/29/91)
In article <1991Apr26.200513.1844@unixg.ubc.ca>, buckland@cheddar.ucs.ubc.ca (Tony Buckland) writes: > In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes: >>I need a source for the DES encryption routine using full DES cipher feedback >>mode of operation. > > Please note that this group extends beyond U.S. boundaries, so > any followup should be governed by U.S. regulations on export of > encryption methods. Well, in NZ we all read the fine articles in DDJ last Sept-Nov (can't remember exactly) about DES encryption _and the source code_ for implementing it. Doesn't provide all the original poster requested, but might be a useful start (yeah, yeah - source is in C and I limited my followup to the Pascal group). Enjoy --------------------------------------------------------------------------- Nick FitzGerald, PC Applications Consultant, CSC, Uni of Canterbury, N.Z. Internet: n.fitzgerald@csc.canterbury.ac.nz Phone: (64)(3) 642-337
buckland%cheddar.ucs.ubc.ca@cunyvm.cuny.edu (Tony Buckland) (04/30/91)
>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes: >>I need a source for the DES encryption routine using full DES cipher feedback >>mode of operation. > Please note that this group extends beyond U.S. boundaries, so > any followup should be governed by U.S. regulations on export of > encryption methods. What is this all about. Are encryption routines controlled by government in the United States of 'Great' America ???? I thougt it was a free country. I'm glad to live in Belgium then !!!! Greetings from Belgium with no encryption regulations, Johan Berteloot University of Antwerp
ts@uwasa.fi (Timo Salmi) (05/01/91)
In article <26707@adm.brl.mil> buckland%cheddar.ucs.ubc.ca@cunyvm.cuny.edu (Tony Buckland) writes: >>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes: : >> Please note that this group extends beyond U.S. boundaries, so >> any followup should be governed by U.S. regulations on export of >> encryption methods. > >What is this all about. Are encryption routines controlled by government >in the United States of 'Great' America ???? I thougt it was a free country. >I'm glad to live in Belgium then !!!! It is about legislation living in a world apart from today's realities of international communication. Just unrealistic remnants of a nation state with respect to the free flow of information. ................................................................... Prof. Timo Salmi Moderating at garbo.uwasa.fi anonymous ftp archives 128.214.12.37 School of Business Studies, University of Vaasa, SF-65101, Finland Internet: ts@chyde.uwasa.fi Funet: gado::salmi Bitnet: salmi@finfun
Kai_Henningsen@ms.maus.de (Kai Henningsen) (05/01/91)
Tony Buckland buckland%cheddar.ucs.ubc.ca @ SUB schrieb am 26.04.1991, 18:05
TB>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes:
TB>>I need a source for the DES encryption routine using full DES cipher
feedback
TB>>mode of operation.
TB>
TB> Please note that this group extends beyond U.S. boundaries, so
TB> any followup should be governed by U.S. regulations on export of
TB> encryption methods.
By the way, also note that most people find these regulations quite offensive
(and not sensible as well, as they are quite easily circumvented) ...
MfG Kai
rodney@tyrell.stgt.sub.org (Rodney Volz) (05/02/91)
In article <1991Apr26.200513.1844@unixg.ubc.ca> buckland@cheddar.ucs.ubc.ca (Tony Buckland) writes: >In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes: >>I need a source for the DES encryption routine using full DES cipher feedback > > Please note that this group extends beyond U.S. boundaries, so > any followup should be governed by U.S. regulations on export of > encryption methods. What about GNU login, which is available in other countries as well? When exactly do the export restrictions apply? Are the U.S. Government regulations concerning DES or simillar algorithms still considered? -Rodney -- Rodney Volz - 7000 Stuttgart 1 - FRG ============> ...uunet!mcsun!unido!gtc!aragon!tyrell!rodney <============= rodney@tyrell.gtc.de * rodney@delos.stgt.sub.org * rodney@mcshh.hanse.de \_____________ May your children and mine live in peace. ______________/
bobb@vice.ICO.TEK.COM (Bob Beauchaine) (05/02/91)
In article <26707@adm.brl.mil> buckland%cheddar.ucs.ubc.ca@cunyvm.cuny.edu (Tony Buckland) writes: >>In article <91115.18385400156811@ysub.ysu.edu> 00156811@ysub.ysu.edu writes: >>>I need a source for the DES encryption routine using full DES cipher feedback >>>mode of operation. > Try _Numerical_Methods_in_Pascal_, sorry author unknown. It's an overall excellent book on coding and choosing most general purpose numerical routines, including DES. BTW, it should not be a problem for international use since the DES standard states that *NO* DES implementation in software is considered secure. /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\ Bob Beauchaine bobb@vice.ICO.TEK.COM C: The language that combines the power of assembly language with the flexibility of assembly language.
richardw@uunet.uu.net (05/03/91)
|>From: Bob Beauchaine <uunet!vice.ico.tek.com!bobb> | | | BTW, it should not be a problem for international use since the | DES standard states that *NO* DES implementation in software is | considered secure. That's not the point. The point is, *use* of the DES algorithm is regulated by the federal government here in the States. Outside of US borders, most countries have fewer restrictions (I don't remember what the COCOM rules are about DES). If you write something for use strictly within the US, then there are no rules -- as yet. However, if you code up the the DES algorithm, then transmit it outside of the country, you risk serious attention from the government. The warning was that if someone posts code for DES, then it will get relayed all over the world, and people at the US Department of State will get very annoyed, because that counts as *unlicensed export of encryption technology*. They have a very heavy hand for dealing with things like that. If you want the algorithm itself, it's written up in a variety of places. One of the nicer ones was in a French book, actually. You can also find it in Andy Tannebaum's "Computer Networks," Dorothy Denning's "Cryptography," or you can even write to the US government printing office and ask for a copy of the original spec. Costs about US$10. I'm not saying this is the way life should be. If you don't like it, write to your congresscritter. -Richard Ward Distributed Security Group uunet!microsoft!richardw microsoft!richardw@uunet.uu.net The above has no relation to Microsoft corporate policy.