-----BEGIN PGP SIGNED MESSAGE----- Now, I can proudly present 2 new encryption libraries for the XPK package. As on aminet only weak cryptography is allowed, I cannot upload these libs. BUT: You may download them from my homepage: http://www.informatik.uni-leipzig.de/privat/dpauli/public_html/home.html The xpkBLFH.library has been available since Jan '97, but the first versions for the plain 68000 systems seemed to be corrupt. You may download a fixed and a bit faster version now. The second library is xpkCAST. That library combines the speed of xpkFEAL with the security of xpkIDEA. For speed see the following table: Results from a benchmark of XPK-Encryption-Sublibs Machine: A4000T/68040@25MHz/OS3.1/setpatch43.6/18 MB Ram Testfile: an 1,500,000 bytes large File located in RAM: The test was done by dragging the file to the appicon of xDrop on the workbench. If available, the Turbo-Versions of the sublibs are used. All computations are done in Mode CBC. Sublibrary | En-/Decryption-Speed | Keylength | Remarks ---------------+-----------------------+-----------+------------------------- BLFH | 125KB/s | <=56 bytes| until now, there is no | | | other method in breaking | | | this algorithm than | | | testing all possible | | | keys. *) see below ---------------+-----------------------+-----------+------------------------- CAST | 190KB/s | <=10 bytes| same as BLFH +-----------------------+-----------+------------------------- | 126KB/s |11-16 bytes| same as BLFH ---------------+-----------------------+-----------+------------------------- IDEA | 152KB/s | <=16 bytes| same as BLFH ---------------+-----------------------+-----------+------------------------- FEAL | | | "fastest" | 364KB/s | | broken by S. Murphy (4 rounds) | | | -----------+-----------------------+ +------------------------- "fast" | 310KB/s | | broken by Biham & Shamir (8 rounds) | | | -----------+-----------------------+ +------------------------- "safe" | 254KB/s | <= 8 bytes| broken by Biham & Shamir (16 rounds)| | | with the use of differ- | | | ential kryptanalysis. | | | -----------+-----------------------+ +------------------------- "safer" | 163KB/s | | same as BLFH (32 rounds)| | | -----------+-----------------------+ +------------------------- "safest" | 106KB/s | | same as BLFH (64 rounds)| | | ---------------+-----------------------+-----------+------------------------- BLFH uses the Blowfish-algorithm by Bruce Schneider. CAST uses the CAST-128-algorithm by C. Adams. IDEA uses the "International Data Encryption Algorithm" by X. Lai & Prof. Dr. L. Massey FEAL uses the FEAL-N-algorithm by A. Shimizu & S. Miyaguchi at NTT Japan. *) Remark to the xpkBLFH-Algorithm: The algorithm used in versions up to 1.4 seemed to have a bug, that made the encryption easyly breakable, if -- and only if -- the pw contained characters above to 0x7F; see the doc for details; Beginning with V 1.5 this is FIXED Cheers, Dirk Pauli dpauli@aix520.informatik.uni-leipzig.de -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQEVAwUBNRVXVdyrqmOUNG4tAQFDDwf+J/yKoXiyl9/1XWGr9PpO8Q2P6rHNYHIO +tpa9nTFDK4We6VQuaTF5RrcNeW0wbrc5RzRYLZSnwDXm9KjTq+EBvy3zW7tgxkG AGs42dMZPpGydFzQYqyX3SsjFXkKkWF1HGo2x97kqwXRYH7YjfhZISQbUJTcke6x 4bMpN/9OhStxZVwNWUvCpNgyOtOsRoQipfXYkVBTAHFSOxxARwL4AdWmMyIhT2oj SEEL05NS8oMCu5blCdXcg1c1f8bC9x9J6qNhOVfKC1E0W0DzkHfwXTQ9UiOxZ5Ay eCF3UOF/eHEWLw9pfiCYsiwwySUmMGbmHMEu1KM+9lSVqa2ezLAQ+Q== =gkIO -----END PGP SIGNATURE-----