Welcome to the BeeCrypt crypto library! Copyright (c) 1997-2000 Virtual Unlimited B.V. Author: Bob Deblier This library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA For the specifics of this license, see file 'LICENSE', included in this distribution. About BeeCrypt: This library is an ongoing project of Virtual Unlimited B.V. Its goal is to provide strong and fast cryptography for use by our products, but we're not limiting the use to that. We're releasing it under the LGPL license, because we feel that cryptography should be open to inspection by everybody, and available for use by everybody to safeguard privacy. Note that depending on where you are, the use of cryptography may be limited or forbidden by law. Before using this library, make sure you are legally entitled to do so. For more on Virtual Unlimited B.V. and our products please consult our website: http://www.virtualunlimited.com Most of the algorithms are implemented from reliable sources such as: "Handbook of Applied Cryptography" Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone CRC Press "Applied Cryptography", second edition Bruce Schneier Wiley For crypto enthusiasts these books are invaluable background material. IEEE P1363 "Standard Specifications for Public Key Cryptography" is a very interesting draft standard, which we will try to comply with. The structures in the library are geared towards exchange with Java and its security and cryptography classes. We already have quite a number of cryptographic classes developed in Java, which will be released in the future in another open source project. Included in the library are: - entropy sources for initializing pseudo-random generators - pseudo-random generators: FIPS-186, Mersenne Twister - block ciphers: Blowfish - hash functions: SHA-1 - keyed hash functions: SHA-1/HMAC - multi-precision integer library, with assembler-optimized routines - probabilistic primality testing, with optimized small prime trial division - discrete logarithm parameter generation over a prime field - Diffie-Hellman key agreement - ElGamal signature scheme (two variants) Planned for the near future are: - compliance with and compliance statements for IEEE P1363 - DHAES - DSA (i.e. the rest of FIPS-186) - more blockciphers (Twofish, Rijndael, ... ) - more hash functions (RIPEMD-160, HAVAL, ... ) - Elliptic Curves (ECDSA, ... ) The library has been tested on the following platforms: - Solaris 2.6 Sparc, Solaris 2.7 Sparc - includes assembler optimization for ultrasparc - Linux glibc 2.x x86 - includes assembler optimization (tuned for Pentium Pro and higher) - Linux glibc 2.x ppc - includes assembler optimization (generic 32-bit PowerPC) - Win32 (Windows 95, 98, NT 4.0) - includes assembler optimization (tuned for Pentium Pro and higher) - once the entropy provider bug is fixed (see BUGS), the library should work fine on Windows 2000. Planned platforms for the near future are: - Solaris Intel - FreeBSD x86 Consult file 'DOCUMENTATION' on how to use the library. There is also a program called 'beetest.c' included which gives an example of how to use the API. You can also use it to test whether your compiled library works. If you want to report bugs, make suggestions, contribute fixes or enhancements, please see our website: http://beecrypt.virtualunlimited.com or contact me at beecrypt@virtualunlimited.com Sincerely Bob Deblier