.. .. .. .. .. .. .. .. ..... ..... ...... ..... .... ...... ...... ..... .. .. .. .. .. .. .. .. .. ... .. .. .. .. .. .. . ...... .. .. .. ...... .. .. .. .. .. .. .... .. .. .. .. .. .. .. .. .. .. .. .. . ..... .... .. .. ..... .. .. .. ... .. ..... .. ..
Traditionally, cryptography applications are written in fast and efficient mid
to low-level languages such as Java or C/C++ respectively, but C/C++ comes with the
cost of reduced portability between different types of system, and Java requires a
Java Machine to be pre-installed on the client's machine. When presented with an
operating system that is locked down, such as can be found on PCs in most public
cafés, installing applications for working with encrypted data can become difficult.
Click on the link below to use double-window layout. This Requires a browser that can handle Frames. It is only intended for non-mobile users.
The algorithms list is essentially the contents page for this website, for those who either can't or won't use the frames layout, such as mobile users.
[Go to algorithms list]
There are two different packages you can download - one has images, one doesn't. The downloads contain all pages within this website, except for the download pages. They come in a variety of formats - tar.gz, tar.bz2, and zip.
[Go to downloads]
For security reasons, SHA-1 and MD5 checksums have been generated for all files on the site, although this won't necessarily detect a man-in-the-middle (MITM) attack. These checksums can be viewed from each page, or from each files index.
The bash scripts for generating some of the pages used throughout this site have also been uploaded for your amusement. They are located within the base directory.
This application has been developed for compatibility with Internet Explorer 6, Firefox 3.0, and Blazer 4.3 for Palm OS. This website contains images which aren't essential to the use of this website - disable loading of images to lower bandwidth and increase download speed.
Dislcaimer: The contents of this site is not endorsed by the University of Huddersfield. The content herein is released under a variety of licensing terms, and unless stated otherwise, all content is protected by the GNU General Public License. Images were obtained from various open-source software packages installed with the Ubuntu operating system.
[W3C Valid CSS 2]
[W3C Valid XHTML 1.1]