| _8000 [Cryptokit.Padding] | This padding scheme pads data with one |
A | |
| add [CryptokitBignum] | |
| aes [Cryptokit.MAC] |
|
| aes [Cryptokit.Cipher] | AES is the Advanced Encryption Standard, also known as Rijndael. |
| aes_cmac [Cryptokit.MAC] |
|
| arcfour [Cryptokit.Cipher] | ARCfour (``alleged RC4'') is a fast stream cipher that appears to produce equivalent results with the commercial RC4 cipher from RSA Data Security Inc. |
B | |
| blowfish [Cryptokit.Cipher] | Blowfish is a fast block cipher proposed by B.Schneier in 1994. |
C | |
| chacha20 [Cryptokit.Cipher] | Chacha20 is a stream cipher proposed by D. |
| compare [CryptokitBignum] | |
| compose [Cryptokit] | Compose two transforms, feeding the output of the first transform to the input of the second transform. |
| compress [Cryptokit.Zlib] | Return a transform that compresses its input. |
D | |
| decode [Cryptokit.Hexa] | Return a transform that decodes its input from hexadecimal. |
| decode [Cryptokit.Base64] | Return a transform that performs base 64 decoding. |
| decrypt [Cryptokit.RSA] |
|
| decrypt_CRT [Cryptokit.RSA] |
|
| derive_key [Cryptokit.DH] |
|
| des [Cryptokit.MAC] |
|
| des [Cryptokit.Cipher] | DES is the Data Encryption Standard. |
| des_final_triple_des [Cryptokit.MAC] |
|
| device_rng [Cryptokit.Random] |
|
E | |
| egd_rng [Cryptokit.Random] |
|
| encode [Cryptokit.Hexa] | Return a transform that encodes its input in hexadecimal. |
| encode_compact [Cryptokit.Base64] | Same as |
| encode_compact_pad [Cryptokit.Base64] | Same as |
| encode_multiline [Cryptokit.Base64] | Return a transform that performs base 64 encoding. |
| encrypt [Cryptokit.RSA] |
|
H | |
| hardware_rng [Cryptokit.Random] | A hardware random number generator based on the |
| hash_channel [Cryptokit] |
|
| hash_string [Cryptokit] |
|
| hmac_md5 [Cryptokit.MAC] |
|
| hmac_ripemd160 [Cryptokit.MAC] |
|
| hmac_sha1 [Cryptokit.MAC] |
|
| hmac_sha256 [Cryptokit.MAC] |
|
| hmac_sha512 [Cryptokit.MAC] |
|
K | |
| keccak [Cryptokit.Hash] | The Keccak submission for the SHA-3 is very similar to |
L | |
| length [Cryptokit.Padding] | This padding scheme pads data with |
M | |
| md5 [Cryptokit.Hash] | MD5 is an older hash function, producing 128-bit hashes (16 bytes). |
| message [Cryptokit.DH] | Compute the message to be sent to the other party. |
| mod_ [CryptokitBignum] | |
| mod_inv [CryptokitBignum] | |
| mod_mult [Cryptokit] |
|
| mod_power [Cryptokit] |
|
| mod_power [CryptokitBignum] | |
| mod_power_CRT [CryptokitBignum] | |
| mult [CryptokitBignum] | |
N | |
| new_key [Cryptokit.RSA] | Generate a new, random RSA key. |
| new_parameters [Cryptokit.DH] | Generate a new set of Diffie-Hellman parameters. |
O | |
| of_bytes [CryptokitBignum] | |
| of_int [CryptokitBignum] | |
| one [CryptokitBignum] | |
P | |
| private_secret [Cryptokit.DH] | Generate a random private secret. |
| pseudo_rng [Cryptokit.Random] |
|
| pseudo_rng_aes_ctr [Cryptokit.Random] | This is another pseudo-random number generator, based on the AES block cipher in counter mode. |
R | |
| random [CryptokitBignum] | |
| random_prime [CryptokitBignum] | |
| relative_prime [CryptokitBignum] | |
| ripemd160 [Cryptokit.Hash] | RIPEMD-160 produces 160-bit hashes (20 bytes). |
S | |
| secure_rng [Cryptokit.Random] | A high-quality random number generator, using hard-to-predict system data to generate entropy. |
| sha1 [Cryptokit.Hash] | SHA-1 is the Secure Hash Algorithm revision 1. |
| sha2 [Cryptokit.Hash] | SHA-2, another NIST standard for cryptographic hashing, produces hashes of 224, 256, 384, or 512 bits (24, 32, 48 or 64 bytes). |
| sha224 [Cryptokit.Hash] | SHA-224 is SHA-2 specialized to 224 bit hashes (24 bytes). |
| sha256 [Cryptokit.Hash] | SHA-256 is SHA-2 specialized to 256 bit hashes (32 bytes). |
| sha3 [Cryptokit.Hash] | SHA-3, the latest NIST standard for cryptographic hashing, produces hashes of 224, 256, 384 or 512 bits (24, 32, 48 or 64 bytes). |
| sha384 [Cryptokit.Hash] | SHA-384 is SHA-2 specialized to 384 bit hashes (48 bytes). |
| sha512 [Cryptokit.Hash] | SHA-512 is SHA-2 specialized to 512 bit hashes (64 bytes). |
| shared_secret [Cryptokit.DH] | Recover the shared secret from the private secret of the present party and the message received from the other party. |
| sign [Cryptokit.RSA] |
|
| sign_CRT [Cryptokit.RSA] |
|
| string [Cryptokit.Random] |
|
| sub [CryptokitBignum] | |
| system_rng [Cryptokit.Random] |
|
T | |
| to_bytes [CryptokitBignum] | |
| transform_channel [Cryptokit] |
|
| transform_string [Cryptokit] |
|
| triple_des [Cryptokit.MAC] |
|
| triple_des [Cryptokit.Cipher] | Triple DES with two or three DES keys. |
U | |
| uncompress [Cryptokit.Zlib] | Return a transform that decompresses its input. |
| unwrap_signature [Cryptokit.RSA] |
|
W | |
| wipe [CryptokitBignum] | |
| wipe_bytes [Cryptokit] |
|
| wipe_key [Cryptokit.RSA] | Erase all components of a RSA key. |
| wipe_string [Cryptokit] |
|
X | |
| xor_bytes [Cryptokit] |
|
| xor_string [Cryptokit] | Same as |
Z | |
| zero [CryptokitBignum] |