|Home >> All >> gnu >> javax >> crypto >> [ prng Javadoc ]|
gnu.javax.crypto.prng: Javadoc index of package gnu.javax.crypto.prng.
ICMGenerator: Counter Mode is a way to define a pseudorandom keystream generator using a block cipher. The keystream can be used for additive encryption, key derivation, or any other application requiring pseudorandom data. In ICM, the keystream is logically broken into segments. Each segment is identified with a segment index, and the segments have equal lengths. This segmentation makes ICM especially appropriate for securing packet-based protocols. This implementation adheres to the definition of the ICM keystream generation function that allows for any symetric key block cipher algorithm (initialisation parameter ...
UMacGenerator: KDF s (Key Derivation Functions) are used to stretch user-supplied key material to specific size(s) required by high level cryptographic primitives. Described in the UMAC paper, this function basically operates an underlying symmetric key block cipher instance in output feedback mode (OFB), as a strong pseudo-random number generator. UMacGenerator requires an index parameter (initialisation parameter gnu.crypto.prng.umac.kdf.index taken to be an instance of java.lang.Integer with a value between 0 and 255 ). Using the same key, but different indices, generates different pseudorandom outputs. This ...
Fortuna: The Fortuna continuously-seeded pseudo-random number generator. This generator is composed of two major pieces: the entropy accumulator and the generator function. The former takes in random bits and incorporates them into the generator's state. The latter takes this base entropy and generates pseudo-random bits from it. There are some things users of this class must be aware of: Adding Random Data This class does not do any polling of random sources, but rather provides an interface for adding random events. Applications that use this code must provide this mechanism. We use this design because ...
ARCFour: RC4 is a stream cipher developed by Ron Rivest. Until 1994 RC4 was a trade secret of RSA Data Security, Inc., when it was released anonymously to a mailing list. This version is a descendent of that code, and since there is no proof that the leaked version was in fact RC4 and because "RC4" is a trademark, it is called "ARCFOUR", short for "Allegedly RC4". This class only implements the keystream of ARCFOUR. To use this as a stream cipher, one would say: out = in ^ arcfour.nextByte(); This operation works for encryption and decryption. References: Schneier, Bruce: Applied Cryptography: Protocols, ...
PBKDF2: An implementation of the key derivation function KDF2 from PKCS #5: Password-Based Cryptography ( PBE ). This KDF is essentially a way to transform a password and a salt into a stream of random bytes, which may then be used to initialize a cipher or a MAC. This version uses a MAC as its pseudo-random function, and the password is used as the key. References: B. Kaliski, RFC 2898: Password-Based Cryptography Specification, Version 2.0
CSPRNG: An entropy pool-based pseudo-random number generator based on the PRNG in Peter Gutmann's cryptlib ( http://www.cs.auckland.ac.nz/~pgut001/cryptlib/ ). The basic properties of this generator are: The internal state cannot be determined by knowledge of the input. It is resistant to bias introduced by specific inputs. The output does not reveal the state of the generator.
IPBE: Trivial interface to group Password-based encryption property names and constants.
PRNGFactory: A Factory to instantiate pseudo random number generators.