Difference between revisions of "Bugs"

From Free Software Directory
Jump to: navigation, search
(Created page with "{{Entry |Name=bugs |Short description=Dynamic private key encryption algorithm and applications |Full description=BUGS is the Big and Useful Great Security key encryption algorit...")
 
m (doc.)
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
{{Entry
 
{{Entry
|Name=bugs
+
|Name=BUGS
 
|Short description=Dynamic private key encryption algorithm and applications
 
|Short description=Dynamic private key encryption algorithm and applications
|Full description=BUGS is the Big and Useful Great Security key encryption algorithm and applications. It is easy to use, and includes sample applications and documentation. The cryptography library can also be used with your own programs. Features include:
+
|Full description='''BUGS''' is the Big and Useful Great Security key encryption algorithm and applications. It is easy to use, and includes sample applications and documentation. The cryptography library can also be used with your own programs. Features include:
 
* Private key algorithm
 
* Private key algorithm
 
* Dynamic cryptography algorithm
 
* Dynamic cryptography algorithm
Line 18: Line 18:
 
* Two methods of execution: direct disk access or memory cache
 
* Two methods of execution: direct disk access or memory cache
 
* Strong key generator
 
* Strong key generator
|User level=none
+
|Homepage URL=http://www.elysiumsecurity.com/crypto/page_crypto.html
|Status=Live
+
|User level=advanced
 
|Component programs=bcrypt,bchat,blogin,bmore,block,bkey,bhide,bpasswd
 
|Component programs=bcrypt,bchat,blogin,bmore,block,bkey,bhide,bpasswd
|Homepage URL=http://www.encryptsolutions.com
 
|VCS checkout command=
 
 
|Computer languages=C
 
|Computer languages=C
|Documentation note=English developer's libcrypt reference available from http://www.encryptsolutions.com/english/info/dev.html; English developer's technical documentation available from http://www.encryptsolutions.com/english/info/doc/bugs_tech.html
+
|Documentation note=Online documentation available at: http://www.elysiumsecurity.com/files/crypto/BUGS_Technical_doc_v5-1.pdf
|Paid support=martinez@encryptsolutions.com
 
|IRC help=
 
|IRC general=
 
|IRC development=
 
 
|Related projects=gnupg_(GPG)
 
|Related projects=gnupg_(GPG)
 
|Keywords=security,cryptography,encryption,private key,cryptography library
 
|Keywords=security,cryptography,encryption,private key,cryptography library
|Is GNU=n
+
|Version identifier=4.1.1
|Last review by=Janet Casey
+
|Version date=2003/09/16
|Last review date=2009-01-23
+
|Version status=historical
 +
|Version download=http://www.elysiumsecurity.com/crypto/page_download.html
 +
|Last review by=Genium
 +
|Last review date=2017/01/24
 
|Submitted by=Database conversion
 
|Submitted by=Database conversion
 
|Submitted date=2011-04-01
 
|Submitted date=2011-04-01
|Version identifier=4.1.0
+
|Status=
|Version date=2002-07-02
+
|Is GNU=No
|Version status=stable
 
|Version download=http://www.encryptsolutions.com/english/download/bugs-4.1.1.tgz
 
 
|License verified date=2000-09-28
 
|License verified date=2000-09-28
|Version comment=4.1.0 stable released 2002-07-02
+
}}
 +
{{Project license
 +
|License=GPLv2
 +
|License verified by=Genium
 +
|License verified date=2017/01/24
 
}}
 
}}
 
{{Person
 
{{Person
|Role=Maintainer
 
 
|Real name=Sylvain Martinez
 
|Real name=Sylvain Martinez
|Email=bugs_contact@encryptsolutions.com
+
|Role=Original author and maintainer
 
|Resource URL=
 
|Resource URL=
}}
 
{{Resource
 
|Resource audience=Bug Tracking,Developer,Support
 
|Resource kind=E-mail
 
|Resource URL=mailto:bugs_contact@encryptsolutions.com
 
 
}}
 
}}
 
{{Software category
 
{{Software category
|Interface=command-line,console
+
|Interface=command-line, console, library
 +
|Programming-language=C
 
|Security=encryption
 
|Security=encryption
|Use=security
+
|Use=security, software-development
}}
 
{{Project license
 
|License=GPLv2orlater
 
|License verified by=Janet Casey
 
|License verified date=2000-09-28
 
 
}}
 
}}
 +
{{Featured}}

Latest revision as of 16:40, 24 January 2017


[edit]

BUGS

http://www.elysiumsecurity.com/crypto/page_crypto.html
Dynamic private key encryption algorithm and applications

BUGS is the Big and Useful Great Security key encryption algorithm and applications. It is easy to use, and includes sample applications and documentation. The cryptography library can also be used with your own programs. Features include:

  • Private key algorithm
  • Dynamic cryptography algorithm
  • Source code can be made public without making the algorithm weak
  • Infinite key lengths
  • Bilateral bits swwapping with various windows
  • Bilateral Pseudo randomly binary operations
  • Random number added to key
  • Random number generator using the ISAAC algorithm
  • Possibility of generating your own RNG seed
  • Five different cryptography levels, for the best possible
  • combination of efficiency and speed
  • Seed and shuffle functions
  • A clear text can be crypted using its own data
  • Two methods of execution: direct disk access or memory cache
  • Strong key generator





Licensing

License

Verified by

Verified on

Notes

License

GPLv2

Verified by

Genium

Verified on

24 January 2017




Leaders and contributors

Contact(s)Role
Sylvain Martinez Original author and maintainer


Resources and communication

Software prerequisites




Entry








"Original author and maintainer" is not in the list (Maintainer, Contributor, Developer, Sponsor, Unknown) of allowed values for the "Role" property.








Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.

The copyright and license notices on this page only apply to the text on this page. Any software or copyright-licenses or other similar notices described in this text has its own copyright notice and license, which can usually be found in the distribution or license text itself.