eucrypt_genesis 1 This is the EuCrypt library that Eulora server (S.MG) uses for its communication needs.
eucrypt_genesis 2
eucrypt_ch12_wrap... 3 To compile the whole EuCrypt library, simply run in the eucrypt folder (the -O3 switch is needed for specifying optimisation level for Serpent - if you don't care about that, you can skip this switch):
eucrypt_ch12_wrap... 4 gprbuild -O3
eucrypt_ch12_wrap... 5
eucrypt_ch12_wrap... 6 To cleanup (recursively), simply run in the eucrypt folder:
eucrypt_ch12_wrap... 7 gprclean -r
eucrypt_ch12_wrap... 8
eucrypt_genesis 9 To understand EuCrypt, start from http://www.dianacoman.com/2017/12/07/introducing-eucrypt/
eucrypt_genesis 10
eucrypt_ch8_bit_k... 11 Components:
eucrypt_ch8_bit_k... 12 1. mpi
eucrypt_ch8_bit_k... 13 Arbitrary length integers and operations.
eucrypt_ch8_bit_k... 14 Implemented in C.
eucrypt_ch8_bit_k... 15
eucrypt_ch8_bit_k... 16 2. smg_bit_keccak
eucrypt_ch8_bit_k... 17 Bit-level implementation of the Keccak sponge according to The Keccak Reference v 3.0.
eucrypt_ch8_bit_k... 18 Implemented in Ada.
eucrypt_ch8_bit_k... 19
eucrypt_ch8_bit_k... 20 3. smg_keccak
eucrypt_ch8_bit_k... 21 Word (64 bits) level implementation of the Keccak sponge according to The Keccak Reference v 3.0.
eucrypt_keccak_bi... 22 NOTE: Keccak rate has its own type (Keccak_Rate) that makes clear the valid range (1 to width of state). Calling Keccak sponge with a bitrate outside the valid range will CORRECTLY cause the execution to abort with a constraint_error.
eucrypt_ch8_bit_k... 23 Implemented in Ada.
eucrypt_ch8_bit_k... 24
eucrypt_ch8_bit_k... 25 4. smg_serpent
eucrypt_ch8_bit_k... 26 Serpent hash method.
eucrypt_ch8_bit_k... 27 Implemented in Ada.
eucrypt_ch8_bit_k... 28
eucrypt_ch8_bit_k... 29 5. smg_rsa
eucrypt_ch8_bit_k... 30 RSA implementation using TMSR specification.
eucrypt_ch8_bit_k... 31 Implemented in C.
eucrypt_ch8_bit_k... 32