Interested in improving this site? Please check the To Do page.
- crypt.cramMD5: Computes a challenge-response authentication mechanism (CRAM) response using MD5. New verb.
- crypt.cramSHA1: Computes a challenge-response authentication mechanism (CRAM) response using SHA1. New verb.
- crypt.hmacMD5: Keyed-hashing for message authentication using MD5. New verb.
- crypt.hmacSHA1: Keyed-hashing for message authentication using SHA1. New verb.
- crypt.MD5: Computes a hash value using the MD5 algorithm. New verb.
- crypt.SHA1: Computes a hash value using the SHA1 algorithm. New verb.
- crypt.whirlpool: Computes a hash value using the whirlpool algorithm. New verb.
These verbs are not used to encrypt data for later decryption. Rather, they’re used to create keys. The idea behind many of these verbs is a form of signature. In the case of MD5, SHA1, and whirlpool you feed them some information and they produce an short signature. You can then give someone the same input you used and they can run the same routine using the input and see if they get the same signature. This is useful, for example, when you want to put a file up on a server for someone and you want to be assured that the file that person downloads is the same as the one you intended him to get.
CRAM and HMAC related verbs are often used in conjunction with email logins.
There are some simple “encryption” routines like rotation 13, which one could take some input, rot 13 it, then take that output and unrot 13 and get back the original code. These are not yet implemented in Frontier.