Introduccion Criptografia

Páginas: 99 (24614 palabras) Publicado: 24 de septiembre de 2012
An Introduction to
Cryptography

Copyright © 1990-1998 Network Associates, Inc. and its Affiliated Companies. All Rights
Reserved.
PGP*, Version 6.0.2
11-98. Printed in the United States of America.
PGP, Pretty Good, and Pretty Good Privacy are registered trademarks of Network Associates,
Inc. and/or its Affiliated Companies in the US and other countries. All other registered andunregistered trademarks in this document are the sole property of their respective owners.
Portions of this software may use public key algorithms described in U.S. Patent numbers
4,200,770, 4,218,582, 4,405,829, and 4,424,414, licensed exclusively by Public Key Partners; the
IDEA(tm) cryptographic cipher described in U.S. patent number 5,214,703, licensed from
Ascom Tech AG; and the NorthernTelecom Ltd., CAST Encryption Algorithm, licensed from
Northern Telecom, Ltd. IDEA is a trademark of Ascom Tech AG. Network Associates Inc. may
have patents and/or pending patent applications covering subject matter in this software or its
documentation; the furnishing of this software or documentation does not give you any license
to these patents. The compression code in PGP is by Mark Adler andJean-Loup Gailly, used
with permission from the free Info-ZIP implementation. LDAP software provided courtesy
University of Michigan at Ann Arbor, Copyright © 1992-1996 Regents of the University of
Michigan. All rights reserved. This product includes software developed by the Apache Group
for use in the Apache HTTP server project (http://www.apache.org/). Copyright © 1995-1997
The ApacheGroup. All rights reserved. See text files included with the software or the PGP
web site for further information. This software is based in part on the work of the Independent
JPEG Group. Soft TEMPEST font courtesy of Ross Anderson and Marcus Kuhn.
The software provided with this documentation is licensed to you for your individual use
under the terms of the End User License Agreement and LimitedWarranty provided with the
software. The information in this document is subject to change without notice. Network
Associates Inc. does not warrant that the information meets your requirements or that the
information is free of errors. The information may include technical inaccuracies or
typographical errors. Changes may be made to the information and incorporated in new
editions of thisdocument, if and when made available by Network Associates Inc.
Export of this software and documentation may be subject to compliance with the rules and
regulations promulgated from time to time by the Bureau of Export Administration, United
States Department of Commerce, which restrict the export and re-export of certain products
and technical data.
Network Associates, Inc. (408) 988-3832 main3965 Freedom Circle
Santa Clara, CA 95054
http://www.nai.com
info@nai.com
* is sometimes used instead of the ® for registered trademarks to protect marks registered

LIMITED WARRANTY
Limited Warranty. Network Associates warrants that for sixty (60) days from the date of
original purchase the media (for example diskettes) on which the Software is contained will be
free from defects inmaterials and workmanship.
Customer Remedies. Network Associates' and its suppliers' entire liability and your exclusive
remedy shall be, at Network Associates' option, either (i) return of the purchase price paid for
the license, if any, or (ii) replacement of the defective media in which the Software is contained
with a copy on nondefective media. You must return the defective media toNetwork
Associates at your expense with a copy of your receipt. This limited warranty is void if the
defect has resulted from accident, abuse, or misapplication. Any replacement media will be
warranted for the remainder of the original warranty period. Outside the United States, this
remedy is not available to the extent Network Associates is subject to restrictions under United
States export...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Introduccion Criptografia
  • Breve introducción a la criptografia
  • Criptografia
  • Criptografia
  • La Criptografia
  • criptografia
  • Criptografia
  • Criptografia

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS