diff options
author | Baptiste Daroussin <bapt@FreeBSD.org> | 2015-03-02 23:47:17 +0000 |
---|---|---|
committer | Baptiste Daroussin <bapt@FreeBSD.org> | 2015-03-02 23:47:17 +0000 |
commit | e5add27dcd8db707209b93dbb742ac0b73a027a0 (patch) | |
tree | aa5cc83c6b2bb7b479576a94e01b30016d586dea /security/seccure | |
parent | 3f9395d5998ece19534fc47493b98bfb0a00793b (diff) | |
download | ports-e5add27dcd8db707209b93dbb742ac0b73a027a0.tar.gz ports-e5add27dcd8db707209b93dbb742ac0b73a027a0.zip |
Notes
Diffstat (limited to 'security/seccure')
-rw-r--r-- | security/seccure/pkg-descr | 23 |
1 files changed, 11 insertions, 12 deletions
diff --git a/security/seccure/pkg-descr b/security/seccure/pkg-descr index 68511077cc84..18dbdfb102a1 100644 --- a/security/seccure/pkg-descr +++ b/security/seccure/pkg-descr @@ -1,16 +1,15 @@ -The seccure toolset implements a selection of asymmetric algorithms -based on elliptic curve cryptography (ECC). In particular it offers -public key encryption / decryption, signature generation / +The seccure toolset implements a selection of asymmetric algorithms +based on elliptic curve cryptography (ECC). In particular it offers +public key encryption / decryption, signature generation / verification and key establishment. -ECC schemes offer a much better key size to security ratio than -classical systems (RSA, DSA). Keys are short enough to make direct -specification of keys on the command line possible (sometimes this +ECC schemes offer a much better key size to security ratio than +classical systems (RSA, DSA). Keys are short enough to make direct +specification of keys on the command line possible (sometimes this is more convenient than the management of PGP-like key rings). -seccure builds on this feature and therefore is the tool of choice -whenever lightweight asymmetric cryptography -- independent of key -servers, revocation certificates, the Web of Trust or even -configuration files -- is required. +seccure builds on this feature and therefore is the tool of choice +whenever lightweight asymmetric cryptography -- independent of key +servers, revocation certificates, the Web of Trust or even +configuration files -- is required. -Author: B. Poettering -WWW: http://point-at-infinity.org/seccure/ +WWW: http://point-at-infinity.org/seccure/ |