Please review!  Your comments, flames and suggestions are needed.
Send EMail to:

	chongo@toad.com

=-=
 
This code is the raw interface to NLC.  A more user friendly version
will be made available in a later release.

=-=

Contents:

README		This file
Makefile	Edit as needed, also make test runs the regression suite
cypher.c	SHS code + nlc cypher engine
cypher.h	cypher.c include file
endian.c	detects your native byte sex and builds endian.h
krypt.c		driver for nlc
mdc.letter	comments on Peter Gutmann's Message Digest Cypher
must_align.c	determines if longs must be aligned and builds align.h
nlc.mm		fragment of a pic / mm macro paper (only block diagram)
nlc5.ps		postscript output of nlc.mm (not formatted well, sorry)
trial.tar.z.UU	used by make test for the regression suite

To build:

    edit Makefile as needed
    make
    make test

For help type krypt -h:

    ./krypt [-bhlt][-k key][-k kfile][-s str] [file]
	-b          force big endian mode
	-h          prints this message
	-k key      key is str
	-K kfile    key is up to the first 32k bytes of kfile
	-l          force little endian mode
	-r          reverse feedback mode (default is forward)
	-s str      prints digest and contents of string
	-t          prints time statistics for 16M chars
	-v          print version
	file        print digest and name of a single file
	(no args)   print digest of stdin

Enjoy!

Landon Curt Noll
chongo@toad.com

=-=

Now for the version and disclaimer:

./krypt: version 2.11.3 95/05/13

/*
 * krypt - Noll Lightning Cypher based on SHS
 *
 * This file was written by:
 *
 *	 Landon Curt Noll  (chongo@toad.com)	chongo <was here> /\../\
 *
 * This code has been placed in the public domain.  Please do not
 * copyright this code.
 *
 * LANDON CURT NOLL DISCLAIMS ALL WARRANTIES WITH  REGARD  TO
 * THIS  SOFTWARE,  INCLUDING  ALL IMPLIED WARRANTIES OF MER-
 * CHANTABILITY AND FITNESS.  IN NO EVENT SHALL  LANDON  CURT
 * NOLL  BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL
 * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM  LOSS  OF
 * USE,  DATA  OR  PROFITS, WHETHER IN AN ACTION OF CONTRACT,
 * NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR  IN
 * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
 *
 * WARNING: This code, and the algorithm that it claims to implement
 *	    are under-going peer review.  During peer review, both
 *	    source and algorithm may be modified extensively.
 *
 * WARNING: Certain US Regulations may restrict and/or prohibit 
 *	    the exportation of this software.  Please consult the
 *	    proper Federal authorities and/or seek legal advice
 *	    if you desire to export this software!
 */
