Much of the code that actually implements the various cryptographic
algorithms was not written by me. I'd like to thank all the people who
implemented them, and released their work under terms which allowed me
to use their code. These individuals are credited in the relevant
chapters of this documentation. Bruce Schneier's book Applied
Cryptography was also very useful in writing this toolkit; I highly
recommend it if you're interested in learning more about cryptography.
Good luck with your cryptography hacking!
A.M.K.
Washington DC, USA
June 2005