Broaden your selection: Category/Security
- Aesutil 2
- 'aesutil' is a small library and command line program to encrypt or decrypt data using the Rijndael algorithm in CBC mode.
- BeeCrypt is a cryptography library that contains highly optimized C and assembler implementations of many well-known algorithms including Blowfish, MD5, SHA-1, Diffie-Hellman, and ElGamal. Unlike some other crypto libraries, BeeCrypt is not designed to solve one specific problem, like file encryption, but to be a general purpose toolkit which can be used in a variety of applications. There are also no patent or royalty issues associated with BeeCrypt.
- Botan (formerly OpenCL) is a library of cryptographic algorithms. It includes a wide selection of block and stream ciphers, public key algorithms, hash functions, and message authentication codes, plus a high level filter-based interface. The home page has a list of supported algorithms.
- BUGS is the Big and Useful Great Security key encryption algorithm and applications. It is easy to use, and includes sample applications and documentation. The cryptography library can also be used with your own programs. Features include:
- Private key algorithm
- Dynamic cryptography algorithm
- Source code can be made public without making the algorithm weak
- Infinite key lengths
- Bilateral bits swwapping with various windows
- Bilateral Pseudo randomly binary operations
- Random number added to key
- Random number generator using the ISAAC algorithm
- Possibility of generating your own RNG seed
- Five different cryptography levels, for the best possible
- combination of efficiency and speed
- Seed and shuffle functions
- A clear text can be crypted using its own data
- Two methods of execution: direct disk access or memory cache
- Strong key generator
- 'ccrypt' is a utility for encrypting and decrypting files and streams. It was designed to replace the standard Unix 'crypt' utility, which is notorious for using a very weak encryption algorithm. 'ccrypt' is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. Unlike unix crypt, the algorithm provided by ccrypt is not symmetric (one must specify whether to encrypt or decrypt). Encryption and decryption depend on a user-supplied keyword (key phrase). Keywords can be any number of characters; all characters are significant (although ccrypt internally hashes the key to 256 bits). Longer keywords provide better security, since they are less likely to be discovered by exhaustive search.
- This program may be used to break the encryption on Microsoft Excel XP/2002/2003 files which have been encrypted using the RC4 method. These files are encrypted using a 40-bit-long key. It will not work on files encrypted using later versions or versions 8.0 or earlier.
- cryptmount assists system administrators in setting up encrypted filesystems based on the device mapper (dm-crypt) of GNU/Linux systems using a 2.6-series kernel. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel and libgcrypt library) can be used to protect both the filing system and the access key. The protected filing systems can reside in either ordinary files or disk partitions.
- The CryptoMail Email System is a web-based Email client and server with security at the transport level and end-to-end message encryption. The first client was written in Java so that it can run on any Java enabled web browser (Mozilla, IE and Navigator), and the first server is designed to work with any computer with an httpd (based on NCSA) server and a MySQL server.
- Set of multiplatform cryptographic-related applications to be run from batch, console or GUI, without installation.
- fmac: calculate Message Autentication Code using TEA and XTEA in OMAC mode
- fsaber: encrypt/decrypt files, compatible with classic CipherSaber-1 and -2,
features also a secure deletion mode
- fstegano: simple steganographic tool to hide/extract a file in less
significant bits of another file
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the page “GNU Free Documentation License”.
The copyright and license notices on this page only apply to the text on this page. Any software described in this text has its own copyright notice and license, which can usually be found in the distribution itself.