608 projects tagged "Cryptography"

Download Website Updated 10 Aug 2009 rfc3394

Screenshot
Pop 20.59
Vit 41.85

rfc3394 is a C# implementation of the RFC 3394 key-wrapping algorithm. The associated assembly provides two simple operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which, among other things, ensures that the implementation is verified against the test vectors provided in RFC 3394.

No download Website Updated 16 Aug 2009 Perl Crypt::IDA

Screenshot
Pop 22.32
Vit 41.79

Crypt::IDA is a Perl module that implements Rabin's Information Dispersal Algorithm. This is what's known as a "threshold system": a secret is divided into n shares with the property that any k (the "quorum" or "threshold") of those shares (with k <= n) can be combined at a later time to reconstruct the secret. The algorithm should be cryptographically secure in the sense that if fewer shares than the quorum k are presented, no information about the secret is revealed. The module uses Math::FastGF2 to efficiently implement the algorithm, making it suitable for securely sharing and distributing even large files. The Crypt::IDA::ShareFile module implements a file format for creating, storing, and distributing shares created with Crypt::IDA.

No download No website Updated 18 Oct 2012 Z1 CertServer

Screenshot
Pop 65.54
Vit 2.12

Z1 CertServer (formerly Z1 Backbone Of Trust CertServer) is a server-based software solution for the storage and administration of X.509 certificates and OpenPGP keys. It targets customers who use a public key infrastructure (based on X.509 or OpenPGP) and who want to take advantage of the central access to certificates. It also automatically validates certificates by querying certificate revocation lists (CRLs) from the issuing trust centers, or by using OCSP (Online Certificate Status Protocol). Java and C/C++ SDKs are provided. It is available as pre-installed hardware or a virtual appliance, with evaluation packages for Debian and Solaris.

Download No website Updated 22 Dec 2011 PolarSSL

Screenshot
Pop 163.22
Vit 4.54

PolarSSL is a light-weight cryptographic and SSL/TLS library written in C. PolarSSL makes it easy for developers to include cryptographic and SSL/TLS capabilities in their (embedded) applications with as little hassle as possible. Loose coupling of the components inside the library means that it is easy to separate the parts that are needed, without needing to include the total library. PolarSSL is written with embedded systems in mind and has been ported on a number of architectures, including ARM, PowerPC, MIPS, and Motorola 68000. The source is written to have very loose coupling, enabling easy integration of parts in other software projects. Very loosely coupled cryptographic algorithms for MD2, MD4, MD5, SHA1, SHA-256, SHA-512, AES, Camellia, DES, Triple DES, ARC3, and RSA are included.

No download Website Updated 27 Nov 2009 y_crypto

Screenshot
Pop 28.95
Vit 40.53

The y_crypto library contains a number of PostgreSQL extension functions, primarily written in C. These include random number generation, generating hash digests, and RSA encryption, decryption, signing, and signature verification.

No download Website Updated 06 Jan 2010 stegfs

Screenshot
Pop 24.43
Vit 1.00

stegfs is a Fuse based file system which provides absolute security. Using encryption to secure files, and the art of steganography to hide them, stegfs aims to ensure that the existence of such files isn't guaranteed. Implemented as a Fuse based file system and using the mhash and mcrypt libraries to provide the cryptographic hash and symmetric block cipher functions, stegfs is at the cutting edge of secure file system technology.

Download No website Updated 05 Jan 2010 NetCrack

Screenshot
Pop 35.79
Vit 40.07

NetCrack is cluster software developed to distribute a hashing algorithm's cracking process work using a brute force attack. Currently, it only supports the two most commonly used hashing algorithms: MD5 and SHA-1. Support is included for MySQL, safe mode, and others. It works like a client/server application, where the server is unique for each cluster network and its job is to distribute the cracking process work, coordinate the nodes, and prevent connections and data integrity errors.

No download No website Updated 17 Jan 2010 tkpgp

Screenshot
Pop 26.19
Vit 39.90

tkpg is a program that provides a GUI front end to Philip Zimmermann's Pretty Good Privacy (PGP) public-key encryption system and also the GNU Privacy Guard (GnuPG/gpg) implementation. It utilizes the Clipboard Selection heavily to ease moving pgp-processed text both to and from any of your applications (such as mail reader, news reader, and editor). This removes the need to select the output text by hand or by typing in a filename, since it is usually placed in the Selection automatically for you.

No download Website Updated 27 Aug 2012 Spring Crypto Utils

Screenshot
Pop 76.35
Vit 3.83

Spring Crypto Utils aims to provide a wrapper around Java's native cryptography API so that configuration of key stores, public and private keys, signers, message digesters, and symmetric and asymmetric cipherers can be easily done via the Spring context configuration.

No download Website Updated 23 Feb 2012 cryptodev-linux

Screenshot
Pop 35.11
Vit 2.34

Cryptodev-linux is a Linux kernel module implementation of the OpenBSD cryptodev userspace API (/dev/crypto). The Linux crypto API is being used as the backend and thus requires no dependencies other than a stock Linux kernel.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.