Search Results for "java source code for encryption and decryption using rsa" - Page 2

Showing 43 open source projects for "java source code for encryption and decryption using rsa"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    FakeSigningProvider

    Java JCE provider that injects your own code signing cert into JVM

    The development of JCE providers for the Oracle JDK is complicated due to the fact that JCE providers containing strong cryptography have to be digitally signed by Oracle. This JCE provider 'FakeSigningProvider' enables you to create your own RSA key pair and X.509 code signing certificate. The provider replaces one of the JVM built-in certificates by the custom one. Developers can perform JCE code signing of their own JCE providers using their custom RSA key pair.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    AESTextCrypt

    AESTextCrypt

    Encrypt and decrypt text using AES 256 bit encryption

    AESTextCrypt is an easy-to-use open source tool for text encryption and decryption. Primarily intended for use with email, use it wherever you need to protect text from prying eyes. The encrypted text can be copy/pasted into any text-handling application (e.g. email) instead of plain text. Convenience buttons are provided for clipboard operations. AESTextCrypt uses AES-256 bit encryption which is the strongest available encryption scheme. It also employs bcrypt, which implements...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    PigTerm

    PigTerm

    Remote control your linux console encrypted trough Jabber chat service

    With PigTerm you can chat with your Linux terminal. PigTerm connects you to your/your friends/your office Linux computer's terminal trough Jabber messaging (XMPP Protocol services like Gtalk). So that you do not need ssh access to do this. Think of pigterm as a Remote Assistant for Linux Console. This is useful specially when your remote computer do not have a valid IP address. The software uses QXMPP opensource library (http://code.google.com/p/qxmpp/). The complete code of this library...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12)...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    EncryExchange

    Encrypted Message Exchange

    ----- New Version ----- v1.1 - Added new features, tidied and condensed the UI, tidied up the code and added better error handling and messages. ----- This Server-Client application allows the exchange of encrypted messages using the public key as the address of the mailbox. This system is designed to be used to exchange messages through networks and servers that can not be trusted. The client application is a C#.net application that is used as a mail client to send/receive and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    DAL4j

    Data Access Layer 4 Java

    ...The beans generated can be 1 or two types: Simple or Framework. Simple beans are standard pojo classes managed by your application using JPA semantics. Framework generated pojos use the DAL4j framework DAO generic to simplify CRUD operations. DAL4j provides optional hooks to allow you to integrate encryption/decryption of data field used when data is encrypted in the database. Last, DAL4j provides a set of Generic classes that can be used to simplify creation of J2E Session Beans which perform CRUD operations using generated Entities
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    HTML Encrypter

    HTML Encrypter

    Java based HTML encrypter and decrypter

    An encryption and decryption application developed in Java. The application uses a number of algorithms to encrypt and decrypt the HTML source code: Blowfish, AES, TEA, Rabbit, MARC 4, Escape/Unescape functions. In addition to the encryption and decryption functions, the application also returns the source code of a website. The user has the ability to upload the encrypted file, using the FTP transfer feature, to his or hers personal website. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Connect every part of your business to one bank account Icon
    Connect every part of your business to one bank account

    North One is a business banking app that integrates cash flow, payments, and budgeting to turn your North One Account into one Connected Bank Account

    North One is proudly built for small businesses, startups and freelancers across America. Make payments easily, keep tabs on your money and put your finances on autopilot through smart integrations with the tools you’re already using. North One was built to make managing money easy so you can focus on running your business. No more branches. No more lines. No more paperwork. Get complete access to your North One Account from your phone or computer, wherever your business takes you. Create Envelopes for taxes, payroll, rent, and anything else automatically.
    Get started for free.
  • 10
    If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    sanesigner is a high level digital signature api component. it support generating and verifying digital signatures as well as encryption and decryption using public keys, and lots of other features in between.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Szyfrator is a GUI application for Windows XP/Vista/7. It encrypts and decrypts text messages using the public RSA algorithm. It generates two 256 bit keys: public and private and was designed to be very easy to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Cryptomni is a program which can encrypt and decrypt files using the one-time pad cipher. If a key is truly random, kept secret, and never reused, this encryption algorithm can be proven to be unbreakable.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    JFish is a simple Java implementation of the popular Twofish cryptography algorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The Moonbounce API is a set of high level objects that encapsulate pieces of the Bouncycastle lightweight crypto API. Moonbounce significantly simplifies RSA key generation, signing, encryption/decryption and verification of both byte arrays and files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Secure instant messaging chat program written in java using RSA for decryption and encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The goal of Operation Project X is to crack the 2048-bit RSA private encryption key Microsoft uses to sign Xbox media, by using distributed computing. This key could be used by Xbox owners to run homebrew code on their machines.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 18
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project