Search Results for "encryption algorithm" - Page 3

Showing 252 open source projects for "encryption algorithm"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Enterprise-grade ITSM, for every business Icon
    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.

    Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
    Try it Free
  • 1

    TOTP Database

    TOTP server side algorithm

    calculate TOTP using database stored procedures allowing you to validate a user's entered TOTP with a stored secret. Cooperates with all authorization apps that calculate a TOTP using SHA1 encryption
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Ank Zipper

    Ank Zipper

    A free and easy-to-use password protected file archiver

    Ank Zipper provides you with a lightweight, Java-based application designed to provide security to your documents. Ank Zipper can compress both files and folders and create password-protected archives, in order to prevent unauthorized access to important files. Additionally, it can be used for extracting or simply browsing ZIP files.It includes AES(Advanced Encryption Standard) algorithm to encrypt/decrypt file(s). Ank Zipper is a cross-platform software that can be used on any platform...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    RSA Encryption Tool

    RSA algorithm based encryption tool.

    A simple program written in C# utilizing .NET 4.6 to demonstrate RSA encryption in action. User can select a text file or input any text to encrypt.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 4
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 5
    AES Everywhere

    AES Everywhere

    Cross Language AES 256 Encryption Library

    AES Everywhere is Cross Language Encryption Library that provides the ability to encrypt and decrypt data using a single algorithm in different programming languages and on different platforms. This is an implementation of the AES algorithm, specifically CBC mode, with 256-bit key length and PKCS7 padding. It implements OpenSSL-compatible cryptography with randomly generated salt.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    ... is that all the info is saved as encrypted data in the data.tsf file in the program directory. The simple yet effective encryption algorithm has a password hash, salt key and vigenère cipher key that are changed with every update. The only thing you have to do when updating is to delete the .tsf files and re-enter all your info again so that it can be encrypted using the new parameters. Detailed How-To can be found in the project wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    WiFi Password Recovery

    WiFi Password Recovery

    A free utility to recover the passwords of wireless networks

    WiFi Password Recovery is a free utility to recover the passwords of the WiFi networks saved on your computer. For example if you forgot the password of a WiFi network (which you have entered in the past), you can easily recover it thanks to this tool. WiFi Password Recovery provides a very simple user interface which shows also other informations (SSID, Interface, Security type, Encryption algorithm) for each wireless network. The program is able to recover the passwords of wireless networks...
    Downloads: 28 This Week
    Last Update:
    See Project
  • 8
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Turn Your Content into Interactive Magic - For Free Icon
    Turn Your Content into Interactive Magic - For Free

    From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.

    Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
    Start Free Forever
  • 10

    IDA Signsrch

    IDA Pro plug-in of Luigi Auriemma's signsrch signature matching tool.

    IDA Pro plug-in conversion of Luigi Auriemma's signsrch signature matching tool. * Deprecated, will no longer be updated, please see my use my superior YARA for IDA plugin here: https://github.com/kweatherman/yara4ida * July 2018, updated to IDA 7.1 Luigi's original signsrch description: "Tool for searching signatures inside files, extremely useful as help in reversing jobs like figuring or having an initial idea of what encryption/- compression algorithm is used for a proprietary...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11

    Format-Preserving Encryption

    Format-Preserving Encryption Library for Java

    This package implements the FF1, FF3, and FFX algorithms and the A2 and A10 parameter sets for format-preserving encryption. The FF1 and FF3 methods for format-preserving encryption are implementations of NIST Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. The FFX algorithm and A2 and A10 parameter sets are implementations of "The FFX Mode of Operation for Format-Preserving Encryption," by Mihir Bellare, Phillip...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ParaCrypt

    ParaCrypt

    more convenient one-time-pad encryption.

    ParaCrypt is software for encrypting and decrypting data with one-time-pads. For convenience the one-time-encryption-pads are created using pre-shared unencrypted files as sources of entropy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Cube26

    General Purpose A-Z Stream Cipher (C++ implementation)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Cube256

    General Purpose Stream Cipher and Crypto System

    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Latin Square Toolbox

    Generates Latin squares and counts their transversals

    The Latin Square Toolbox contains software tools for efficiently generating Latin squares and counting their transversals with various user-configurable options. This open source release aims to help educate folks on Latin squares and their important applications to cryptography. This version contains three tools: 0. Latin Square Generator (LSG) 1. Latin Square Transversal Counter (LSTC) 2. Latin Square Property Checker (LSPC)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    haveged is a daemon that feeds entropy into the linux /dev/random pool using a random number generator based upon the HArdware Volatile Entropy Gathering and Expansion algorithm.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 18
    ROXter

    ROXter

    The easiest way to encypt files or text

    This is a ROXster. A program that encrypts files and text with an algorithm based on XOR. You can use it to encrypt your files or text fast and easy. Enjoy!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    Algorithm Database

    Efficient Algorithms implemented in Java

    The Aim of this project is to provide a collection of reusable Algorithms which can be used effectively in different scenarios. Algorithm implementations are in Java. Objective here is to implement algorithms which should be more efficient than the JDK implementation and also to create a platform for the researchers who works on Data Mining, Encryption algorithms, ect.. to collaborate and contribute to this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Advanced Onion Router
    Advanced Onion Router is a portable client for the OR network and is intended to be an improved alternative for Tor+Vidalia+Privoxy bundle for Windows users. Some of the improvements include UNICODE paths, support for HTTP and HTTPS proxy protocols on the same Socks4/Socks5 port with HTTP header filtering that generates fake identity-dependent headers every time the identity is changed (proxy chains are also supported), support for NTLM proxies, a User Interface that makes Tor's options and...
    Leader badge
    Downloads: 183 This Week
    Last Update:
    See Project
  • 22

    Ransomware Recovery Tool

    Why pay Ransom when you have Ransomware Recovery Tool for decryption

    ... by encrypting lots of valuable data. But with this, Ransomware Recovery tool, now you can recover files infected by Ransomware and other viruses. This recovery tool is one of the best solution to recover & restore corrupt, damaged and inaccessible data with great efficiency. Ransomware Recovery Tool can recover deleted & corrupted files, images, videos, data in original state. With high end algorithm and two recovery modes, it recover maximum possible data from you corrupted FAT & NTFS drives
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DES-Rotem

    DES-Rotem

    DES attempt to crack code with 3 rounds

    This Java project is an attempt to crack the key in a DES encryption algorithm. The plaintext and the cyphertext are known. The purpose is to crack the 64-bit key with 3 rounds instead of 16. This project checks all 2^64 possible keys. Therefore, it takes a long time to find the correct key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    openSSLGOSTSigner

    Simple GUI tool for openssl to sign files with GOST algorithm

    This software is a simple GUI tool which uses openssl command line utility underneath. It designed to sign any type of files with GOST algorithm (GOST cipher) and will be especially useful for russian ISP's and IT companies which in one way or another have to deal with Roskomnadzor's forbidden sites list to reduce the timewaste while typing in commandline each time you need to sign some file. To use this software you will need to have a ".PEM" file(which exactly used to sign files). If you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    TEAENCRYPTION

    A TEA encryption with GUI for 32-bit 64-bit works only on windows.

    A algorithm encryption based on TEA (Tiny encryption Algorithm) that will help the user to encrypt his text files and decrypt whenever the user wants as long as he uses the same key.It is simple to use but doesnt work with really really long text files.Will implement mac and other OS in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.