Search Results for "caesar cipher encryption code"

Showing 39 open source projects for "caesar cipher encryption code"

View related business solutions
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • Manage printing in a cost-efficient and eco-friendly way with Gelato. Icon
    Manage printing in a cost-efficient and eco-friendly way with Gelato.

    Gelato offers an extensive catalog of custom products, a zero-inventory business model, and free designing tools—all in one place.

    The world's largest print on demand network with 130+ production partners across 32 countries. Gelato offers end-to-end design, production and logistics for individuals looking to start their own business today!
    Sign up for Free
  • 1
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    GmSSL is an open source library of domestic commercial ciphers independently developed by Peking University. It realizes comprehensive functional coverage of national secret algorithms, standards, and secure communication protocols. It supports mainstream operating systems and processors including mobile terminals, and supports cryptographic keys, Cipher cards and other typical domestic cryptographic hardware provide feature-rich command line tools and multiple compiled language programming...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Grain128AEAD

    Grain128AEAD

    A lightweight AEAD stream cipher submitted to the CAESAR competition

    ... the recommended cipher to use for hardware environments providing both 128bit security and authentication. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/grain Visit: http://albanese.atwebpages.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    GOST Toolkit ☭

    GOST Toolkit ☭

    Cross-platform GOST Security Suite written in Pure Go

    Multi purpose cross-platform cryptography tool for symmetric encryption, hash digest, cipher-based message authentication code (CMAC) hash-based message authentication code (HMAC), digital signature, shared key agreement (VKO) and PBKDF2 function. GOST is GOvernment STandard of Russian Federation: GOST 28147-89 64-bit block cipher (RFC 5830) GOST R 34.11-94 hash function 256-bit (RFC 5831) GOST R 50739-95 data sanitization method (non-cryptographic) GOST R 34.10-2001...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 5
    Ascon

    Ascon

    Command-line Ascon v1.2 Encryption Tool written in Go

    Ascon is a new family of authenticated encryption algorithms, submitted to the CAESAR competition for authenticated ciphers. The Ascon family was designed to be lightweight and easy to implement, even with added countermeasures against side-channel attacks. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/ascon Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Serpent_in_CBC_mode_for_MCUs

    Serpent_in_CBC_mode_for_MCUs

    Open-source code that enables you to use Serpent in CBC mode

    Serpent_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the Serpent encryption algorithm in CBC mode to your project. Based on the work of https://github.com/peterferrie/serpent GitHub Page: https://github.com/Northstrix/Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AnubisCrypt

    AnubisCrypt

    Anubis Involutional 128-bit SPN Block cipher Encryption Tool

    Barreto & Rijmen 128-bit block cipher with GCM Mode (RFC 5288) provides both authenticated encryption (confidentiality and authentication) and the ability to check the integrity and authentication of additional authenticated data (AAD) that is sent in the clear. Whirlpool-based PBKDF2. Anubis is a block cipher with SP-network structure designed by Vincent Rijmen and Paulo S. L. M. Barreto in 2000. This project is licensed under the ISC License. Source code: https://github.com...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    AES_in_CBC_mode_for_MCUs

    AES_in_CBC_mode_for_MCUs

    Open-source code that enables you to use AES in CBC mode

    AES_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the AES encryption algorithm in CBC mode to your project. Based on the work of https://github.com/zhouyangchao/AES GitHub Page: https://github.com/Northstrix/AES_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    AES_plus_Blowfish_in_CBC_mode

    AES_plus_Blowfish_in_CBC_mode

    Open-source code that enables you to use AES + Blowfish in CBC mode

    The AES_plus_Blowfish_in_CBC_mode repository contains two sketches that enable you to encrypt your data using a combination of AES and Blowfish encryption algorithms in CBC mode. The only difference between them, from the functional point of view, is that one verifies the integrity of the decrypted data (plaintext) while the other doesn't. Copyright/Ownership/Licenses Attention! I didn't develop the libraries utilized by these sketches. I took them from the following repositories: https...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Save hundreds of developer hours with components built for SaaS applications. Icon
    Save hundreds of developer hours with components built for SaaS applications.

    The #1 Embedded Analytics Solution for SaaS Teams.

    Whether you want full self-service analytics or simpler multi-tenant security, Qrvey’s embeddable components and scalable data management remove the guess work.
    Try Developer Playground
  • 10
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246). LEA is included in the ISO/IEC...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    AES_plus_Serpent_in_CBC_mode

    AES_plus_Serpent_in_CBC_mode

    Open-source code that enables you to use AES + Serpent in CBC mode

    The AES_plus_Serpent_in_CBC_mode_for_microcontrollers repository contains code that enables you to encrypt your data using a combination of AES and Serpent encryption algorithms in CBC mode. In addition to that, the code in this repository enables you to verify the data integrity, thanks to the HMAC-SHA256. Attention! I didn't develop the libraries utilized by these sketches. I took them from the following repositories: https://github.com/zhouyangchao/AES https://github.com/peterferrie...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    GOSTCrypt ☭

    GOSTCrypt ☭

    GOST R 34.10-2015 Kuznechik Block Cipher Encryption Tool

    GOST R 34.12-2015 Kuznechik block cipher (RFC 7801) with Multilinear Galois Mode (RFC 9058). This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/gostcrypt Visit: http://albanese.atwebpages.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    CaptfEncoder

    CaptfEncoder

    Captfencoder is a rapid cross platform network security tool suite

    Captfencoder is a rapid cross-platform network security tool suite, providing network security-related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools. CaptfEncoder V3 develop by Rust, Executable programs are smaller, faster, better performing, and more powerful. CaptfEncoder V3 suport script extension.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 14
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    .... Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Jack LIRE (Linked Record)

    Jack LIRE (Linked Record)

    Quantum universal object system with referencing and genetics

    Jack LIRE (Linked Record) is a quantum database-backed life-long text record diary with referencing (linking) between records, and a data library for life-long keeping of files such as documents, photographs, music and more. The diary records are fully searchable. Files can be mentioned in diary records to preserve memories, document knowledge and ideas, and more. Massive numbers of diary records and files can be permanently kept. A database located on one computer can be accessed from...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Alien Cipher

    Alien Cipher

    A bespoke symmetric cipher.

    Released under 'Creative Commons v3' license Alien Cipher is an endevour to build my own symmetric cipher. The primary aim is to simply learn the fundementals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for prosterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 512bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    ... monitoring software. It can be used with any other software where you can configure external application to be executed when specific event occurs. Mail Alert Simple Mailer supports SSL and STARTTLS protocols, so it is compatible with many free e-mail providers like GMail, Hotmail, etc. Unlike other simple command line tools it supports ISO-8859-1, ISO-8859-2 and UTF-8 code pages for national characters. Mail Alert Simple Mailer encrypts SMTP password in configuration file.
    Leader badge
    Downloads: 11 This Week
    Last Update:
    See Project
  • 20
    Time Travel Project

    Time Travel Project

    A project for open source time travel with computers.

    For more information please see my web-sight: http://timetravelinstitute.biz/ http://time-travel.institute http://timetravelcomputers.blogspot.com YouTube Channel: https://www.youtube.com/user/Reactor1967 Cryptography - The art of writing or solving codes. The study of techniques for secure communication. Cipher - Code to secure communication. The cipher is used for encryption or decryption Temporal Cryptography - The study of techniques to recover information lost or hidden...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    RSAREF

    RSAREF

    RSAREF(TM): A Cryptographic Toolkit

    This is the ancient and highly depreciated RSA refrence code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that each...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only 5...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a 16384...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next