Open Source Cryptography Software - Page 33

Cryptography Software

View 5855 business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    "HelloWorld goes mobile" is a decentralized social network for mobile phones running under Google Android. It is based on XML and different JAVA encryption technologies. The software-structure is based on the desktop-orientated project "HelloWorld".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Herbivore is a distributed system providing information-theoretic perfect sender and receiver anonymity on the Internet.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This is a driver for PCI encryption cards using the Hi/fn 7751 encryption processor, including cards from GTGI, NETSEC, Invertex and Hi/fn themselves. Supports all card modes and functions, including encryption unlock and compression.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Application written in Python, that hides information from a file into a PNG image.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    Stegonography project developed for ITS 450 - Software Assurance under the instruction of Prof. Sydney Liles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Store and retrieve passwords Online while keeping it secure. Web based (php+flatfile) for easy retrieval. All passwords stored are encrypted and the master (key) password is never saved. Even the user-id are all encrypted. CHECK PROJECT WEBSITE FOR DEMO!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Huskarl is an alternative authentication and key exchange schema for Bluetooth devices.Huskarl produces secure shared link keys between two devices using public key cryptography.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Ascii based Encryption/Decrypt Software. Allows you to Encrypt/Decrypt Ascii and Ascii based files. Passwords can be of any length. Simple and easy User Interface. Allows other VB6 developers to encrypt in thier programs. (v2 only)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Hyperfile provides an easy-to-use and flexible interface to power and maintain highly dynamic user-defined data sources. The data sources are stored using a secure and reliable encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10

    HyveDecrypter

    Decrypter/Encrypter

    C# .NET Application for Encryption and Decryption of strings for sharing passwords or usernames with friends, colleagues etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    IKECrack is an IKE/IPSec crack tool designed to perform Pre-Shared-Key [password] analysis of RFC compliant aggressive mode authentication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    INTIX-JSIGNER is a java web application for signing documents (XML and/or PDF) of unattended way and in the server side. It has as main modules the following: Authentication, XML and PDF Signing and Keys and Certificates Management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    IPSOne is a open-source client to provide a IPSec connection and certficate management on Windows 2000/XP-client. Currently it is based on ipseccmd.exe (Support Tools).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type, on a key-phrase of any complexity. ISC is a symmetric key encryption system, which means that both the sender and recipient of a message must possess the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ISO18013 Electronic Driving License Java reference implementation. The project implements the host API for reading out ISO compliant electronic driving licenses and a Java Card applet that implements the standard on a smart card.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    IceNotes ME for Mobile Devices is an extremly usefull ;-) JAVA ME (J2ME) application to store all your important (text)notes on your mobile phone using "Twofish" encryption. Your notes are organized by assigning your own custom tags to your notes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Identityflow provides a framework for building protocol flows that perform distributed Identity operations. Examples of Identity Operations are Single Sign-On (SSO) and Attribute queries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    IeClose prevent Internet Explorer to start. With a password function, only user with the password can start/stop the blocking. The password can easily be changed, require the old password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The Ikirux Project goal is to make an easy, manegeable installer of a web development platform centered around Open Source servers and tools for the windows 32 plataform. This includes an automated installer for an integrated apache2+php4+mysql4+jakartat
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Image Encryption encypts a text into an image, by appling an offset to each single byte.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. There is a need to secure the computation state during communication and storage and we achieve this through the implementation of a trusted platform.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ImpraStorage

    ImpraStorage

    ImpraStorage provided a private imap access to store large files

    ImpraStorage provided a private imap access to store large files. Each file stored on the server is split in severals random parts. Each part also contains random noise data (lenght depends on a crypt key) to ensure privacy and exclude easy merge without the corresponding key. An index of files stored is encrypt (with the symmetric-key algorithm Kirmah) and regularly updated. Once decrypt, it permit to perform search on the server and download each part. transfert process is transparent. Just vizualize locally the index of stored files and simply select files to download or upload. ImpraStorage automatically launch the parts to download, then merge parts in the appropriate way to rebuild the original file. Inversely, a file to upload is split (in several parts with addition of noise data), and ImpraStorage randomly upload each parts then update the index.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    In Plain Sight (Beta)

    In Plain Sight (Beta)

    Hide your files and text in plain view of the world safely

    An application offering the possibility of embedding an image files and plain text into images, even going as far as password protecting the resulting file if desired. Simple to use and effective.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Note: I haven't even looked at this project for years. I was a pretty bad programmer back then, so the code is sloppy. The next version will be better. Similar to a stream cipher, but rather than performing an exclusive OR on the input bytes and cipher, it performs a mixture of 'rolling' (see x86 instruction ROR) and bit NOT operations according to the key.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Inferno is a simple and fast program that can securely delete files using the same methods as the U.S. Department of Defense. Inferno can also securely delete internet and windows history. Also it can even encrypt and decrypt your private files.
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB