Showing 281 open source projects for "encryption algorithm java"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    OpenSource Java based cross platform command line file encryption software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cumulus4j is an encryption plug-in for DataNucleus. Applications can thus use JDO or JPA to persist their data into every common database. Using the Bouncy Castle cryptography libs, it provides strong encryption via AES, TwoFish or other algorithms.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4

    ENIGMA 2000

    ENIGMA 2000 is a reliable file encrypter for DOS shell

    ENIGMA 2000 is a symmetric cryptographic algorithm developed in C++ for Windows, to encrypt any file. It is not optimized for speed processing but it is extremly reliable. Tests state that a huge input file just with zeros, will return an output file whose frequency analysis is white noise. It uses six phases to encrypt any file and the phases sequence depends on the password. On phase 5, it uses the Rubik's cube paradigm to encrypt the data. It's extremly reliable and the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    Skein 512-512 hash algorithm implemented in Bash. Prepare to have your CPU pegged, and for simple hash calculations to take around 10 seconds. Hit the Home tab for details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    HTTPBrute is used to calculate HTTP Digest Access Authentication as per RFC 2617. The tool will be able to perform brute force attacks to retrieve a lost password for a given Authentication response. MD5 is the only hashing algorithm implemented.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Using encryption to secure your code or text. Click File->Run to run your code using Ruby, see the pop up for output. Never save your text or code to disk unencrypted. Don't forget your password. Encryption is error-persistent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10
    Alkindus is an automated solver for short monoalphabetic substitution ciphers without word divisions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    TBFAA/encoder
    A program that encrypts multiple files. It uses new encryption algorithms, such as a Three-Block Feistel chiper, ArchFurry's algorithm and a new hash function. Licensed under the ISC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A command-line to help encipher and decipher your password based on a simple algorithm. Java version provides GUI.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13
    One-time password generator for the Nokia N900. Supports OAUTH tokens (HOTP, TOTP) as well as the Mobile-OTP algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    XTEA (eXtended Tiny Encryption Algorithm) support for db4o open source object database. XTEA is a block cipher that operates on a 64-bit block size with a 128-bit key. An extremely tiny but very fast encryption algorithm (with cycles less than 32 rounds)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    P.I.G.
    P.I.G.: Privacy In Gedit, a plugin for gedit, encode and decode text to base64.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JConfigura is a library usable in java environments for sharing configuration parameters between different java applications. Moreover it exculpates developers of aspects like property file reading and securing property files with rsa encryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    ShredBitz
    ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding. ShredBitz is a very powerful tool.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    A small encryption / decryption application that we are giving away free of charge. Version 1.0.00 - RSA only at the moment. But later versions will have a plug-in system for adding more algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    TextConverter is a graphical text editor allowing the user to encrypt/decrypt the textual contents displayed on the screen using a 128-bit AES (Advanced Encryption Standard) cipher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    The project Jaulp is jet another utility library project written in Java. It contains utility classes for Date ,Calendar, Collections, Resources, Files, IO for Random data, and many more. This is the last version for this project.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Dr. Crypt Encryption Algorithm & Library
    DrCrypt, based on basic xor(exclusive or) encryption which is designed to be fast and reliable. Also DrCrypt supports 3 platform.(Java, .NET, Win32)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A Javascript implementation of the Blowfish Encryption Algorithm described by Bruce Shneier circa 1993. Blowfish is a keyed, symmetric block cipher common in cipher suites and was placed, by Mr. Shneier, in the public domain.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    JCrypTool Plug-ins
    JCrypTool moved to GitHub! See https://groups.google.com/d/topic/jcryptool-developers/nauEXL6vsbk/discussion for more information and visit our new project home at https://github.com/jcryptool
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Contego Software
    Tool "Contego" for encryption to plain text (UTF-8) and verification, testing and generation of MD5 and SHA-1 sums for files. Version 2.0 multilnguaje and fully operational. Encriptacion para texto plano (UTF-8) y utilidades para sumas MD5 y SHA-1.
    Downloads: 0 This Week
    Last Update:
    See Project