Showing 176 open source projects for "encryption algorithm"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    AWS Encryption SDK for Java
    The AWS Encryption SDK is a client-side encryption library designed to make it easy for everyone to encrypt and decrypt data using industry standards and best practices. It enables you to focus on the core functionality of your application, rather than on how to best encrypt and decrypt your data. The AWS Encryption SDK is provided free of charge under the Apache 2.0 license. With the AWS Encryption SDK, you define a master key provider (Java and Python) or a keyring (C, C#/.NET, and...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    xxHash

    xxHash

    Extremely fast non-cryptographic hash algorithm

    xxHash is an extremely fast non-cryptographic hash algorithm, working at RAM speed limit. It is proposed in four flavors (XXH32, XXH64, XXH3_64bits and XXH3_128bits). The latest variant, XXH3, offers improved performance across the board, especially on small data. It successfully completes the SMHasher test suite which evaluates collision, dispersion and randomness qualities of hash functions. Code is highly portable, and hashes are identical across all platforms (little / big endian)....
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Wesh Network Toolkit

    Wesh Network Toolkit

    Async Mesh Network Protocol for Extreme Communication

    ...Wesh provides a secured, distributed and asynchronous communication protocol, both with or without internet access using IPFS and direct transports such as BLE and proximity drivers. Wesh Protocol provides end-to-end encryption and perfect forward secrecy for all the exchanged messages. Distributed p2p transmissions and hosting over IPFS powered by CRDT algorithm. Efficient end-to-end encryption and perfect forward secrecy to prevent eavesdropping and provide reliable identity access management. Distributed authentication and authorization. Multiple devices per identity. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    GmSSL

    GmSSL

    Password toolbox that supports national secret

    GmSSL is an open source library of domestic commercial ciphers independently developed by Peking University. It realizes comprehensive functional coverage of national secret algorithms, standards, and secure communication protocols. It supports mainstream operating systems and processors including mobile terminals, and supports cryptographic keys, Cipher cards and other typical domestic cryptographic hardware provide feature-rich command line tools and multiple compiled language programming...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    Serpent_in_CBC_mode_for_MCUs

    Serpent_in_CBC_mode_for_MCUs

    Open-source code that enables you to use Serpent in CBC mode

    Serpent_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the Serpent encryption algorithm in CBC mode to your project. Based on the work of https://github.com/peterferrie/serpent GitHub Page: https://github.com/Northstrix/Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    AES_in_CBC_mode_for_MCUs

    AES_in_CBC_mode_for_MCUs

    Open-source code that enables you to use AES in CBC mode

    AES_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the AES encryption algorithm in CBC mode to your project. Based on the work of https://github.com/zhouyangchao/AES GitHub Page: https://github.com/Northstrix/AES_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AES-256 CBC File Encrypter

    AES-256 CBC File Encrypter

    Open source file encryption software

    An open-source software that enables you to encrypt your files using the AES encryption algorithm. GitHub page can be found at https://github.com/Northstrix/AES-256_CBC_File_Encrypter Made with the help of Perplexity If you find this project convenient, please leave a review to help others learn about it. Similar projects: https://sourceforge.net/projects/sta-file-encrypter/ https://sourceforge.net/projects/aes256-cbc-file-encrypter/
    Downloads: 4 This Week
    Last Update:
    See Project
  • 8
    seekthis
    🔐 SeekThis – File Encryption & Decryption Tool (AES) Secure your important files with SeekThis, a lightweight and efficient tool to encrypt and decrypt files using the AES (Advanced Encryption Standard) algorithm. With SeekThis, you can: ✅ Hide important files using your own key ✅ Protect data privacy quickly and easily ✅ Decrypt files only if you have the correct key ✅ Free and open-source!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160...
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 10
    The phones I have: Xiaomi Mix 2s (polaris) (Discontinued) OnePlus 7 Pro (guacamole) OnePlus 7T Pro (hotdog) RedMagic 9 Pro (tiro)
    Leader badge
    Downloads: 544 This Week
    Last Update:
    See Project
  • 11
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    i-ncript

    i-ncript

    A portable, cross-platform data encryption app.

    ...Files are encrypted using the Advanced Encryption Standard (AES), which employs a sophisticated round-based encryption method to provide a robust security foundation. Your key is additionally encrypted using the Argon2i algorithm, which enhances security by resisting side-channel attacks and using "salting" to defend against rainbow tables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
     In-Browser-File-Encrypter

    In-Browser-File-Encrypter

    The source code of the In-Browser-File-Encrypter web app

    The In-Browser File Encrypter is a simple web application that enables you to securely encrypt your files directly in your browser using the AES-256 encryption algorithm in CBC mode. Check it out at: https://codepen.io/Northstrix/pen/xxvXvJL and https://northstrix.github.io/In-Browser-File-Encrypter/V1.0/web-app.html GitHub page: https://github.com/Northstrix/In-Browser-File-Encrypter The download shortcut: https://sourceforge.net/projects/in-browser-file-encrypter/files/V1.0%20%28Improved%20UI%29/V1.0%20%28Improved%20UI%29.zip/download Successfully tested in Google Chrome on Windows 11 and Fedora 40.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Multron File Guardian

    Multron File Guardian

    A File Encrypter/Decrypter With Many/Hybrid Encryption Algorithms

    Multron File Guardian provides you a strong file encryption. Supported algorithms AES Serpent Twofish ThreeFish Camellia ChaCha20 RSA Hybrided With Symmetric Algorithms License = AAL You can set RSA Key Length (from 2048 to 16384) You can set Password-Iteration Rate. You can also set Symmetric Algorithm Key Size If you're about to share a file securely, then you may want to use one of Hybrid algorithms.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    BeeBEEP (Free Office Messenger)

    BeeBEEP (Free Office Messenger)

    You can message and share files inside your intranet without a server.

    BeeBEEP is a secure (encryption based on Rijndael Algorithm, AES) peer to peer office messenger. You can talk and send files with all your colleagues inside a local area network such of an office, home or internet cafe without a server. BeeBEEP works also with VPNs. This serverless application is indispensable in all those places where privacy and security an essential requirement.
    Leader badge
    Downloads: 2,302 This Week
    Last Update:
    See Project
  • 16
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East. Microsoft & Qt MinGW deprecated Win32 & for Compiling: ● https://sourceforge.net/p/goldbug/wiki/compiling As Spot-On implemented the minimal GB-concept & Nuvola Icons, GoldBug has now been fully integrated into Spot-On Win64: Just choose Tabs at East & Mini-View in Options - w/ Nuvola Icons of course! ...
    Downloads: 21 This Week
    Last Update:
    See Project
  • 17
    Open Stienolism Project

    Open Stienolism Project

    Open Stienolism Federated Networking + Resources + Peering Systematic

    ...We are already on Systems, Underlayer, Sublayer + Bells!! Including Signer (Cryptographic) Improvements as well as the new Manette.* PMCROE which TLA as an cipher algorithm stands for: Polyphasic Mutimultifacet Cross Rail Organic Encryption --> which is in effect with the ChronolabsCoop-Stiens.* for all old fashion Secure Functions, we offer a range of tools and abstraction executables to assist with stien, you can on out: https://stien.sourceforge.io --> mount stien files directly over the timing bell, which the signer with an online signal to sourceforge.net can also do this; when we make this all available!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PWSLIB3

    PWSLIB3

    Password Safe encrypted databases, Java library

    Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SimpleDCS
    SimpleDCS is a Distributed Control System made easy - fully configurable both on hardware and a software level. Experimental stage (alpha)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    badpi-cyphering

    symetric crypto based on PI calculation.

    encryption/decryption/key generation/CRC. You may use as a library (header *.hpp files)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Sobbu

    Sobbu

    Encode-Decode Tool weaponized with Hash Encrypt & Hash Cracker

    Sobbu is a cryprography tool with various encode-decode algorithm weaponized with Hash encrypting and Hash cracker via Rainbow Table method. This tool used 4 different hash database to identify hash value. Currently available for Windows (CLI + GUI) and Linux (CLI) Latest version : 1.4 Available Encode-Decode algorithm : - Base32 - Base64 - Binary - Octal - Hex - ASCII - URL - HTML - ROT13 Available Hash encrypting and Hash cracking algorithm : - MD5 - SHA1 - SHA224 -...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    KhadashPay

    KhadashPay

    The KhadashPay project is an open-source payment system.

    The KhadashPay project is my attempt to make a payment system from scratch. As for the customers of the store where the KhadashPay is deployed, Khadash pay doesn't keep any logs whatsoever and doesn't require a bit of your personal information to create an account. You can find the tutorials here: V2.0 (ESP32 Version): https://www.instructables.com/KhadashPay-V20/ V2.0 (Raspberry Pi Pico Version): https://www.instructables.com/KhadashPay-V20-Raspberry-Pi-Pico-Version/ V3.0...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    .... - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 24

    SHA256-in-C

    SHA-256 Algorithm Implementation in C

    Downloads: 2 This Week
    Last Update:
    See Project
  • 25
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next