Showing 396 open source projects for "encryption algorithm java"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    Hyperfile provides an easy-to-use and flexible interface to power and maintain highly dynamic user-defined data sources. The data sources are stored using a secure and reliable encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    KCrypto is a KDE2 file encryptor. It uses the Rijndael ( block cipher algorithm AES winner ) public domain c++ class implementation written by Szymon Stefanek , and it is capable of encrypting and decrypting every kind of file ( text and binary ) i
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    sectar: a program that creates encrypted tape archives(tar files), using the AES algorithm Rijndael. Encryption exported under exemption TSU 740.13. Was star, now sectar.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    CryptoLib is a crypto library for PalmOS based on OpenSSL, which implements BlowFish algorithm, and is intended to support any other crypting algorithm in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5
    The RAZip bitstream format was designed to provide a faster random access to compressed data than what is currently possible using the GZIP format. During the desing phase, some other features were added, like encryption and error correction.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    An API and test suite, or possibly an application unto itself, to manage keys and allow mail user agents (such as pine or mutt) to use encryption and authentication systems (such as S/MIME) via the services of external encryption suites (such as OpenSSL)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Secure Java Instant Messenger. Supports asymmetric key encryption of messages. will support multiple protocols (Jabber initially) and multiple UIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    The iText based PDF sCramblEr allows you to encrypt a PDF using one or more public certificates of the addressees (one or more .cer files). For each .cer file, you can enforce specific PDF permissions: (dis)allow printing, (dis)allow modification,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An encryption algorithm and UI frontend written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Test your software product anywhere in the world Icon
    Test your software product anywhere in the world

    Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.

    Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
    Try us today.
  • 10
    · A free chat server coded in java. · Supports secure connections via the Diffie-Hellman-Algorithm. · One java chat client available. · Other clients in production.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Java Chaotic Random Number Generator - Inspired by chaos theory, the intent of this generator is to produce unseeded, unpredictable numbers. The numbers will not follow a predictable sequence and will not rely on a pseudorandom algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AresCode2008 is system to crypt files. System is used new cryptography algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Simple Encrypt

    Simple Encrypt combines RSA encryption with AES to encrypt text files.

    RSA (Rivest-Shamir-Adleman) is a public-key encryption algorithm with a typical key size of 1,024 to 4,096 bits. 2 large primes are required to generate the keys. AES (Advanced Encryption Standard) is based on Rijndael, secret-key encryption algorithm using a block cipher with key sizes of 128, 192, or 256 bits. Simple Encrypt will take a text file, generate keys and then encrypt it. The output is the ciphertext and keys. Note: Realistically, I will keep the algorithms simple(r...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Distributed Cryptosystem

    Distributed cryptosystem based on Shoup’s threshold signature scheme

    In distributed cryptosystem a secret key is distributed among the participants of the system, in the way that only a group of some authorized users can perform any actions related to the secret key. A secret key is used to encrypt a session key, create a digital signature and to certify public keys. The system uses symetric encryption algorithm with a session key to encrypt messages. Shoup’s threshold signature scheme has been used for cooperative signing and also for cooperative decryption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Encrypt Flash Drive in Windows 10

    One-click to encrypt flash drive, USB drive and hard disk in Windows.

    The flash drive encryption tool is the professional encryption software that encrypts USB drives. It uses the most common encryption algorithms such as AES 256-bit to encrypt flash drive in Windows 10. It encrypts the entire USB drive, the encrypted files will be hidden, and you will only be able to access them if you run the encryption program in the encrypted flash drive and enter the correct password. In addition to the USB drive, this software can also secure other removable storage drives...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Meergoose

    Meergoose

    Privacy Platform | Encrypt Locally | Secure Remotely

    Meergoose is a multi-use social suite of applications that allows users to setup a portal on their personal computing platform that encrypts and stores files locally and synchronizes encrypted files with a secure cloud. MeerCrypt is a component of Meergoose and is opensource. The vision is simple: Encrypt Locally. Share Remotely. YOU remain in control of your security, your keys, your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Open Source Encryption and digital signature libraries for JMS. These librararies are writen in java and are to support secure integration through middelware/ISB/ESB
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    KiSS, Kilobyte SOAP Security, is a J2ME library that provides WS-Security for kSOAP2. It supports the WSS Username Token Profile and a subset of the XML Encryption and Processing recommendation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A secure PKI-based client/server encrypted chat engine under development in Java. Encryption will be supported via JCE and PKCS#11. A simple Java interface can be implemented by other projects wishing to develop a Java GUI or CLI for the client.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Open eSign allows software developers and technical parties in a company to create secure, online (web-based) forms and documents that follow a business process flow and enable legally recognized electronic signatures using digital signature technology.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.