RSS 49 projects tagged "Cryptography"

Download No website Updated 26 Mar 2014 WiKID Strong Authentication System

Screenshot
Pop 2,416.52
Vit 158.25

The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.

Download Website Updated 09 Sep 2001 pyOpenSSL

Screenshot
Pop 43.16
Vit 67.90

pyOpenSSL is a Python wrapper for a subset of OpenSSL's functionality, featuring an advanced error management system, connection objects that wrap socket methods, and flexible context objects. Also included is a rudimentary crypto module that can be used to create and verify certificates (X509 objects).

No download Website Updated 20 Aug 2003 CAKE

Screenshot
Pop 16.97
Vit 62.44

CAKE (Key Addressed Crypto Encapsulation) is a bunch of Python and C++ for implementing the CAKE protocol. The CAKE protocol is a protocol in which all messages have source and destination addresses that are public keys. This is in the same way that IP packets have a source and destination address that is an IP address.

Download Website Updated 07 Nov 2003 Better ASN

Screenshot
Pop 17.55
Vit 61.81

Better ASN is a Java ASN.1 API that focuses on speed and efficiency rather than extended functionality. This strategy prescribes one-pass decoding and near 100% encoding efficiency for typical ASN.1 usage patterns. Although BASN was developed for use by a Certificate Authority, the release comes packaged with an ASN.1 to Java compiler, which can be used to generate Java implementations of ASN.1 structures. This allows the API to be used for any Java application that may require ASN.1 decoding/manipulation/encoding.

Download Website Updated 22 Jan 2005 sigcheck

Screenshot
Pop 20.57
Vit 58.13

sigcheck is a script to verify file signatures, using gpg as its backend. It displays whether the signature was correct and lists the files and dates on which you have seen the same signature before.

Download Website Updated 28 Mar 2007 pykeynote

Screenshot
Pop 13.34
Vit 50.83

pykeynote is a Python extension module for KeyNote. It provides a high-level object-oriented interface to the KeyNote trust management API. The distribution package includes a comprehensive test suite and a sample application.

No download Website Updated 19 Oct 2008 Loxodo

Screenshot
Pop 25.46
Vit 44.87

Loxodo is a password vault that is compatible with Password Safe V3.

No download No website Updated 23 Apr 2010 PyCryptoPlus

Screenshot
Pop 42.28
Vit 38.24

PyCryptoPlus is a cryptographic module similar to PyCrypto, with which it shares the API. But PyCryptoPlus is written 100% in Python, so its primary interest is educational and scientific; if you want real speed, you're better checking out PyCrypto. It was not completely written from scratch, but integrates other cipher codes when available in Python and under appropriate licenses. It contains, among other things: Block cipher algorithms (Serpent, Blowfish, Twofish, DES, 3DES, AES, Rijndael, and PRESENT); modes of operation (CMAC, ECB, CBC, CTR, and XTS); paddings (bit padding, zeros, PKCS7, PKCS12, ISO 10126, and ANSI X.923); and one-way functions (MD5, SHA1/SHA2, Whirlpool, RipeMD, RadioGatun, HMAC, and PBKDF2).

No download Website Updated 11 Feb 2014 Zorp

Screenshot
Pop 310.06
Vit 31.79

Zorp is a proxy firewall suite with its core architecture is built around today's security demands: it uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.

Download Website Updated 16 Feb 2014 Mandos

Screenshot
Pop 657.12
Vit 30.11

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Screenshot

Project Spotlight

C-ICAP Classify

An AI content filter.

Screenshot

Project Spotlight

cego

A relational and transaction-based database system.