The WiKID Strong Authentication System is a highly scalable, secure two-factor authentication system. It is simple to implement and maintain, allows users to be validated automatically, requires no hardware tokens, has a simple API for application support (via Ruby, PHP, Java, COM, Python, etc.), supports multiple domains, and supports replication for fault tolerance and scalability. It also supports mutual /host and transaction authentication, wireless tokens only domains, locked tokens (to your PC), anti-keystroke logger keypad PIN entry, etc.
pyOpenSSL is a Python wrapper for a subset of OpenSSL's functionality, featuring an advanced error management system, connection objects that wrap socket methods, and flexible context objects. Also included is a rudimentary crypto module that can be used to create and verify certificates (X509 objects).
CAKE (Key Addressed Crypto Encapsulation) is a bunch of Python and C++ for implementing the CAKE protocol. The CAKE protocol is a protocol in which all messages have source and destination addresses that are public keys. This is in the same way that IP packets have a source and destination address that is an IP address.
Better ASN is a Java ASN.1 API that focuses on speed and efficiency rather than extended functionality. This strategy prescribes one-pass decoding and near 100% encoding efficiency for typical ASN.1 usage patterns. Although BASN was developed for use by a Certificate Authority, the release comes packaged with an ASN.1 to Java compiler, which can be used to generate Java implementations of ASN.1 structures. This allows the API to be used for any Java application that may require ASN.1 decoding/manipulation/encoding.
PyCryptoPlus is a cryptographic module similar to PyCrypto, with which it shares the API. But PyCryptoPlus is written 100% in Python, so its primary interest is educational and scientific; if you want real speed, you're better checking out PyCrypto. It was not completely written from scratch, but integrates other cipher codes when available in Python and under appropriate licenses. It contains, among other things: Block cipher algorithms (Serpent, Blowfish, Twofish, DES, 3DES, AES, Rijndael, and PRESENT); modes of operation (CMAC, ECB, CBC, CTR, and XTS); paddings (bit padding, zeros, PKCS7, PKCS12, ISO 10126, and ANSI X.923); and one-way functions (MD5, SHA1/SHA2, Whirlpool, RipeMD, RadioGatun, HMAC, and PBKDF2).
Zorp is a proxy firewall suite with its core architecture is built around today's security demands: it uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.
The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.