RSS 608 projects tagged "Cryptography"

Download Website Updated 18 May 2001 AES Encryption for Shell Scripts

Screenshot
Pop 142.62
Vit 1.76

AES Encryption for Shell Scripts provides strong encryption/decryption using the Advanced Encryption Standard algorithm "Rijndael" to do 128-bit encryption. It is intended for use in shell scripts or as part of a larger cryptosystem, not as a standalone program.

Download Website Updated 28 Jul 2001 anonvelope

Screenshot
Pop 56.62
Vit 1.47

anonvelope is a mail-message processing program that is designed to allow the message to make full use of Type-I (cpunk-style) remailers. It is especially designed to work with Pine, but it is possible it may be used with other MUAs.

Download Website Updated 19 Mar 2007 Apache-SSL

Screenshot
Pop 147.33
Vit 5.17

Apache-SSL is the original secure webserver based on Apache and SSLeay/OpenSSL. It provides 128 bit encryption, client authentication and a modular API. It is actively maintained, and very widely used.

Download Website Updated 30 Jan 2001 arc

Screenshot
Pop 78.01
Vit 1.00

arc is an ASN.1 compiler written by FORGE Research for use in internal projects. It is being released under a BSD-like licence. arc creates Java source code that uses the basic ASN.1 classes that were created for use with other FORGE projects. These basic ASN.1 classes are included in the arc distribution.

No download Website Updated 01 May 2009 audio-entropyd

Screenshot
Pop 93.10
Vit 4.21

audio-entropyd feeds the /dev/random device with entropy data read from an audio device. The audio data is not copied as is, but first 'de-biased' and analyzed to determine how many bits of entropy are in it. This program is useful for systems doing many cryptographic tasks like VPN endpoints or GPG clients; it helps prevent the /dev/random device from being depleted and blocking reads.

Download Website Updated 12 Jul 2009 BeeCrypt

Screenshot
Pop 214.61
Vit 6.62

BeeCrypt is an ongoing project to provide strong and fast cryptography in the form of a toolkit usable by commercial and open source projects. Included in the library are entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.

Download No website Updated 30 Jan 2001 BestCrypt

Screenshot
Pop 80.72
Vit 1.76

A BestCrypt volume is accessible as a regular filesystem on a correspondent mount point. The data stored on a BestCrypt volume is stored in the container file. A container is a regular file or block device, so it is possible to backup, move, or copy it to other disk (CD-ROM or network, for instance) and continue to access encrypted data using BestCrypt. BestCrypt supports the following encryption algorithms: GOST in Cipher Feedback mode and BLOWFISH, DES, TWOFISH in Cipher Block Chaining mode. A container can be formatted for any filesystem supported by Linux (MINIX, EXT, EXT2, FAT, FAT32, and others) and mounted as an additional volume to any mount point.

Download Website Updated 30 Sep 2009 Bit::Vector

Screenshot
Pop 180.53
Vit 7.24

Bit::Vector is a (stand-alone) C library and an object-oriented Perl module (with overloaded operators) which allows you to handle bit vectors, sets (of integers), "big integer arithmetic" (e.g. for cryptography), and boolean matrices (all of arbitrary size) very efficiently.

Download Website Updated 13 Dec 2001 CDSA 2

Screenshot
Pop 40.25
Vit 1.49

CDSA stands for Common Data Security Architecture. It provides a security framework that includes cryptographically signed modules to present an abstracted unified API to the application developer to perform cryptographic and security related operations. It also includes hardware support for cryptographic tokens and biometric devices, such as thumbprint scanners. Intel has implemented the CDSA 2 specification and released it as open source.

Download Website Updated 04 Aug 2004 CIPE

Screenshot
Pop 201.16
Vit 3.10

CIPE (Crypto IP Encapsulation) is an ongoing project to build encrypting IP routers. The protocol used is as lightweight as possible. It is designed for passing encrypted packets between prearranged routers in the form of UDP packets. This is not as flexible as IPSEC but it is enough for the original intended purpose: securely connecting subnets over an insecure transit network.

Screenshot

Project Spotlight

Lzlib

A compression library for lzip files

Screenshot

Project Spotlight

TOMUSS

An interactive Web spreadsheet allowing concurrent table editing.