RSS 15 projects tagged "Cryptography"

Download Website Updated 30 Jan 2001 distributed.net clients

Screenshot
Pop 50.97
Vit 1.79

distributed.net is a loosely knit group of computer users from all of the world that is taking up challenges requiring lots of computing power (most notably the RC5, DES, and OGR cracking contests). It is simple to participate in the challenges by downloading and running their client software (which uses idle CPU time to complete its tasks).

Download Website Updated 16 Feb 2012 vpnd

Screenshot
Pop 88.17
Vit 5.14

vpnd is a daemon which connects two networks on network level either via TCP/IP or a (virtual) leased line attached to a serial interface. All data transfered between the two networks are encrypted using the unpatented free Blowfish encryption algorithm with a key length of up to 576 bits (may be downgraded to a minimum of 0 bits to suit any legal restrictions).

Download Website Updated 03 Mar 2013 Botan

Screenshot
Pop 442.44
Vit 42.71

Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.

Download Website Updated 11 Dec 2009 OpenVPN

Screenshot
Pop 386.17
Vit 7.07

OpenVPN is a robust and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the Internet. OpenVPN's principal strengths include wide cross-platform portability, excellent stability, support for dynamic IP addresses and NAT, adaptive link compression, single TCP/UDP port usage, a modular design that offloads most crypto tasks to the OpenSSL library, and relatively easy installation that in most cases doesn't require a special kernel module.

Download Website Updated 18 Jan 2014 Disk ARchive

Screenshot
Pop 1,019.29
Vit 50.40

Dar is a shell command that makes backup of a directory tree and files. Its features include splitting archives over several files, DVD, CD, ZIP, or floppies, compression, full or differential backups, strong encryption, proper saving and restoration of hard links, extended attributes, file forks, Door inodes, and sparse files, remote backup using pipes and external commands (such as ssh), and rearrangement of the "slices" of an existing archive. It can run commands between slices, before and after saving some defined files or directories (for a proper database backup, for example), and quickly retrieve individual files from differential and full backups. Several external GUIs exist as alternatives to its CLI interface, like kdar, DarGUI, SaraB, etc.

Download Website Updated 23 Nov 2013 yaSSL

Screenshot
Pop 265.43
Vit 35.23

yaSSL is a C++ based SSL library for embedded and RTOS environments, designed for individuals who prefer to use the C++ language. For a C-based solution, please see CyaSSL. yaSSL supports the industry standards up to TLS 1.2, and also includes an OpenSSL compatibility interface.

No download Website Updated 12 Sep 2004 General Purpose Hash Function Library

Screenshot
Pop 42.14
Vit 1.42

The General Purpose Hash Function Algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the C++ programming language.

Download Website Updated 06 Sep 2004 stegdetect

Screenshot
Pop 138.08
Vit 1.00

Stegdetect is an automated tool for detecting steganographic content in images. It is capable of detecting several different steganographic methods to embed hidden information in JPEG images. Currently, the detectable schemes are jsteg, jphide, invisible secrets, outguess 01.3b, F5, appendX, and camouflage. Using linear discriminant analysis, it also supports detection of new stego systems. Stegbreak is used to launch dictionary attacks against JSteg-Shell, JPHide, and OutGuess 0.13b.

Download Website Updated 30 Aug 2009 daes

Screenshot
Pop 33.69
Vit 2.00

daes is a little program for encrypting files.

Download Website Updated 06 Jan 2006 linvpn

Screenshot
Pop 26.55
Vit 1.00

Linvpn is a secure socket layer for pppd. It allows creation of virtual private networks by using an IP routing system between PPP network interfaces. Cryptography is done by libgcrypt's 3DES or blowfish, and Initialization Vector (IV) is changed in each packet transmission. As linvpn works as client and server, and communication is a single TCP connection, it allows creation of secure tunnels even in complex network layouts, when one or both endpoints are behind a firewall or NAT, with or without dynamic IP addresses.

Screenshot

Project Spotlight

CyaSSL

A lightweight SSL/TLS library supporting up to TLS 1.2 and DTLS 1.2.

Screenshot

Project Spotlight

Burp

A program that backs up and restores data.