608 projects tagged "Cryptography"

Download Website Updated 17 Jul 2011 crypt_blowfish

Screenshot
Pop 128.29
Vit 6.23

crypt_blowfish is an efficient implementation of a modern password hashing algorithm, based on the Blowfish block cipher, provided via the crypt(3) and a reentrant interface. It is compatible with bcrypt as used in OpenBSD. It is adaptable to future processor performance improvements, allowing you to arbitrarily increase the processing cost of checking a password while still maintaining compatibility with your older password hashes. The hashes it produces are several orders of magnitude stronger than traditional Unix DES-based or FreeBSD-style MD5-based hashes.

Download Website Updated 16 Jul 2011 OpenSC

Screenshot
Pop 174.78
Vit 9.59

OpenSC provides a set of libraries and utilities to work with smart cards. Its main focus is on cards that support cryptographic operations, and facilitates their use in security applications such as authentication, mail encryption, and digital signatures. OpenSC implements the PKCS#11 API so that applications supporting this API (such as Mozilla Firefox and Thunderbird) can use it. On the card, OpenSC implements the PKCS#15 standard, and aims to be compatible with every software/card that does so.

No download Website Updated 12 Apr 2011 Privatix Live-System

Screenshot
Pop 74.83
Vit 2.23

Privatix Live-System is a portable encrypted operating system designed to be run directly from a USB flash drive or an external hard drive. This allows the user to safely edit and carry along sensitive data for encrypted communication and anonymous Web surfing. It is based on Debian GNU/Linux.

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 73.10
Vit 4.91

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

Download Website Updated 03 Apr 2011 KeyTool IUI

Screenshot
Pop 51.71
Vit 1.00

KeyTool IUI is a user-friendly application for performing cryptography tasks. It lets the user encrypt and decrypt files and create and manage keys, certificates, and keystores. It can sign and verify ASCII, binary, XML, and JAR files.

Download Website Updated 25 Mar 2011 MuPO

Screenshot
Pop 69.40
Vit 7.53

MuPO (Multi-Purpose-Organizer) is a powerful PIM application for desktop and PDA systems. It features a hierarchical todo-list and notes, appointments, a project-time recorder, a calendar, recurring items, and more. It is fully searchable, and it includes a tool to sync several mupo-files. You can use it on an Agenda PDA, Compaq iPaq, or on a PC running Linux or Windows. Items can be encrypted.

Download Website Updated 07 Mar 2011 QPaMaT

Screenshot
Pop 46.73
Vit 6.51

QPaMaT is a password manager which stores passwords in an encrypted XML file or on an encrypted chipcard. It also checks the password quality and generates random passwords. You can print the passwords in clear-text as a backup strategy.

Download Website Updated 02 Mar 2011 pdfcrypt

Screenshot
Pop 61.29
Vit 2.19

pdfcrypt allows you to set permissions on a PDF file. For example, you can publish a document without permitting users to print it. The button to print the file will be disabled in the Acrobat Reader application. It can be used as a batch application to set permissions on a large group of PDF files, or as a filter in a Unix pipeline, or within a CGI application. Only binary executables are distributed, but the original Perl source code may be requested.

Download Website Updated 20 Feb 2011 C++ Elliptic Curve Cryptography library

Screenshot
Pop 128.92
Vit 7.61

Libecc is a C++ elliptic curve cryptography library that supports fixed-size keys for maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves, and to provide an important source of information for anyone with general interest in ECC.

Download Website Updated 14 Feb 2011 ctunnel

Screenshot
Pop 98.71
Vit 3.22

ctunnel is a program for tunneling and proxying TCP or UDP connections via a cryptographic tunnel. ctunnel can be used to secure any existing TCP or UDP based protocol, such as HTTP, Telnet, FTP, RSH, MySQL, VNC, DNS, XDMCP, NFS, etc. You can also chain or bounce connections to any number of intermediary hosts.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.