608 projects tagged "Cryptography"

Download Website Updated 28 Sep 2001 ssldump

Screenshot
Pop 67.37
Vit 1.46

ssldump is an SSLv3/TLS network protocol analyzer. It identifies TCP connections on the chosen network interface and attempts to interpret them as SSLv3/TLS traffic. When it identifies SSLv3/TLS traffic, it decodes the records and displays them in a textual form to the console. If provided with the appropriate keying material, it will also decrypt the connections and display the application data traffic.

Download Website Updated 09 Sep 2001 pyOpenSSL

Screenshot
Pop 41.13
Vit 68.15

pyOpenSSL is a Python wrapper for a subset of OpenSSL's functionality, featuring an advanced error management system, connection objects that wrap socket methods, and flexible context objects. Also included is a rudimentary crypto module that can be used to create and verify certificates (X509 objects).

Download Website Updated 07 Sep 2001 Freenet Key Manager

Screenshot
Pop 18.73
Vit 1.00

Keyman is a key manager for storing Freenet SVK keys; it keeps all SVK private keys in a encrypted form. This could even work with any type of public/private key encryption (although it focuses on Freenet) and can hopefuly be extended so it can use any future Freenet public/private key types.

Download Website Updated 30 Aug 2001 Smart Sign

Screenshot
Pop 47.83
Vit 1.81

SmartSign is a set of modules which allow integration of smartcard technology into an OpenCA based Public Key Infrastructure in order to provide smartcard-based digital signature and local authentication security services. It allows direct signing of e-mail and e-news from within Netscape using smartcards and supports signing of generic files from command line. The package includes a PAM module too, which allows system administrators to integrate smartcard-based authentication for local users. A modified version of the OpenSSH client allows secure authentication to a remote server. A couple of command line tools allow signing and verifying generic files from the shell. Finally, a command line interactive shell supports all operations on the card, and can be used to write scripts that automate particular tasks on the card. Currently only Schlumberger Cyberflex Access 16K is supported.

No download Website Updated 21 Aug 2001 Pseudo Random Number Generator Daemon

Screenshot
Pop 38.14
Vit 1.82

The Pseudo Random Number Generator Daemon (PRNGD) offers an EGD compatible interface for obtaining random data. It is intented to be used as an entropy source to feed other software, especially software based on OpenSSL. Like EGD, it calls system programs to collect entropy. Unlike EGD, it does not generate a pool of random bits that can be called from other software. Instead, it feeds the bits gathered into the OpenSSL PRNG, from which the "random bits" are obtained when requested. This way, PRNGD is never drained and can never block (unlike EGD), so it is also suitable to seed inetd-started programs. It also features a seed-save file, so that it is immediately usable after system start.

Download Website Updated 21 Aug 2001 crank

Screenshot
Pop 125.79
Vit 2.89

Crank is a project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.

Download No website Updated 20 Aug 2001 OpenCA PKCS#7 Tool

Screenshot
Pop 54.09
Vit 1.47

The OpenCA PKCS#7 Tool (also known as SV or Sign & Verify) allows for signature verification, chain certification, signature generation (either detached or non-detached), and signature modification from the detached form to the non-detached one.

Download Website Updated 19 Aug 2001 shash

Screenshot
Pop 37.15
Vit 1.51

shash is a program which produces message digests for files, and checks whether the digest remains the same (i.e., whether the files changed). Since anyone can generate the message digest, it may not be suitable for some security-related applications. Because of this, shash also supports HMAC (rfc2104), which is a mechanism for message authentication using cryptographic hash functions. shash can use a key with a hash algorithm to produce hashes that can only be verified with the same key. This way, you can securely check whether files in a filesystem were altered.

Download Website Updated 18 Aug 2001 AirSnort

Screenshot
Pop 147.87
Vit 1.00

AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.

Download Website Updated 28 Jul 2001 anonvelope

Screenshot
Pop 55.73
Vit 1.47

anonvelope is a mail-message processing program that is designed to allow the message to make full use of Type-I (cpunk-style) remailers. It is especially designed to work with Pine, but it is possible it may be used with other MUAs.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.