608 projects tagged "Cryptography"

No download No website Updated 07 Jan 2014 Moneychanger

Screenshot
Pop 114.07
Vit 9.23

Moneychanger is a GUI built on top of Open Transactions, a financial crypto library. Moneychanger can be used to create pseudonyms, issue currencies, open accounts, withdraw and deposit cash (untraceable digital cash), write and deposit cheques, trade on markets, and much, much more.

No download Website Updated 24 Feb 2012 Caume Data Security Engine

Screenshot
Pop 17.55
Vit 28.71

Caume Data Security Engine is a REST API platform for storing and processing files in uncontrolled environments. It provides a Free Software solution which allows the creation of reasonably secure and isolated workspaces to process and store sensitive data within uncontrolled environments. With concepts such as "the cloud" and "bring your own device", as well as an increasing demand for mobile devices, it has become clear that the way in which companies operate is changing dramatically, and, with it, the way in which we secure information and the infrastructure which supports business processes. CaumeDSE has been designed as a service platform which provides security to data by using free, well-known, and robust cryptographic software, as well as open and simple data structures and interfaces to make portability and extensibility easy.

No download Website Updated 28 Feb 2012 FroZenLight

Screenshot
Pop 35.78
Vit 1.00

FroZenLight interrelates line arts, mathematics, and cryptography. Circular shaped mirrors which are arranged in a grid-like manner reflect a light ray according to the reflection law of geometric optics. While random positions of the light source produce chaotic reflection patterns, it is possible to position the light source so that beautiful symmetric reflection patterns are created.

No download Website Updated 15 Jan 2014 SSLsplit

Screenshot
Pop 181.61
Vit 5.31

SSLsplit is a tool that performs man-in-the-middle attacks against SSL/TLS encrypted network connections for network forensics and penetration testing. It terminates SSL/TLS and initiates a new connection to the original destination, logging all data transmitted. It supports plain TCP and SSL, HTTP and HTTPS, and IPv4 and IPv6. For SSL and HTTPS, it generates and signs forged X509v3 certificates on-the-fly using the original certificate's subject DN and subjectAltName extension. It supports Server Name Indication, RSA, DSA, and ECDSA keys, and DHE and ECDHE cipher suites. It can also use existing certificates if the private key is available.

Download Website Updated 15 May 2012 Arandomd

Screenshot
Pop 16.76
Vit 1.00

Arandomd is a network daemon that provides statistically tested output from a single ARC4 stream cipher generator to anyone able to connect to its listening TCP port. As multiple consumers cause it to reseed itself from a separate, strong random source, it is expected to produce consistently unpredictable results for cryptographic purposes. A configurable number of tests from the Statistical Test Suite for Random and Pseudorandom Number Generators must be passed before output data is sent to the client. It may be be useful in low-entropy environments, such as compute clouds, for generating high quality key material for strong cryptography.

Download Website Updated 21 Jul 2012 ImmediateCrypt

Screenshot
Pop 49.11
Vit 1.48

ImmediateCrypt can easily encrypt and decrypt plain text messages with the AES-256 algorithm (CBC block chaining, PKCS5 padding).

No download No website Updated 28 Jul 2012 LibXOR

Screenshot
Pop 22.76
Vit 25.91

LibXOR is an Objective C library for encrypting NSStrings. It provides quick (and easy) encryption and decryption using a password, and is easy to use within a project by implementing a category of NSString.

No download No website Updated 26 Jul 2012 LibRCrypt

Screenshot
Pop 19.39
Vit 25.91

LibRCrypt is an Objective C library for complex data encryption based on Rubik's Cubes. The idea's pretty simple: If you represent data as the squares on a Rubik's Cube, you can apply transformations to the data and get back encrypted data, all of which is commutatitive. Just as a Rubik's Cube can be solved if you know all of the moves, this data can be "unwound", so to speak, if you know all of the transforms applied, but the encryption is even deeper than that. A cube can only cover (9 squares per face x 6 faces) 54 significant bits of data. Therefore, compressed data must be composed of multiple (even thousands) of Rubik's Cubes.

Download No website Updated 03 Nov 2012 Wisecracker

Screenshot
Pop 54.68
Vit 1.00

Wisecracker is a high performance distributed cryptanalysis framework that leverages GPUs and multiple CPUs. It allows security researchers to write their own cryptanalysis tools that can distribute brute-force cryptanalysis work across multiple systems with multiple multi-core processors and GPUs. Security researchers can also use the sample tools provided out-of-the-box. The differentiating aspect of Wisecracker is that it uses OpenCL and MPI together to distribute the work across multiple systems, each having multiple CPUs and/or GPUs.

No download No website Updated 13 Nov 2012 Multiple Eyepairs Only

Screenshot
Pop 36.82
Vit 1.00

Multiple Eyepairs Only is a project to define a file format and to provide tools to use cryptography for things like four-eyes principles. The key idea is this: if information should only be accessible to a group of people together, with the additional possibility to have some redundancy in participants, then MEO is for you.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.