608 projects tagged "Cryptography"

No download Website Updated 18 Nov 2012 DisPass

Screenshot
Pop 43.17
Vit 23.68

DisPass is a passphrase generator that generates unique passphrases formed from a master password and a label, helping you get rid of the bad habit of using a single password for multiple Web sites. It is a console application, but it also has a simple graphical interface.

No download Website Updated 29 Jul 2013 Kypeless

Screenshot
Pop 57.05
Vit 2.27

Kypeless is a fully decentralised chat and file sharing program. It uses AES-256 encryption for data, Diffie-Hellman for key exchange, and RSA public key cryptography for authentication. It relies on pre-shared public keys.

Download Website Updated 13 Apr 2013 jEncrypt

Screenshot
Pop 21.24
Vit 20.33

jEncrypt is a commandline file encryption archiver. Files are encrypted with the AES-CTR mode, which was recommended by the National Institute of Standards and Technology in 2001 (NIST SP 800-38A). AES-CTR mode only provides confidentiality. It requires a message authentication code such as CBC-MAC to ensure an encrypted message is not accidentally modified or maliciously tampered with, which jEncrypt currently does not provide.

Download Website Updated 29 Apr 2013 libsodium

Screenshot
Pop 35.48
Vit 19.88

libsodium is an easy-to-use crypto library. Its goal is to provide all of the core operations needed to build higher-level cryptographic tools. It is a portable, cross-compilable, installable, packageable library based on NaCl, with a compatible API.

Download No website Updated 30 Apr 2013 dienesRSA

Screenshot
Pop 22.05
Vit 19.83

dienesRSA is a class that implements methods for generating RSA keys and encrypting and decrypting data. A utility class is provided for checking integers and primes, along with some mathematical functions.

No download Website Updated 07 May 2013 CryptSharp

Screenshot
Pop 17.41
Vit 19.65

CryptSharp provides a number of password crypt algorithms: BCrypt, MD5 (and Apache's htpasswd variant), PHPass (WordPress, phpBB, Drupal), SHA256, SHA512, and Traditional and Extended DES. It also includes Blowfish, SCrypt, and PBKDF2 for any HMAC (.NET's built-in PBKDF2 implementation supports only SHA-1). If you are looking to store passwords, odds are CryptSharp will have the algorithm you want.

No download Website Updated 03 Jul 2013 Bitcoinproof

Screenshot
Pop 32.12
Vit 1.00

Bitcoinproof creates a forgery-proof timestamp for your data, secured by the Bitcoin network. It allows you to prove that a certain event happened before a certain point in time. Maybe you want to prove that the damage in your flat already existed when you moved in, or that you were in possession of a great artwork before it was published, proving you are the author.

Download Website Updated 03 Jul 2013 Shasplit

Screenshot
Pop 26.61
Vit 1.00

Shasplit takes a large data block, splits it into smaller parts, and puts those parts into an SHA-based content-addressed store. Reassembling those parts is a trivial "cat" invocation. Repeating parts (e.g., from previous split operations) are stored only once, which allows efficient incremental backups of whole LVM snapshots via Rsync. Shasplit shows its strengths on encrypted block devices, but might be useful for non-encrypted data, too.

Download No website Updated 11 Jul 2013 libbadger

Screenshot
Pop 35.11
Vit 1.00

libbadger is an alternative to existing decentralized authentication systems which require regular direct communication between client and authority. Badger allows clients to authenticate with servers easily and securely in a browserless environment because there is no necessity to tunnel the client to an authority for the purposes of its own authentication. Using Badger, clients only need to communicate with an authority once in their lifetimes.

Download No website Updated 16 Jul 2013 MIRACL

Screenshot
Pop 61.93
Vit 1.00

MIRACL (Multiprecision Integer and Rational Arithmetic Cryptographic Library) is a C software library that is widely regarded by developers as the gold standard open source SDK for elliptic curve cryptography (ECC). It is compact, fast, and efficient.

Screenshot

Project Spotlight

WiKID Two-Factor Authentication System

A self-hosted, dual-source two-factor authentication system.

Screenshot

Project Spotlight

Packet Peeper

A network protocol analyzer for Mac OS X.