RSS 19 projects tagged "Security"

No download Website Updated 18 Dec 2004 MpNT

Screenshot
Pop 18.81
Vit 58.38

MpNT is a multi-precision number theory library that provides a base for building cryptographic applications. It may also be used in any other domain where efficient large number computations are required. The library supports integer, modular, and floating point arithmetic with practically unlimited precision. It is both speed efficient and highly portable without disregarding code structure and clarity.

No download Website Updated 18 Oct 2006 Raiden

Screenshot
Pop 11.58
Vit 52.34

Raiden is an extremely lightweight and fast block cipher, developed using genetic programming. Its aims are to be simple enough to be remembered by heart and to be compact, highly portable, and light enough to be implemented in resource constrained environments. It was developed with the intention of being an alternative to TEA, with the same speed and without any of its known weaknesses.

Download Website Updated 16 Jan 2009 Mobius Program Verification Environment

Screenshot
Pop 26.91
Vit 43.80

The Mobius verification environment supports the development of specifications, programs, and proofs of their security properties. It will support both source code and bytecode level verification, and be able to produce the output necessary for the generation of PCC certificates.

Download Website Updated 03 Mar 2013 Botan

Screenshot
Pop 442.74
Vit 42.61

Botan is a crypto library written in C++. It provides a variety of cryptographic algorithms, including common ones such as AES, MD5, SHA, HMAC, RSA, Diffie-Hellman, DSA, and ECDSA, as well as many others that are more obscure or specialized. It also offers SSL/TLS (client and server), X.509v3 certificates and CRLs, and PKCS #10 certificate requests. A message processing system that uses a filter/pipeline metaphor allows for many common cryptographic tasks to be completed with just a few lines of code. Assembly and SIMD optimizations for common CPUs offers speedups for critical algorithms like AES and SHA-1.

Download Website Updated 20 Feb 2011 C++ Elliptic Curve Cryptography library

Screenshot
Pop 125.26
Vit 7.71

Libecc is a C++ elliptic curve cryptography library that supports fixed-size keys for maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves, and to provide an important source of information for anyone with general interest in ECC.

Download Website Updated 30 Sep 2009 Bit::Vector

Screenshot
Pop 180.12
Vit 7.25

Bit::Vector is a (stand-alone) C library and an object-oriented Perl module (with overloaded operators) which allows you to handle bit vectors, sets (of integers), "big integer arithmetic" (e.g. for cryptography), and boolean matrices (all of arbitrary size) very efficiently.

Download No website Updated 04 Jun 2008 alph

Screenshot
Pop 85.72
Vit 6.14

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Download Website Updated 11 Apr 2011 ACL2

Screenshot
Pop 74.51
Vit 4.97

ACL2 is a mathematical logic, programming language, and mechanical theorem prover based on the applicative subset of Common Lisp. It is an "industrial-strength" version of the NQTHM or Boyer/Moore theorem prover, and has been used for the formal verification of commercial microprocessors, the Java Virtual Machine, interesting algorithms, and so forth.

Download Website Updated 14 Dec 2009 Virtual Ideal Functionality Framework

Screenshot
Pop 40.21
Vit 3.87

Virtual Ideal Functionality Framework is a framework for creating efficient and secure multi-party computations (SMPC). Players, who do not trust each other, participate in a joint computation based on their private inputs. The computation is done using a cryptographic protocol which allows them to obtain a correct answer without revealing their inputs. Operations supported include addition, multiplication, and comparison, all with Shamir secret shared outputs.

Download Website Updated 21 Aug 2001 crank

Screenshot
Pop 127.42
Vit 2.89

Crank is a project to provide a GUI toolkit to facilitate (and where possible, automate) the breaking of classical (pen-and-paper) cryptosystems. Initial focus is on the cryptanalysis of monoalphabetic substitution ciphers.

Screenshot

Project Spotlight

LIMA-CALLAO

An enterprise accounting software.

Screenshot

Project Spotlight

Why Can't I Connect?

A tool that makes it easier to resolve TCP/IP connection errors.