Showing 46 open source projects for "des decryption cipher"

View related business solutions
  • A role-based, highly configurable module for managing merit, promotions, bonuses, and stocks. Icon
    A role-based, highly configurable module for managing merit, promotions, bonuses, and stocks.

    Your Partner in Streamlining HR and IT Operations.

    FocalReview®, SpiraLinks’ flagship tool, helps you manage your compensation planning and performance processes more efficiently.
    Learn More
  • Epicor BisTrack is a powerful business management software designed specifically for the needs of the building materials industry, including lumberyards, construction suppliers, and distributors. Icon
    Epicor BisTrack is a powerful business management software designed specifically for the needs of the building materials industry, including lumberyards, construction suppliers, and distributors.

    For construction companies looking for a business management solution for building centers

    Epicor BisTrack is a powerful business management software designed specifically for the needs of the building materials industry, including lumberyards, construction suppliers, and distributors. Known for its comprehensive suite of tools, BisTrack streamlines operations by integrating inventory management, purchasing, sales, and delivery processes into a single, user-friendly platform. Its advanced reporting and analytics capabilities enable businesses to make data-driven decisions, optimize workflows, and enhance customer service. With robust mobile functionality and seamless cloud-based deployment options, BisTrack supports real-time collaboration and efficient operations across teams, ensuring businesses stay competitive in a fast-paced industry.
    Learn More
  • 1

    enervige

    A statistical tool to break the Vigenere cipher

    Enervige is a Python-based project for encryption, decryption, and cryptanalysis of text using the Caesar and Vigenère ciphers in French and English. The project includes advanced statistical techniques to break the Vigenère cipher using methods like frequency analysis, mutual index of coincidence (ICM), and Pearson's coefficient of correlation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    NTK Ultra-Compression

    NTK Ultra-Compression

    Logiciel de compression de fichiers maximal indépendant du temps.

    Le logiciel NTK Ultra-Compression répond à une problématique essentielle de l’ère numérique : comment réduire la taille des données à leur minimum absolu sans compromis sur leur intégrité, tout en s’affranchissant des contraintes temporelles ? Dans un monde où les volumes de données explosent et où les solutions actuelles de compression restent limitées par des compromis entre rapidité, efficacité et complexité, nous proposons une approche disruptive. Les solutions actuelles, telles que le...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    AES_plus_Serpent_in_CBC_mode

    AES_plus_Serpent_in_CBC_mode

    Open-source code that enables you to use AES + Serpent in CBC mode

    The AES_plus_Serpent_in_CBC_mode_for_microcontrollers repository contains code that enables you to encrypt your data using a combination of AES and Serpent encryption algorithms in CBC mode. In addition to that, the code in this repository enables you to verify the data integrity, thanks to the HMAC-SHA256. Attention! I didn't develop the libraries utilized by these sketches. I took them from the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    AES_plus_Blowfish_in_CBC_mode

    AES_plus_Blowfish_in_CBC_mode

    Open-source code that enables you to use AES + Blowfish in CBC mode

    The AES_plus_Blowfish_in_CBC_mode repository contains two sketches that enable you to encrypt your data using a combination of AES and Blowfish encryption algorithms in CBC mode. The only difference between them, from the functional point of view, is that one verifies the integrity of the decrypted data (plaintext) while the other doesn't. Copyright/Ownership/Licenses Attention! I didn't develop the libraries utilized by these sketches. I took them from the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Boost Partnership Revenue and Engagement in minutes Icon
    Boost Partnership Revenue and Engagement in minutes

    Welcome to the next-generation PRM. Connect your CRM, launch your partner portal & start driving revenue on autopilot.

    Introw is a next-gen Partner Relationship Management (PRM) platform built to seamlessly connect, engage, and grow your partner ecosystem—all while keeping your CRM as the single source of truth.
    Learn More
  • 5

    zhcrypt

    Tiny front end to hcrypt.exe from project page Hcrypto

    Zhcrypt is simply a tiny front end to hcrypt.exe, one of the utilities found within the Hcrypto suite found on Sourceforge. Hcrypt.exe is a Windows command line utility that will encrypt and decrypt files offering a variety of common and uncommon algorithms, including AES-128, AES-192, AES-256, Blowfish, CAST-128, CAST-256, DES, TripleDES, DESX, GOST, DEA, KASUMI, MARS, MISTY1, Noekeon, RC2, RC5, RC6, SAFER-SK, SEED, Serpent, Skipjack, Square, TEA, Twofish, and XTEA
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    .... Cryptographic Functions: • Asymmetric Encryption/Decryption • Symmetric Encryption/Decryption • Digital Signature (ECDSA) • Shared Key Agreement (ECDH) • Recursive Hash Digest + Check • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) • TLS Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab. Source code: https://github.com/pedroalbanese/gmsmtk Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    GAMI

    GAMI

    The secret science

    Gami is a set of encryption and decryption algorithms based on the language of time, the increase and reduction of characters with 3 levels of security for the first version (1.0).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    S-DES Crypto App

    Encryption/Decryption demonstration app using the S-DES algorithm

    Encryption/Decryption demonstration app using the S-DES algorithm. Use the Java runtime environment 11 for execution. The GUI pops up that allows entering a 10-bit encryption/decryption key in binary (0, 1 digits) and the plaintext/ciphertext in the same form (8-bit). Executing the algorithm, decription of the encoding/decoding functionality is provided in the three main text boxes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you. Ciphey can solve most things in 3 seconds or less. Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography. If you don't know much about cryptography, or you want...
    Downloads: 3 This Week
    Last Update:
    See Project
  • Cloudbrink Personal SASE service Icon
    Cloudbrink Personal SASE service

    For companies looking for low maintenance, secure, high performance connectivity for hybrid and remote workers

    Cloudbrink’s Personal SASE is a high-performance connectivity and security service that delivers a lightning-fast, in-office experience to the modern hybrid workforce anywhere. Combining high-performance ZTNA with Automated Moving Target Defense (AMTD), and Personal SD-WAN all connections are ultra-secure.
    Learn More
  • 10
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    .... Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Novel Insight Inner Circle

    Novel Insight Inner Circle

    Graphical message and file encryption tool

    Novel Insight Inner Circle is a message and file encryption tool for Windows. The software is developed in Java and requires 64bit Java JRE. The encryption uses AES-256 twice so it is harder to crack than the industry standard pure AES 256bit implementation (theoretical key size is 512 bit). The software writes encrypted data in ASCII text format which can be cut'n'pasted to messaging apps or to emails and back to Inner Circle when decrypting data. IMPORTANT: The software requires new...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Xoils Files + Packages + Distributions

    Xoils Files + Packages + Distributions

    eXtensible Aluminum + Gold Foil Cartons for Files + Packages + Distro

    ... base, which is compressed and use AES encryption over the transit lane as well as SSL (DES Cipher) and will rebuild the folder path you have stored online with the *.xoil file you have generated which is essentially a certificate much like a CSR Certificate for generating an SSL Certificate the XOIL Syncator Certificate 1.xx is what is contained within the *.xoil file essentially being a text file and embedded certificate, there is a short key too retrieve the certificate which will privately ~
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Time Travel Project

    Time Travel Project

    A project for open source time travel with computers.

    For more information please see my web-sight: http://timetravelinstitute.biz/ http://time-travel.institute http://timetravelcomputers.blogspot.com YouTube Channel: https://www.youtube.com/user/Reactor1967 Cryptography - The art of writing or solving codes. The study of techniques for secure communication. Cipher - Code to secure communication. The cipher is used for encryption or decryption Temporal Cryptography - The study of techniques to recover information lost or hidden...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    RSAREF

    RSAREF

    RSAREF(TM): A Cryptographic Toolkit

    This is the ancient and highly depreciated RSA refrence code.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18

    Photon4K

    32768-bit symmetric-key encryption, fully-functional development CLI

    Photon4K is a 32768-bit symmetric-key encryption cipher accessed via a basic, yet fully-functional development-oriented Command Line Interface (CLI) utility. The algorithm is intended to be a high-security "symmetric" cipher designed primarily for archival purposes -- http://wikipedia.org/wiki/Symmetric-key_algorithm . Photon4K is implemented as an attempt to take long-established, proven cryptographic techniques to another "level" to contend with the rapid advances in powerful...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    jCrypto

    jCryptor is a Java-based cryptographic tool used for any file type

    jCryptor is a Java-based cryptographic tool used for any kind of file. It implements the Data Encryption Standard (DES) to encrypt and decrypt files. The Graphical user interface is based on the java-swing components. It is fast and efficcient
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    A library written in difference programming language to implement classic encryption/decryption algorithm(all kinds of substitution and permutation algorithm such as Kaiser/Affine/Vigenere/Playfair..., not include modern encryption/decryption algorithm such as DES/IDEA/RSA)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    VCipher

    VCipher

    A Social Media Encryption/Decryption Tool

    VCipher is a unique encryption and decryption tool.The code is not unique rather it is quite simple as it uses Vigenère cipher algorithm but the idea is quite unique.It is created to be used as an extra layer of protection for social networking sites,so even if someone's account is hacked it will take them so expertise to read those messages.And if used correctly it can also be made uncrackable if used correctly.This is a CLI(Command Line Interface) there is a web version too. VCipher Web...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Substitution Cipher Toolkit

    Substitution Cipher Toolkit

    Substitution cipher toolkit (en/decryption + automatical cracking)

    This substitution cipher toolkit enables you to en- and decrypt texts with substitution cipher, to gather language statistics of a specific language and to crack encrypted texts both manually and automatically. All functions can be accessed via an easy-to-use graphical user interface.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.
OSZAR »