(Page 11 of 12)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >

Category: Cryptography » Traffic Encryption

SecPanel
Added 2001-10-22
by Steffen Leich, leich@wiwi.uni-marburg.de
SecPanel, implemented in TCL/Tk, serves as a GUI for managing and running SecureShell (SSH) connections. Nearly all connection-parameters are adjusted by one mouseclick (compression, port-forwarding, etc.). At the moment it works together with ssh 1.2.x.

OpenSSH Challenge/Response patch
Added 2001-10-22
by Igmar Palsenberg, cryptocard@jdimedia.nl
The OpenSSH Challenge/Response patch integrates Challenge/Response authentication in OpenSSH. This makes it possible to use hardware tokens with for example FreeBSD. Configuration is done with additional configuration directives. Please note that this patch does not use PAM, it's a native implementation.

cryptcat for Linux
Added 2001-10-22
by jojo, jojo@farm9.com
Cryptcat is the standard netcat enhanced with twofish encryption. Ports for WIndows NT and Linux exist at http://www.farm9.com Twofish is courtesy of counterpane, and cryptix. We started with the Java version of twofish from cryptix, converted it to C++ (don't ask why), and enhanced it by adding CBC mode and the ciphertext stealing technique from Applied Cryptography (pg. 196).

cryptcat for Windows
Added 2001-10-22
by jojo, jojo@farm9.com
Cryptcat is the standard netcat enhanced with twofish encryption. Ports for WIndows NT and Linux exist at http://www.farm9.com Twofish is courtesy of counterpane, and cryptix. We started with the Java version of twofish from cryptix, converted it to C++ (don't ask why), and enhanced it by adding CBC mode and the ciphertext stealing technique from Applied Cryptography (pg. 196).

KSSH
Added 2001-10-22
by Andrea Rizzi and Kevin Lo
KSSH is a simple KDE front-end for Secure Shell (ssh). It calls a terminal where it will execute an ssh call based on user-specified parameters (host, username, port, etc.).

SCAIN
Added 2001-10-22
by Patrizio Bruno
SCAIN is a simple cryptographic algorithm that generates different output with the same input and the same password. It uses pass phrases and keys of 128 bits; the idea is to hide the key in the cipher based on the password.

aTrans
Added 2001-10-22
by DataRescue Inc
Easy to move, easy to use, P2P secure file transfer and chat on the windows 32 platform. AES encryption / RSA authentication / Diffie-Hellman EKE, on the fly compression, secure migration in a 400 kb self extracting encrypted package.

pwdump3e
Added 2001-10-22
by e-business technology, Inc.
PwDump3e provides enhanced protection of the password hash information by encrypting the data before it is passed across the network. It uses Diffie-Hellman key agreement to generate a shared key that is not passed across the network, and employs the Windows Crypto API to protect the hashes. The Crypto API, which is available on Windows 2000 or on NT Service Pack 3 and up, must be present on the the machine where PwDump3e is running, and on the remote machine. The enhanced protection of the hash information effectively prevents network snoopers from obtaining this data. This version should be preferred whenever it is possible to use it.

Photuris
Added 2001-10-22
by Niels Provos, provos@physnet.uni-hamburg.de
In order to transmit encrypted or authenticated data between two hosts, those two hosts have to agree on session keys which are used as input for the encryption and authentication functions. The Photuris protocol exchanges keys in such a way that no eavesdropper will have knowledge of the session keys. It also allows for frequent changes of the session keys, forward secrecy and party privacy protection.

SRS (Secure Remote Streaming)
Added 2001-10-22
by Matt Conover and Mark Zielinski
SRS is a program that streams a copy of a client's logs as specified by the syslog.conf file to a trusted server on a remote site. It provides strong authentication and secure communications between the client and the server through an SSL tunnel. It is intended as a replacement for syslogd. This and syslogd may NOT be running at the same time. Features include: - Secure logging. All communications are automatically and transparently encrypted. SSL (Secure Socket Layer) v3.0 is used for the authentication and encryption. A conventional cipher (3DES, RC4, etc.) for encrypting the session. Encryption is started before SRS authentication, and no data is streamed or transmitted in the clear - No special configuration of syslogd is needed - Never trusts the network. Minimal trust on the remote side of the connection. Minimal trust on domain name servers. Pure SSL authentication never trusts anything but the private key. - The client SSL authenticates the server machine in the beginning of every connection to prevent trojan horses (by routing or DNS spoofing) and man-in-the-middle attacks, and the server SSL authenticates the client machine before accepting any commands or requests from the client. On top of this, SRS will send its own challenge cookie - Client and server keys are generated by RepSec, Inc. Each client and server is provided a unique key

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus