(Page 5 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Cryptography » Libraries

OpenSC
Added 2002-03-21
by Juha Yrjölä
OpenSC consists of a SmartCard library that uses PC/SC Lite as its backend, and applications that use the library. It's been tested so far on only Finnish Electronic Identity (FINEID) cards, but might work on other PKCS#15 compatible SmartCards. Also implemented are a Netscape PKCS#11 module for WWW authentication, a PAM module, and OpenSSH support.

BreakDown
Added 2002-03-04
by Brett Kuskie
BreakDown is a Linux password cracker that uses dictionary attacks and customizable brute force attacks. It can also be used as a sequential character generator.

OpenSSL for Ruby
Added 2002-02-06
by Michal Rokos
The OpenSSL for Ruby project (OSSL) binds the well known OpenSSL library to the fully objective scripting language Ruby.

AES for Ruby
Added 2002-01-25
by Eric Lee Green
The AES for Ruby module provides compact and fast AES encryption for Ruby programs, without the overhead of linking to large third-party encryption libraries.

Perl SecurePages
Added 2002-01-18
by Jonathan Furrer
Perl SecurePages is a session-based authentication script for Perl CGI. It was written to authenticate users on a session basis as a means of securing CGI applications written in Perl.

S/MIME Library for Java
Added 2002-01-14
by Josh Eckels
The ISNetworks S/MIME library adds to JavaMail a complete set of S/MIME Cryptographic functions including digital signing, signature verification, encryption, and decryption. Non-profit organizations can acquire a free license to the product by contacting ISNetworks.

Twofish for Python
Added 2001-12-13
by Eric Lee Green
Twofish-py is a Python module and associated support files that add Twofish encryption/decryption support to Python.

Crypto++
Added 2001-11-21
by Wei Dai
Crypto++ is a free C++ class library of cryptographic schemes. Currently the library consists of the following, some of which is other people's code, repackaged into classes. a class hierarchy with an API defined by abstract base classes AES candidates: RC6, MARS, Rijndael, Twofish, Serpent other symmetric block ciphers: IDEA, DES, Triple DES (DES-EDE2 and DES-EDE3), DESX (DES-XEX3), RC2, RC5, Blowfish, Diamond2, TEA, SAFER, 3-WAY, GOST, SHARK, CAST-128, Square generic cipher modes: CBC padded, CBC ciphertext stealing (CTS), CFB, OFB, counter mode stream ciphers: ARC4, SEAL, WAKE, Sapphire, BlumBlumShub public key cryptography: RSA, DSA, ElGamal, Nyberg-Rueppel (NR), BlumGoldwasser, Rabin, Rabin-Williams (RW), LUC, LUCELG, Elliptic Curve Cryptosystems padding schemes for public-key systems: PKCS#1 v2.0, OAEP, PSSR, IEEE P1363 EMSA2 key agreement schemes: Diffie-Hellman (DH), Unified Diffie-Hellman (DH2), Menezes-Qu-Vanstone (MQV), LUCDIF one-way hash functions: SHA-1, MD2, MD5, HAVAL, RIPEMD-160, Tiger message authentication codes: MD5-MAC, HMAC, XOR-MAC, CBC-MAC, DMAC cipher constructions based on hash functions: Luby-Rackoff, MDC pseudo random number generators (PRNG): ANSI X9.17 appendix C, PGP's RandPool Shamir's secret sharing and Rabin's information dispersal schemes DEFLATE (gzip compatible) compression/decompression fast multi-precision integer (bignum) operations prime number generation and verification various miscellaneous modules such as base 64 coding and 32-bit CRC A high level interface for most of the above, using a filter/pipeline metaphor benchmarks and validation testing

SHA-256/384/512 implementation
Added 2001-11-13
by Aaron D. Gifford
This library is a C implementation of www.nist.gov's recently described SHA-256, SHA-384, and SHA-512 secure hash algorithms for architectures that natively support 64-bit integer types.

logi.crypto Java Package
Added 2001-11-09
by Logi Ragnarsson, logir@hi.is
logi.crypto is a pure Java package for strong encryption. It includes ciphers (RSA, ElGamal, DES, triple-DES, Blowfish), encryption modes (ECB, CBC, CFB, OFB), Key exchange (Diffie-Hellman, RSA, ElGamal, etc.), hash functions (MD5, SHA1), and signatures (RSA, ElGamal). Key-exchange and encryption in any mode can be applied to any InputStream and OutputStream objects.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus