(Page 15 of 54)   < Prev  10 11 12 13 14 15 16 17 18 19 20  Next >

Category: Cryptography

Added 2003-07-31
by Michael Buesch
PwG is a small tool which generates secure, random passwords. It's able to interoperate with PwM-Password-Manager.

Added 2003-07-31
by Samuel Hocevar
libdvdcss is a cross-platform library for transparent DVD device access with on the fly CSS decryption. It currently runs under Linux, FreeBSD, NetBSD, OpenBSD, BSD/OS, Solaris, BeOS, Win98, Win2k and MacOS X. It is used for the vlc DVD player because of its portability and because, unlike similar libraries, it does not require your DVD drive to be region-locked.

Added 2003-07-28
by Bakunin - Andrea Marchesini
_malloc is a library that is able to randomize the normal malloc function to make it more secure from possible memory reading. It allocates data in bits with random keys, without increasing size or the time required to access the data. The library includes rewritten versions of all ANSI C functions for memory use (such as memset and memccpy). There are also some functions for debugging, querying the memory status, and changing the keys.

Added 2003-07-28
by Michael Rash
gpgdir is a Perl script that uses the CPAN GnuPG module to encrypt and decrypt directories using a GPG key specified in ~/.gpgdirrc. It supports recursively descending through a directory in order to make sure it encrypts or decrypts every file in a directory and all of its subdirectories. In order to help save space all files are compressed using gzip before being encrypted and decompressed upon decryption. In addition, gpgdir is careful not to encrypt hidden files and directories.

Added 2003-07-16
by Tom St Denis
LibTomMath provides highly optimized and portable routines for a vast majority of integer-based number theoretic applications (including public key cryptography).

Added 2003-06-24
by Tom St Denis
LibTomCrypt is a comprehensive, modular, and portable cryptographic toolkit that provides developers with a vast array of well known published block ciphers, one-way hash functions, chaining modes, pseudo- random number generators, public key cryptography, and a plethora of other routines. It has been designed from the ground up to be very simple to use. It has a modular and standard API that allows new ciphers, hashes, and PRNGs to be added or removed without change to the overall end application. It features easy to use functions and a complete user manual which has many source snippet examples.

Added 2003-06-12
by SANFACE Software
pdfcrypt allows you to set permissions on a PDF file. For example, you can publish a document without permitting users to print it. The button to print the file will be disabled in the Acrobat Reader application. It can be used as a batch application to set permissions on a large group of PDF files, or as a filter in a Unix pipeline, or within a CGI application. Only binary executables are distributed, but the original Perl source code may be requested.

Added 2003-06-11
by Tim Tassonis
aesutil is a small library and command line program to encrypt or decrypt data using the Rijndael algorithm in CBC mode.

Added 2003-06-11
by The Evil Twin
twocrypt (2c) is a tool for the ultra-paranoid, providing a traditional crypto, but also an option of deniable (subpoena-proof) encryption. It encrypts one or two files at once. Each file can be recovered with its respective passphrase, but the presence of more than one file cannot be demonstrated, and the presence of this option alone should not be a credible argument for data hiding.

RSA implementation in Haskell
Added 2003-06-09
by David J. Sankel
RSA implementation in Haskell (rsa-haskell) contains the Simple and Strong Cryptography program set and Haskell libraries of several cryptographic standards. The libraries include Haskell implementations of SHA1, EME-OAEP, EMSA-PSS, MGF, RSAES-OAEP, and RSA-PSS. These standards implement signature/verification, strong cryptography, and hashing. Also included in the library is a general number theory library. The Simple and Strong Cryptography program set contains simple programs for encrypting and decrypting files as well as signature verification with public key cryptography.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus