(Page 6 of 8)   < Prev  1 2 3 4 5 6 7 8  Next >

Category: Cryptography » Libraries

PAM S/Key module
Added 2001-10-31
by Dinko Korunic
PAM S/Key is a module based on the original S/Key suite from Wietse Venema's logdaemon. It is written to work with Solaris 2.6 - 2.8, and Linux, although should work with any skey library that is fully interface-compatibile with logdaemon's.

The Hash Algorithm Toolkit
Added 2001-10-26
by Aaben Kryptografi Ltd
The Secure Hash Algorithm Directory provides information, recources and products for MD5 and SHA-1, optionally including HMAC.

Added 2001-10-22
by Apple Computer, Inc
The Apple CDSA framework contains an expandable set of cryptographic algorithms to perform code signing and encryption operations while maintaining the security of the cryptographic keys. It also contains libraries which allow the interpretation of X.509 certificates. The CDSA code is used by MacOSX features such as Keychain and URL Access for protection of login data. Many cryptographic algorithms are available in the Apple CSP (Cryptographic Service Provider) module.

Added 2001-10-22
by Andy Phillips
libsmbpw is a small library that provides a getpwent/putpwent/endpwent set of routines to read and write entries in the samba encrypted password file (smbpasswd). It is based on samba code from samba 2.0.5a, but does not need samba to compile.

Interscope BlackBox
Added 2001-10-22
by Interscope
A modular, extensible and easy-to-use security suite, smoothly integrated into the Windows 95/98/NT4/2000 shell that provides users with the ability to encrypt, decrypt and safely delete (destroy) files. Uses 56-bit DES by default but other algorithms (e.g. Blowfish, RC4) are available from the BlackBox site. It can also create self-extracting encrypted archives that you can easily distribute or send over unsafe networks, such as the Internet. It was designed to fulfill the needs of everyday security while being as fast and easy to use as possible.

Personal Security Manager (PSM)
Added 2001-10-22
by The Mozilla Organization
Personal Security Manager (PSM) consists of a set of libraries plus a daemon that performs cryptographic operations on behalf of a client application. These operations include setting up an SSL connection, object signing and signature verification, certificate management (including issuance and revocation), and other common PKI functions.

Added 2001-10-22
by Mixter, mixter@newyorkoffice.com
LibMix v1.08 is a library that provides an API for various useful functions, including an AES encryption interface, various network front-ends and low level datagram functions, as well as functions for string manipulations and other miscellaneous utility functions. It also includes functions to transmit encrypted data via stateless spoofed datagrams (tfntransmit/tfnread). Changes: It now compiles as a shared object file (.so) by default, which makes it easier to link it with programs, and the whole library sources were cleaned up and rewritten in ANSI C++.

International Kernel Patch
Added 2001-10-22
by Alexander Kjeldaas, astor@fast.no
Due to various regulations on export and use of crypto, the Linux source distribution cannot contain crypto. The International Kernel Patch tries to remedy this situation by providing the missing functionality in the form of a unified patch to the Linux kernel source. The patch includes a number of crypto patches including a crypto API including Blowfish, CAST-128, DES, DFC, IDEA, MARS, RC6, Rijndael, Safer, Serpent, and Twofish, an encrypted filesystem loopback device using the crypto API, CIPE VPN and EnSKIP patches.

Added 2001-10-22
by Ng Pheng Siong, ngps@post1.com
M2Crypto is built from Python, OpenSSL, and SWIG. It makes accessible to the Python programmer DH, DSA, RSA, symmetric ciphers, message digests, HMACs, and SSL and S/MIME functionality.

Added 2001-10-22
by Nikos Mavroyanopoulos, nmav@hellug.gr
Libmcrypt is a library which provides a uniform interface to several symmetric encryption algorithms. It is intended to have a simple interface to access encryption algorithms in ofb, cbc, cfb, and ecb modes. The algorithms it supports are DES, 3DES, RIJNDAEL, Twofish, IDEA, GOST, CAST-256, ARCFOUR, SERPENT, SAFER+, and more. The algorithms and modes are also modular so you can add and remove them on the fly without recompiling the library.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus