< Prev 2 3 4 5 6 7 8 9 10 11 12 Next >
Category: Cryptography » Data Encryption
ccrypt is a commandline utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.
The GNU Privacy Guard
GnuPG (the GNU Privacy Guard) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
Amrita VPN is an easy-to-use open source VPN solution that runs on the GNU/Linux platform. The implementation is fully in userspace and requires no kernel patches or enhancements. It uses SSL for strong encryption and authentication.
Lazy Encryption Algorithm
LEA is a simple algorithm for file encryption that uses boolean algebra and modular arithmetic to test the stream and generate numbers with a logical order. Using bytes as increments and decrements users can choose between normal encryption without a pseudo- random data generator or steganography with or without random data.
OpenVPN is a robust and highly configurable VPN (Virtual Private Network) daemon which can be used to securely link two or more private networks using an encrypted tunnel over the Internet. OpenVPN's principal strengths include wide cross-platform portability, excellent stability, support for dynamic IP addresses and NAT, adaptive link compression, single TCP/UDP port usage, a modular design that offloads most crypto tasks to the OpenSSL library, and relatively easy installation that in most cases doesn't require a special kernel module.
gpgdir is a Perl script that uses the CPAN GnuPG module to encrypt and decrypt directories using a GPG key specified in ~/.gpgdirrc. It supports recursively descending through a directory in order to make sure it encrypts or decrypts every file in a directory and all of its subdirectories. In order to help save space all files are compressed using gzip before being encrypted and decompressed upon decryption. In addition, gpgdir is careful not to encrypt hidden files and directories.
pdfcrypt allows you to set permissions on a PDF file. For example, you can publish a document without permitting users to print it. The button to print the file will be disabled in the Acrobat Reader application. It can be used as a batch application to set permissions on a large group of PDF files, or as a filter in a Unix pipeline, or within a CGI application. Only binary executables are distributed, but the original Perl source code may be requested.
twocrypt (2c) is a tool for the ultra-paranoid, providing a traditional crypto, but also an option of deniable (subpoena-proof) encryption. It encrypts one or two files at once. Each file can be recovered with its respective passphrase, but the presence of more than one file cannot be demonstrated, and the presence of this option alone should not be a credible argument for data hiding.
RSA implementation in Haskell
RSA implementation in Haskell (rsa-haskell) contains the Simple and Strong Cryptography program set and Haskell libraries of several cryptographic standards. The libraries include Haskell implementations of SHA1, EME-OAEP, EMSA-PSS, MGF, RSAES-OAEP, and RSA-PSS. These standards implement signature/verification, strong cryptography, and hashing. Also included in the library is a general number theory library. The Simple and Strong Cryptography program set contains simple programs for encrypting and decrypting files as well as signature verification with public key cryptography.
Easy Integrity Check System
Easy Integrity Check System is a tool for system administrators that performs filesystem integrity checks. It is easy to set up and use, and makes use of the mcrypt and mhash libraries for encrypting its database.
Browse by category