Showing 47 open source projects for "cipher block chaining"

View related business solutions
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • Iris Powered By Generali - Iris puts your customer in control of their identity. Icon
    Iris Powered By Generali - Iris puts your customer in control of their identity.

    Increase customer and employee retention by offering Onwatch identity protection today.

    Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
    Learn More
  • 1
    kcptun

    kcptun

    A stable and secure tunnel based on KCP with N:M multiplexing and FEC

    kcptun is a stable and secure tunnel based on KCP with N:M multiplexing and FEC. Available for ARM, MIPS, 386 and AMD64. kcptun is shipped with builtin packet encryption powered by various block encryption algorithms and works in Cipher Feedback Mode, for each packet to be sent, the encryption process will start from encrypting a nonce from the system entropy, so encryption to same plaintexts never leads to a same ciphertexts thereafter. kcptun made use of ReedSolomon-Codes to recover lost packets, which requires massive amount of computation, a low-end ARM device cannot satisfy kcptun well. ...
    Downloads: 44 This Week
    Last Update:
    See Project
  • 2
    Web-Check

    Web-Check

    All-in-one OSINT tool for analysing any website

    Comprehensive, on-demand open source intelligence for any website. Get an insight into the inner-workings of a given website: uncover potential attack vectors, analyse server architecture, view security configurations, and learn what technologies a site is using. Currently the dashboard will show: IP info, SSL chain, DNS records, cookies, headers, domain info, search crawl rules, page map, server location, redirect ledger, open ports, traceroute, DNS security extensions, site performance,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    HDcube

    HDcube

    This is an ESRGAN model trained specifically for upscaling GameCube

    This is an ESRGAN model trained specifically for upscaling GameCube and Wii textures, but it can of course be used for other textures from that period, like PlayStation 2, Xbox or PC games from that time. It can be used for all image formats supported by Gamecube and Wii hardware and can remove its typical artifacts like CMPR Block Compression (DXT1 algorithm, also known as BC1), color palette errors, color reduction up to 8bit color depth and 1bit alpha depth. I recommend chaiNNer, which offers a graphical user interface and is based on a node system that can be used to solve very simple as well as very complex tasks effectively by "chaining" nodes together. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 4
    Multron File Guardian

    Multron File Guardian

    A File Encrypter/Decrypter With Many/Hybrid Encryption Algorithms

    Multron File Guardian provides you a strong file encryption. Supported algorithms AES Serpent Twofish ThreeFish Camellia ChaCha20 SM4 HC RSA Hybrided With Symmetric Algorithms License = AAL You can set RSA Key Length (from 2048 to 16384) You can set Password-Iteration Rate. You can also set Symmetric Algorithm Key Size If you're about to share a file securely, then you may want to use one of Hybrid algorithms. You can compress your files before...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Network Management Software and Tools for Businesses and Organizations | Auvik Networks

    Mapping, inventory, config backup, and more.

    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
    Learn More
  • 5
    AES_in_CBC_mode_for_MCUs

    AES_in_CBC_mode_for_MCUs

    Open-source code that enables you to use AES in CBC mode

    AES_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the AES encryption algorithm in CBC mode to your project. Based on the work of https://github.com/zhouyangchao/AES GitHub Page: https://github.com/Northstrix/AES_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Midbar Desktop App

    Midbar Desktop App

    Standalone desktop app from the Midbar project

    This repository contains the standalone desktop application from the Midbar project. The app operates entirely offline and does not require an internet connection. GitHub repository: https://github.com/Northstrix/Midbar-Desktop-App
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    Serpent_in_CBC_mode_for_MCUs

    Serpent_in_CBC_mode_for_MCUs

    Open-source code that enables you to use Serpent in CBC mode

    Serpent_in_CBC_mode_for_microcontrollers is an open-source code that enables you to easily integrate the Serpent encryption algorithm in CBC mode to your project. Based on the work of https://github.com/peterferrie/serpent GitHub Page: https://github.com/Northstrix/Serpent_in_CBC_mode_for_microcontrollers
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    AES_plus_Serpent_in_CBC_mode

    AES_plus_Serpent_in_CBC_mode

    Open-source code that enables you to use AES + Serpent in CBC mode

    The AES_plus_Serpent_in_CBC_mode_for_microcontrollers repository contains code that enables you to encrypt your data using a combination of AES and Serpent encryption algorithms in CBC mode. In addition to that, the code in this repository enables you to verify the data integrity, thanks to the HMAC-SHA256. Attention! I didn't develop the libraries utilized by these sketches. I took them from the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    AES_plus_Blowfish_in_CBC_mode

    AES_plus_Blowfish_in_CBC_mode

    Open-source code that enables you to use AES + Blowfish in CBC mode

    The AES_plus_Blowfish_in_CBC_mode repository contains two sketches that enable you to encrypt your data using a combination of AES and Blowfish encryption algorithms in CBC mode. The only difference between them, from the functional point of view, is that one verifies the integrity of the decrypted data (plaintext) while the other doesn't. Copyright/Ownership/Licenses Attention! I didn't develop the libraries utilized by these sketches. I took them from the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The AI-powered unified PSA-RMM platform for modern MSPs. Icon
    The AI-powered unified PSA-RMM platform for modern MSPs.

    Trusted PSA-RMM partner of MSPs worldwide

    SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
    Learn More
  • 10
    LibreSSL for Windows

    LibreSSL for Windows

    LibreSSL is a fork of OpenSSL that improves code quality and security

    ...GB/T 32907-2016 - SM4 128-bit Block Cipher. OpenBSD license. https://www.libressl.org/
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    AnubisCrypt

    AnubisCrypt

    Anubis Involutional 128-bit SPN Block cipher Encryption Tool

    Barreto & Rijmen 128-bit block cipher with GCM Mode (RFC 5288) provides both authenticated encryption (confidentiality and authentication) and the ability to check the integrity and authentication of additional authenticated data (AAD) that is sent in the clear. Whirlpool-based PBKDF2. Anubis is a block cipher with SP-network structure designed by Vincent Rijmen and Paulo S.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 12
    OpenSSL for Windows

    OpenSSL for Windows

    OpenSSL Portable for Windows 32-bit and Android

    OpenSSL is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library. GOST Engine: GOST 28147-89 - 64-bit block cipher with 256-bit key. GOST R 34.11-94 - Message digest algorithm. 256-bit hash value. GOST R 34.10-2001 - Digital signature algorithm. GOST R 34.10-2012 - Digital signature algorithm. GOST R 34.11-2012 - "Streebog" hash function 256 and 512-bit. GOST R 34.12-2015 - "Magma" block cipher (new). GOST R 34.12-2015 - "Kuznyechik" (Grasshopper) 128-bit block cipher. ...
    Leader badge
    Downloads: 419 This Week
    Last Update:
    See Project
  • 13
    GOST Toolkit ☭

    GOST Toolkit ☭

    Cross-platform GOST Security Suite written in Pure Go

    Multi purpose cross-platform cryptography tool for symmetric encryption, hash digest, cipher-based message authentication code (CMAC) hash-based message authentication code (HMAC), digital signature, shared key agreement (VKO) and PBKDF2 function. GOST is GOvernment STandard of Russian Federation: GOST 28147-89 64-bit block cipher (RFC 5830) GOST R 34.11-94 hash function 256-bit (RFC 5831) GOST R 50739-95 data sanitization method (non-cryptographic) GOST R 34.10-2001 public key signature function (RFC 5832) GOST R 34.10-2012 public key signature function (RFC 7091) GOST R 34.11-2012 Стрибог (Streebog) hash function 256/512-bit (RFC 6986) GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (RFC 7801) GOST R 34.12-2015 64-bit block cipher Магма (Magma) Source code: https://github.com/pedroalbanese/gosttk Visit: http://albanese.atwebpages.com
    Downloads: 7 This Week
    Last Update:
    See Project
  • 14

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    GOSTCrypt ☭

    GOSTCrypt ☭

    GOST R 34.10-2015 Kuznechik Block Cipher Encryption Tool

    GOST R 34.12-2015 Kuznechik block cipher (RFC 7801) with Multilinear Galois Mode (RFC 9058). This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/gostcrypt Visit: http://albanese.atwebpages.com
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    ...The Korea Internet & Security Agency (KISA) is distributing source codes that you can easily use. South Korean National Standard Algorithms: • LSH Message digest algorithm. 256/512-bit hash value. • ARIA 128-bit Block cipher with 128/192/256-bit keys. • LEA 128-bit Block cipher with 128/192/256-bit keys. • SEED 128-bit Block cipher with 128/256-bit keys. • HIGHT 64-bit Block cipher with 128bit key. Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Async

    Async

    Syntactic sugar in Swift for asynchronous dispatches

    Async is a syntactic sugar in Swift for asynchronous dispatches in Grand Central Dispatch. Now more than syntactic sugar for asynchronous dispatches in Grand Central Dispatch (GCD) in Swift. Custom queues, dispatch block after delay, cancel blocks that aren't already dispatched. The way it work is by using the new notification API for GCD introduced in OS X 10.10 and iOS 8. Each chaining block is called when the previous queue has finished. The dispatch_block_t can't be extended. Workaround used, Wrap dispatch_block_t in a struct that takes the block as a property. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    IP-Chat

    IP-Chat

    UDP based desktop chatting app which supports AES-256 bit encryption.

    Simple Encrypted chat application built with Java. It uses AES-256 bit block cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Space International SHIKA Crypto-suite

    Space International SHIKA Crypto-suite

    High-grade military diplomatics-grade cryptography suite

    Advanced high-grade military diplomatics-grade cryptography suite. Includes a block cipher, a message digest and a secure random material generator source, all at least 512-bits strong. Key and state lengths are 512 bits. The diplomatic and military standard cipher approved for even TOP SECRET storage, processing and transmission by Space International senates, militaries and government agencies. The cryptography components in the suite for the Q (D, Z) family of cryptographic components are fully magnetic-proof. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Format-Preserving Encryption

    Format-Preserving Encryption Library for Java

    This package implements the FF1, FF3, and FFX algorithms and the A2 and A10 parameter sets for format-preserving encryption. The FF1 and FF3 methods for format-preserving encryption are implementations of NIST Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. The FFX algorithm and A2 and A10 parameter sets are implementations of "The FFX Mode of Operation for Format-Preserving Encryption," by Mihir Bellare, Phillip Rogaway, and Terence Spies. For more information see the README.txt and package-info.java files in the source.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer

    Mail Alert Simple Mailer is a simple command-line utility designed for IT administrators for sending e-mail from Microsoft Windows OS. It can be executed from command line, Windows batch file or PowerShell scripts. My main reason for writing this software was to handle events generated by Dell OpenManage Server Administrator (OMSA), APC PowerChute and Windows Events to send hardware status and alerts like temperature alerts, UPS battery status, powerline status and RAID controller alerts...
    Leader badge
    Downloads: 9 This Week
    Last Update:
    See Project
  • 24
    RSAREF

    RSAREF

    RSAREF(TM): A Cryptographic Toolkit

    This is the ancient and highly depreciated RSA refrence code.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25

    SALMON cipher

    Cryptographic PRNG

    Cryptographically-secure Random Number Generator.It is seeded with a 480-bit key and a 480-bit nonce. The target technology is a stream cipher. Each call to ::Invoke() returns a 32bit word. ( insert notes here about SALMON's operating speed ) SALMON uses a block cipher called SERPENT at the very end portion of its output. SERPENT was a finalist from the NIST selection tournaments. There is also mild use of a portion of Salsa20/12 called a "quarter round function". ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB