Freeware Downloads for "Cryptographic Hash Utilities"

Utilities for measuring characteristics of cryptographic hash functions: avalanche property, (partial) collision search, Maurer's universal statistical test, Filiol's Mobius ANF statistical analisys. EdonC, EdonR, MD5 and SHA-1 hash-plugins included..

SB-MD5 Checksum Calculator is a tool to calculate and compare the MD5 checksum of files. The MD5 checksum is used worldwide for checking the integrity of files. The MD5 checksum has been around for over 10 years. It was designed by professor Ronald L Rivest in 1991. The MD5 algorithm has been used by many security applications and integrity control applications since it was published as an internet standard (RFC-1321) in 1992. SB-MD5 Checksum Calculator is a tool to calculate and compare the MD5 checksum of files.

  • Platform: Windows
  • Publisher: CzechMex LLC
  • Date: 20-02-2013
  • Size: 1651 KB

Cryptographic Hash Function Library written in Haskell using Abstract Data Types and Monads (using GHC library)
Haskell Cryptographic Hash Function Lib License - Academic Free License (AFL).

WinHasher is a free, Open Source cryptographic hash or digest generator written in C# using Microsoft's .NET 2.0 Framework. It can be used to verify file download integrity, compare two or more files for modifications, and to some degree generate strong, unique passwords. Cryptographic hashing is readily available on many computer operating systems. It often comes built-in to the OS or as a (relatively) standard optional package. Mac OS, Linux, Free/OpenBSD, and many other OSes include OpenSSL as either a pre-installed or easily installable optional component.

  • Platform: WinOther
  • Publisher: Jeff Darlington
  • Date: 15-09-2012
  • Size: 389 KB

Cryptnos will provide users with an application that will help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique &site token& such as a website domain name with a master password and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, seemingly random yet completely repeatable. Unlike similar products, however, it is exceedingly flexible. It is not a browser plugin, so it can be used with other applications outside the Web.

VSCryptoHash 64-bit is cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) will be immediately displayed. It is Great tool for network administrators and webmasters to calculate file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2..

  • Platform: WinOther
  • Publisher: Lokibit.com
  • Date: 25-05-2012
  • Size: 2048 KB

VSCryptoHash is cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) will be immediately displayed. It is Great tool for network administrators and webmasters to calculate file control sums. VSCryptoHash supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2..

  • Platform: WinOther
  • Publisher: Lokibit.com
  • Date: 23-07-2012
  • Size: 1741 KB

The Cryptographic Hash Functions UNO Component for OpenOffice.org computes hashes (message digests) of text and files using following hashing algorithms: MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512.

MD5 (Message-Digest algorithm 5) is a widely-used cryptographic hash function with a 128-bit hash value. MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files or other data.This script is used to process a variable length message into a fixed-length output of 128 bits using the MD5 algorithm. It is fully compatible with UTF-8 encoding. It is very useful when u want to transfer encrypted passwords over the internet..

The SHA (Secure Hash Algorithm) is one of the many cryptographic hash functions. It is suggested that SHA256 or greater must used for critical technology.This script is used to process variable length message into a fixed-length output using the SHA256 algorithm. It is fully compatible with UTF-8 encoding..

Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others..

Skein is a new family of cryptographic hash functions, designed for the NIST hash function competition (SHA-3).This is a implementation of Skein, as also of Threefish and UBI, in C# for the .Net Framework 2.0
Skein.Net License - MIT License.

  • Platform: WinOther
  • Publisher: Skeinnet
  • Date:

Digest algorithms aka Cryptographic hash functions (MD5, SHA1, SHA2, RIPEMD etc) for saifix kernel project
sxdigest License - Apache Software License.

  • Platform: WinOther
  • Publisher: Sxdigest
  • Date:

Used to detect file tampering and duplication Cobynsoft's Hash Calculator is a freeware utility for calculating MD5 and SHA-1 cryptographic hash values for single files or for multiple files by selecting entire folders. The tool will output the file(s) cryptographic hash message digest in form of a hexadecimal string that can be used to verify the integrity of the files..

The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. The Microsoft Safety Scanner, expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run the Microsoft Safety Scanner again. Do note that its not exactly a small file ... its msert.exe file is a 68 MB download! If MSS detects Malware or if an error occurs when MSS is running, a report is sent to Microsoft that contains basic information about the Malware or about the error.

  • Platform: WinOther
  • Publisher: Microsoft
  • Date: 24-09-2012
  • Size: 70144 KB

The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software. The Microsoft Safety Scanner, expires 10 days after being downloaded. To rerun a scan with the latest anti-malware definitions, download and run the Microsoft Safety Scanner again. Do note that its not exactly a small file ... its msert.exe file is a 68 MB download! If MSS detects Malware or if an error occurs when MSS is running, a report is sent to Microsoft that contains basic information about the Malware or about the error.

  • Platform: WinOther
  • Publisher: Microsoft
  • Date: 04-08-2012
  • Size: 70144 KB

General-purpose cryptographic application. Includes easy access (GUI frontend) to: public key algorithms, symmetric ciphers, hash algorithms, X.509 certificates, PKCS, smart cards (PKCS11) access and other utilities. Based on OpenSSL..

  • Hash
  • License: Freeware
  • Rating

Forensic examiners often need to quickly obtain the hash values for potential evidence files for reports or to verify their results. Pinpoint Hash was created to allow users to quickly obtain the hash values for CRC-32, MD5, SHA-1 and SHA-256 hash values for any file and quickly copy the results to the clipboard for easy transport to any other application. Hash integrates into the Windows "Send to" menu for easy access from Windows Explorer. It's quick. It's simple. It's free. Enjoy..

  • Platform: Windows
  • Publisher: Pinpoint Labs
  • Date: 01-01-2007
  • Size: 4296 KB

FlyingBit Hash Calculator is an add-in for the OS shell allowing you to find out the hash sum of any file right from the context menu of the system. Now you do not have to run a special program, select the Open menu item and then search for the necessary file. You can find out the hash sum right in Explorer! Moreover, the program can compare MD5 sums with *.md5 files of the GNU MD5Sum tool and also create its own *.md5 files. FlyingBit Hash Calculator calculates the hash sum using about 9 different algorithms among which there are such popular algorithms as MD5, CRC32 or SHA1 and less popular ones, for example, TIGER.

 Recovery-Review.com presents: Crypto Helper the first product in a new series of useful freeware utilities for your comfort.
 
 It is a freeware Windows Explorer extension. Integrating into a file context menu, it can always be in a click of a button.
 Crypto Helper adds two new context menu items: Get Sign, Check for Sign.
 
 Ever experienced a problem with these tricky hashes? Were you always looking for a tool to check or generate them? So here it is Crypto Helper can handle various cryptographic signatures generate hashes and check file integrity.

Cryptographic Hash Utilities: Freeware | All

New Reviews


Print Inspector

Whether you are using a printer connected to your local desktop computer or a print server sometimes you need to see whats going on in your printer by having a close look at the print jobs sent by the users. Print Inspector is such type software ...


Disk Genius

Disk Genius was formerly known as Partition Guru which is an all-in-one solution for disk partition management, data recovery and disk repairing. It can recover lost files from partition, backup and restore partition table, clone partition or clone ...


Safe In Cloud

It is quite difficult to find any computer users nowadays who do not need to use the web, for any purpose. Whether it is for education or entertainment, the web is your best resource. You also need to use various online services for banking, ...


PictBear

Nowadays, a majority of PC users resort to digital image editing once in a while. It may be required for retouching image captured in smart phones or for creating an album in Facebook. For some people, tinkering with digital images is a pastime too. ...


Panda Cloud Cleaner

PC security has become a tricky and complicated subject both for home users and network supervisors, with complexity and risk factors multiplying over the years. Using a single antivirus app may not be enough anymore. That explains why many users ...


SnapCrab

Nearly every PC users need to take screenshots from time to time, whether it is for personal or professional needs. While using the basic Windows screenshot capture method is available, it is not adequate for everyone. When you want to capture ...


BitKiller

Dealing with various types of data efficiently holds the key to success in any computing task. Apart from generating new data and modifying existing files, it becomes necessary to delete existing files at times. While most users resort to using ...


SeaMonkey, Portable Edition

Using the Internet has become a necessity for a majority of people, including those who do not use a PC regularly. To browse web, stream video or download online content, people often resort to using various third party apps. For example, using ...


TuckAway Intelligent Email Organizer Pro

Using an email software allow you to do a number of things including managing your address lists, emails and even ending memos, documents and even virtual letters. You can also use it to manage your tasks easily. The email software comes in ...


WebAcappella

Web design sector has witnessed several trends and technological innovations affect website development in big ways. With time, designing websites has become easier. Nowadays, you can find web design software that nearly eliminates the need to ...


New Downloads

GlassWire Firewall

GlassWire\'s free firewall
software helps protect your
computer, privacy, and data by
monitoring your network
activity. ...

RationalPlan Project Viewer

RationalPlan Project Viewer is
a free project planning
software viewer, the perfect
solution for anyone (from
project ...

Active@ Hard Disk Monitor

Active@ Hard Disk Monitor is a
freeware disk utility that
monitors the status of your
hard drives and scan for bad
...

Active@ ISO Burner

Active@ ISO Burner burns
CD/DVD/Blu-ray ISO images
compatible with the ISO 9660
standard. Automated burning is
also ...

ModCom

Free Windows software for Data
Acquisition & Control, HMI
/ SCADA, Industrial
Automation, Process Control,
and Data ...

Billiards Pyramid

Moscow Billiards is a Piramyd
billiards simulator. The game
can be played either against a
computer or human opponents
...

Active Disk Editor

Disk Editor is a free low
level hexadecimal editor
specifically aimed to explore
NTFS partitions internals.
Extended ...

Active@ UNERASER

Active@ UNERASER is a freeware
data recovery tool designed to
help you recover data which
has been deleted from any kind
...

Free 2D Barcode Generator

The programe generates and
prints most popular matrix and
stacked 2D barcode symbologies
including Aztec Code, Data ...

Free 1D Barcode Generator

The programe generates and
prints most popular linear and
postal barcode symbologies
including Codabar, Code11,
Code25 ...