Software Listing: 3des Encryption Algorihm

Elcro Encrypter is a FREEWARE application for powerfull data encryption. It uses an advanced 3DES encryption algorihm with combinations of base64 encoding and MD5 hash algorithms. It's use is not limited to certain data types. It can encrypt any type of file and decrypt it afterwards. One encrypted archive can contain multiple files and you can edit it as you wish. It has also a shout box where you can exchange messages and shout out the bugs..

  • Publisher: Elcro
  • Date: 07-05-2012
  • Size: 1014 KB
  • Platform: WinOther

CryptoTools is a multi-language suite of encryption components and libraries. CryptoTools provides DES and Triple DES (3DES) encryption, as well as Base64 encoding and MD5 hashing capabilities. CryptoTools supports the following major languages C (win32), C++, ActiveX/COM, .Net and Java. Components for all languages are available in one single package..

  • Platform: BEOS, Linux, Pocket PC, Unix, Win2000, Windows CE, Windows Server, WinOther

Free encryption tool ABI- CODER uses a 128-448 bits Blowfish and 168 bit 3DES algorithms. It allows you to encrypt files and folders with just a click of the mouse. You can also create self-decrypting files (.exe) that will prompt you for password input upon opening and then present the original files without requiring that the other user has any decryption software installed. The program is easy to use and comes with help files as well as hints to guide you along the way.ABI- CODER currently features the following encryption algorithms: - 448 bit Blowfish encryption algorithm - 168 bit 3DES encryption algorithm - 256 bit AES encryption algorithm Warning ABI- CODER 3.

  • Platform: WinOther

ABI- CODER is a personal File Encryption software that is powerful, yet extremely easy to use. It allows you to encrypt multiple files in multiple folders by using one of its 3 encryption algorithms. This software also has a self-decrypting file tool, which can create encrypted files, which do not require any decryption software.

ABI- CODER currently features the following encryption algorithms:

* 448 bit Blowfish encryption algorithm
* 168 bit 3DES encryption algorithm
* 256 bit AES encryption algorithm.

  • Platform: Win2000, WinOther

CryptoExpert protects your files and folders with a password, securely encrypting data with either the industry-standard AES-256 Algorithm or your choice of encryption method. Implementing numerous innovations along with fast on-the-fly operation, CryptoExpert provides higher security, better reliability and easier usability than the transparent NTFS encryption system implemented in the Windows built-in Encrypted File System.

Secure Drive Encryption That is Easy To Use

Secure hard drive encryption made easy! CryptoExpert protects sensitive data by creating encrypted disk volumes as usual binary files using your choice of AES-256, BLOWFISH, CAST, or 3DES encryption for ultimate data security.

  • Platform: Win2000, Windows 7, WinOther, WinServer, WinVista

(*ATTENTION: If you want a more secure encryption engine, download the tablet-targeted CryptxHD and CryptxHDx apps, or the smartphone-targeted Cryptxphile and Crypt2phile apps which all use 128-bit AES encryption with random 'salt'.)

This smartphone-based utility combines 168-bit "Triple DES" text encryption and user cipher keys with Unicode "Box Drawing" character encoding to convert your secret input text into a secure output string.

App features:
* 168-bit Triple DES encryption using:
... SecretKeyFactory() with 'DESede'
... Cipher() with 'DESede'
* User-supplied cipher key(s) up to 12 characters long
* No-limit recursive encryption
* Any character set (language) can be encrypted*
* No app restrictions to data manipulation size
* SQLite database for archiving (with search and sort)
*...

  • Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x

A licensable developer.s toolkit providing efficient cryptographic functions for integration into software applications to meet your individual data security requirements. The cryptographic algorithm employed is the Data Encryption Stamdard (DES) as defined by the US Bureau of Standards (FIPS PUB 46, 1977). The software tools are designed for OEM use and are available for a wide range of target platform environments. Developers require no cryptographic background to incorporate privacy and authentication services into their applications. Suitable for a multitude of potential applications, e.g. electronic funds transfer, electronic banking, secure E-mail, disk and File Encryption, network user authentication, secure software distribution, etc.

  • Platform: Win2000, WinOther

Free Trustix Enterprise Firewall - Provides total security for Enterprise Networks and the only WYSIWYG (What You See Is What You Get) firewall in the world. A fully-featured packet-filtering router, Trustix Enterprise Firewall has advanced capabilities including the intuitive Xsentry graphical user interface (GUI) for visualizing and editing the firewall policy and behaviour. This unique GUI enables you to manage traffic for all your zones (up to 24) as well as port forwarding, network address translation (NAT) and virtual private network (VPN) configurations. Trustix™ Enterprise Firewall uses the IPsec protocol to encrypt data transmitted over the 'net- extending the security of your network to all arms of your business.

  • Platform: Linux, Linux Open Source, Windows Server, WinOther

The Maverick SSHD is an enterprise level multi-threaded Java SSH server. The product is compatible with Java 1.4 or later and uses the Java NIO framework for maximum server performance. SSH2 only is supported due to vulnerabilities in the earlier SSH1 protocol. Features Include: - Cross platform, 100% Java based component - Supports JDK 1.4.2_05 and above - SSH2 support only, for maximum security - Supports SSH2 protocol only for maximum security - SFTP & SCP file transfer protocols supported - Scalable implementation based upon the Java NIO framework - Reduce overheads by controlling your server's threading requirements - Local and remote port forwarding fully supported - Password authentication - Public-key authentication - Blowfish/3DES encryption ciphers - Optional Twofish, AES & CAST ciphers (Requires additional configuration) -...

  • Publisher: 3sp.com
  • Date:
  • Size: 1802 KB
  • Platform: Java

One of the requirements of Paymment Card Industry (PCI) to security credit card is using DUKPT method for encrypting cardholder data (sensitive data such as PAN, tracks, cardholder's name and PIN).

Derived Unique Key Per Transaction (DUKPT) is a key management scheme in which a cryptographic key is derived for each transaction. In order to use a key derivation transaction, it is used a initial key known as Based Key Derivation (BDK) and also a public value called Key Serial Number (KSN).

Crypto Tool DUKPT is a simulator which performs the derivation of a key per transaction as if it were a capture device.

  • Publisher: PogSoft
  • Date: 06-08-2014
  • Size: 495 KB
  • Platform: Android 2.x, Android 3.x, Android 4.4, Android 4.x

Tukanas File Encryption is a fast file-security program that can password-protect, lock, hide and encrypt any number of files, folders, drives, pictures and documents in seconds. Protected files are hidden, undeletable, inaccessible and highly secure. It hides files from kids, friends and co-workers, safeguards them from viruses, trojans, worms and spyware, and even protects them from networked PCs, cable users and hackers. Files can also be protected on USB Flash Drives, Memory Sticks, CD-RW, floppies and notebooks. Protection works even if files are taken from one PC to another on a removable disk, without the need to install any software.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther
  • PrivyPad
  • License: Shareware
  • Price: 24.95
  • Rating

Create, edit, read and e-mail encrypted and plain text files with this Notepad-like text editor. It supports 4 strong encryption/decryption algorithms: BLOWFISH, Triple DES(3DES), RIJNDAEL(AES) and XOR. It allows to perform up to 100 encrypting/decrypting steps on highly sensitive information to ensure its highest level of protection and security. Use this utility to protect your private info, to encrypt/decrypt a secret document or file, to store business and credit card data or to keep any other strictly confidential data. This software can also be used as a password and electronic key keeper.

  • Platform: Win2000, Windows Server, WinOther

Don't spend over $100 on an encryption utility. Use this COM-accessible full-featured encryption library from: ASP, VB 6, VC++, Visual FoxPro, C#, VB.NET, and any other language that supports COM or .NET. Supported encryption types include: DES, 3DES, RC2, Rijndael (AES), RSA and DSA. Free to try with a 10 second delay, $50 to buy. Purchase online and you will receive your serial number immediately. Don't be fooled by companies trying to sell encryption libraries for well over $100. We feel purchasing this utility should be as easy as using it!.

  • Platform: Win2000, Windows Server, WinOther

This encryption software is easy to use,and it have many power features.The features as the following:It can encrypt files of any type or length. The encrypted file can be used without decrypting by Encryption Shield. Double-click the file, then a password input box will popup. After putting in the correct password, then you can open it, edit or save the file. After closing it, it is still in encrypted state, and there is no need to encrypt it again.Using powerful algorithms to encrypt files/folders: Rijndael with 256 bit key (AES 256, now it is Advanced Encryption Standard), Blowfish, DES, 3DES, and there is no possibility for decryption.

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

HsSmsDLL is a Windows DLL enabling applications to send, receive, read and delete SMS messages via a GSM modem attached to COM port, according to GSM 07.05, 03.40. The library includes integrated encryption AES, DES, 3DES, ARC4, CAST128, Blowfish,Twofish optionally applied to SMS text. HsSmsDll is designed for use from Visual C / C++, VB (v6 and 2003), C# .NET and other programming languages. Professional License includes full C source code. SUPPORTED GSM / GPRS MODEMS and MODULES: Falcom SAMBA 75,Falcom SAMBA 55,Siemens MC35, Siemens TC35, Siemens TC65, Siemens TC45, Nokia 12, Novatel Merlin U630, Option PC Cards.

  • Platform: Win2000, Windows Server, WinOther
  • ZipX
  • License: Shareware
  • Price: $24.95
  • Rating

ZipX is a powerful and easy-to-use file compression and encryption utility for Microsoft Windows ZipX is a powerful and easy-to-use file compression and encryption utility for Microsoft Windows. It supports extraction of files from many different archive formats, and can create both Zip and CAB archives.ZipX is compatible with both WinZip and PKZip and many other popular archive programs. However, some of ZipX's features are quite advanced and might produce zip files that cannot be extracted in other archive utilities. For example, the use of digital certificates for encryption means that apart from ZipX, only PKWARE's SecureZip will be able to extract files from these archives.

  • Platform: WinOther

AEPE lets you encrypt files using 17 encryption algorithms AEPE lets you encrypt files using 17 encryption algorithms and also shred/make encrypted .exe files and work with .ZIP files from context menu of Windows Explorer! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are industrial encryption standards. Shredding (Safe removing files from your system). The shredded files will never be restored even with using Norton Unerase software.

  • Platform: WinOther

Python encryption library for encrypting and decrypting both strings and binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates.

Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings and binary data. Provides digital signature creation and verification. Provides encoding functionality for Base64, quoted-printable, and hex-encoding.

Python encryption library with the following features:

* Symmetric Encryption: AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2.

  • Platform: Windows 7, WinOther, WinVista

Python encryption library x64 for encrypting and decrypting both strings and binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and decryption using digital certificates.

Provides hashing functionality for both strings and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings and binary data. Provides digital signature creation and verification. Provides encoding functionality for Base64, quoted-printable, and hex-encoding.

Python encryption library with the following features:

* Symmetric Encryption: AES, Blowfish, Twofish, RC2, ARC4, DES, 3DES, PBES1, PBES2.

  • Platform: Win7 x64, WinOther, WinVista x64

SafeHouse provides transparent on-the-fly hard drive encryption for your PC. Using SafeHouse, you can allocate portions of your existing hard drives to be reserved for encrypted data. SafeHouse encrypted volumes appear on your PC as another Windows drive letter. You can do anything with a SafeHouse virtual drive that you can do with a normal hard drive after supplying your password..

  • Platform: WinOther

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


AM Browser

AM browser is a freeware browser from 2009, which markets itself allowing you to surf the web in a more comfortable, less confusing way. Once you install and open AM browser, the first thing you will notice is how out dated the look of it is. Most ...


SD QuickExec

Im always scouting the internet looking for quality applications that’ll help me save time carrying out some of the basic things I do every time I switch on my computer. For example, launch my internet browser, email client, iTunes and so on. ...


Secure Virtual Desktop

Secure Virtual Desktop is a piece of software that allows you to enter a temporary ‘Secure’ desktop state, where everything is filtered and anonymous - sounds interesting, doesn’t it? Secure Virtual Desktop is definitely something ...


Joomla

Nowadays, most people use Joomla, Wordpress or Drupal to make their websites. Creating websites by the use of CMSs is an easy yet effective way as one does not require to code heavily. We’ll be talking about Joomla, a powerful Content ...


FILExtinguisher

FILExtinguisher is a simplistic looking data removal tool, that will assist you in totally and completely removing sensitive data from your computer hard drive. This means that you can securely remove your online surfing history, banking details, ...


Jewel Quest 3 Game

Jewel quest (3) is a free ware downloadable game from Free Ride games, a game development studio with a fair number of high quality games on this website. Jewel quest isn't an exception to this rule. Jewel quest is essentially a clone of the ...


TopDesk

It feels better, when the main screen of the computer looks good. However, in most of the cases, you would find the main screen or desktop of the computer is filled with the ugly looking icons which spoil the beauty of your desktop, and there comes ...


Simple Machines Forum (SMF)

SMF (Simple Machines Forums) is a piece of forum software that is very useful for any website owner (or anyone looking to own a website) who would like to add a community forum to their website, or indeed anyone with a forum already who would like ...


Sentry

When you are away from your computer, to most users its important to make sure no one uses or accesses your computer and changes how you left it. Its even more important to make sure no one views your private files, emails, instant messenger ...



New Downloads

AllMyNotes Organizer Deluxe
Edition

AllMyNotes Organizer is a
breath-catching secure random
organizer! Save all data
securely locked from
someone\'s eyes. ...

ISO Workshop

ISO Workshop is a free
application designed to
facilitate disc image
management, conversion and
burning operations. If ...

TeeGrid for .NET

The Grid Control for NET
offers a very fast data grid
for your Visual Studio
projects. Includes NET Core
support and ...

Express Dictate for Mac

Express Dictate is a
professional dictation voice
recorder for Mac OS X.
Features include voice
activated recordings, ...

AnyMap JS Maps

AnyMap JS Maps is an advanced
JavaScript-HTML5 mapping
library with the
ever-expanding Map Collection,
which makes you ...

TinyMiner EVE Online Mining
Bot

TinyMiner is an undetectable,
intelligent Eve Online Mining
Bot that makes billions of ISK
for you totally on AutoPilot!
...

LuaStudio

LuaStudio is aprofessional
development environment for
debugging Lua script in your
applications. It\'s familiar
and fast ...

PostgreSQL Data Access
Components

PgDAC is an enhanced component
library for fast direct access
to PostgreSQL from Delphi,
C++Builder and Lazarus. PgDAC
...

Xlinksoft Video to FLV
Converter

Xlinksoft Video to FLV
Converter is a professional
video converter which can
convert all popular video and
audio formats ...



Related Searches

Encryption Css
Encryption Dbf
Access Encryption
Batch File Encryption
C Encryption
Camellia Encryption
Aes Text Encryption
Can Encryption Tool
Digital Express Encryption Software
E Mail Encryption
Nsf Encryption
Remove Encryption Wmv