Software Listing: Cipher

Files Cipher can be used to encrypt a range of computer files to ensure data protection. This program is a multifunctional cryptographic tool that is easy to use and understand. The encryption algorithm with private key was specially developed by FC Soft and has been proven to be effective over many years of operation. Features include a wide scope of application, high performance rate and strong encryption. Due to a comfortable and intuitive interface, Files Cipher allows any user to protect data, even novices in information security. Main features: - Encryption. It is based on the algorithm with a private key that is not stored in the encrypted file.

  • Publisher: FC Soft
  • Date: 01-05-2008
  • Size: 1564 KB
  • Platform: Win2000, Windows Server, Windows Vista, WinOther
  • Cipher
  • License: Freeware
  • Price: 0.00
  • Rating

Cipher is purely a generic API to encrypt and decrypt data. One should only need to install this module if it is asked for by another module as a dependency..

  • Platform: PHP, Scripts

FUNDAMENTALS CIPHER was specially developed as a Delphi / FreePascal unit that implements routines for various cipher functions.

Amongs the included cipher functions we can find RC4, DES, RSA, etc. Now you can secure your data with the help of this accessible library.


.

  • Platform: WinOther

Cipher/Decipher was developed as a small and easy-to-use application that allows its users to create ciphered messages. All the messages can be built from a defined number of switched letters with the help of 2 keywords.

Cipher/Decipher is a software that can run on multiple platforms as it is developed with the help of the Java programming language.


.

  • Platform: WinOther

Giova X Cipher is an application especially designed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.

Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphabetic key (any sequence of letters and of any length) to perform polyalphabetical substitution against a random table of cipher character pairs, and a numeric key which allows the user to select any one of 650 variants of the cipher table, and you have the basis of the Giova X Cipher.

  • Platform: WinOther

Giova Cipher was developed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.

Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphabetic key (any sequence of letters and of any length) to perform polyalphabetical substitution against a random table of cipher character pairs and you have the basis of the Giova Cipher.

  • Platform: WinOther

Zeta Cipher is an application designed to secure text and messages using a modern implementation of neo-classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.

The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.

Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphanumeric key (any sequence of permitted characters and of any length) to perform alphabetic substitution against a random table of cipher characters, and a numeric key which allows the user to select any of one thousand variants of the cipher table, along with irregular columnar transposition based on a...

  • Platform: WinOther

Xia Cipher automatically removes non-alphabetic characters from the text before encryption, decryption, or analysis (if a ciphertext contains non-alphabetic characters then it is probably not a Xia ciphertext). The stripped text is subjected to polyalphabetic substitution against multiple tables of randomly generated characters as determined by the user-entered Key Word, with interleaved irregular columnar transposition as determined by the user-entered Key Number.

Ciphertext which has been encrypted by Xia yields Frequency Analysis and Sequence Analysis results which are very similar to those for randomly generated text.

  • Platform: Win7 x64, Windows 7, WinOther, WinVista, WinVista x64

Xia B Cipher is an encryption software developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.

The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.

Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphanumeric key (any sequence of permitted characters and of any length) to perform alphabetic substitution against multiple tables of randomly generated cipher characters, and a numeric key to perform irregular columnar transposition interleaved with the substitution, and you have the basis of the Xia B Cipher.

  • Platform: WinOther

JBO Catflap Cipher is an application developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which cannot be factored for security.

Most traditional ciphers have a finite number of solutions ... consider a cipher system which uses an alphanumeric key (any sequence of alphanumeric and punctuation characters, and of any length) to perform polyalphabetic substitution of both upper and lower case letters, numbers, and commonly used punctuation, against a random table of cipher characters and you have the basis of the JBO Catflap Cipher.

  • Platform: WinOther

Extremely fast and reliable image file encryptor/decryptor with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form..

  • Publisher: AMBITWARE
  • Date: 10-06-2004
  • Size: 4927 KB
  • Platform: Unix, Win2000, WinOther

CryptoLab is a freeware cryptography application for Microsoft Windows, and incorporates text-based encryption / decryption through the use of plug-in cipher modules. Advanced features include SMTP email support, a Key Manager and pseudo-random key generation. Features list: Plug-in cipher modules. Advanced pseudo-random key generation. Easy-to-use tabbed interface for text files. Key Manager storage utility. Full password protection (incorporating SHA-1 hashing algorithm). Integrated SMTP email support. PDF, HTML and Word Document export options. Statistics calculator. Included encryption modules: Affine Shift ARCFOUR Blowfish Cipher Caesar Cipher Data Encryption Standard Modular Shift Algorithm (by EJC Cryptography) Rijndael (American Encryption Standard) Substitution Cipher Vigenère Cipher...

  • Platform: Win2000, Windows Server, Windows Vista, WinOther

Magical File Encrypt is powerful tool to protect your sensitive Files.You data files undergo powerful cipher operations and makes them unreadable without first decrypting them.Even if an unauthorized person gets access to your files , he will not be able to read it without decrypting the files with the correct pass. It is impossible to decrypt the files without knowing the correct password..

  • Platform: Windows Server, Windows Vista, WinOther

Play Crosswords on your computer! Get three fun and unique Crossword games in one! These are the three games you can enjoy in Crossword Twist. Fill-In: The good old favorite! Match words across and down the puzzle. Jigsaw: Crosswords with a twist! Match the words by solving a jigsaw puzzle. Cipher: For the decryption expert in you! Decipher the numbers to find the hidden letters. Features over 100 levels, an intuitive and easy to use interface and no time-limit pressure..

  • Platform: Linux, Linux Gnome

This is an ASP component for use with the IIS Server. It allows you to hash, cipher and make checksum on strings and on files. It supports 22 types of hash, 5 checksums and 37 different ciphers. With this component you can make strong security pages, sign page or messages, made the programs to exchange key, making public and private keys, you have all the standards to cipher and hash to do it..

  • Platform: Asp, Scripts

Cryptomak contains cipher and tools for encryption utility written in php such as substitution, vigenere, affine, transposition and index of coincidence. It is powered by Phrame platform which implements MVC design and Smarty template engine..

  • Platform: PHP, Scripts

CodeBreaker automatically analyzes the letter-frequencies, provides 2 editable reference tables (for texts and written numbers) in 2 languages each and thus makes it easier to solve riddle texts that have been encrypted with a substitution cipher. Perfect for solving riddles, breaking secret codes and messages and solving riddle geocaches..

  • Publisher: ITSTH
  • Date: 17-09-2012
  • Size: 212 KB
  • Platform: WinOther

The Algebraic Toy Cipher is a toy cipher for algebraic research. It is scalable in the number of bits and in the number of rounds. Works over two fields GF(2)/P, being one for the s-box invertion and the other for the mixing layer linear transformation..

  • Platform: Linux, Mac OS X, WinOther

An encryption standard based on the chaotic properties of the logistic map function. With a pseudo-random byte generator, this cipher offers encryption with great statistical improbability..

  • Platform: Linux, Unix

The objective is to demonstrate character/ symbol frequency distribution analysis (reference to the English language) on 2 vintage ciphers, namely Caesar cipher (a mono-alphabetic substitution cipher) and the Vigenere cipher (a poly-alphabetic substitution cipher). Under the symbol frequency distribution analysis, the statistical characteristic of the language is still observable from the cipher text from the Caesar cipher, this give leads to breaking the code by remapping it to the possible substituted symbols. However, under the Vigenere cipher, such statistical characteristic has been modified in the cipher text to deter the same remapping recovery of the plain text message.

  • Platform: Matlab, Scripts

Page: 1 | 2 | 3 | 4 | 5 | Freeware

New Reviews


Opera web browser

Opera is a free to download web browser, which is usually overlooked by the majority of people who use web browsers, in favour of the speed for google chrome, or the customisability for firefox. However opera certainly does have its own appeal ...


Wise Registry Cleaner

Wise Registry Cleaner is a free registry cleaner, that is in fact more than just a registry cleaner. Its main purpose is to indeed clean your computer registry, but it also acts as a general system tune up tool, as well as a registry defragmenter, ...


Fraps

Fraps is a video capture utility specifically designed for the recording of other pieces of software, specifically tailoured to those which use direct X and open GL. This means the main use of fraps is for recording games which run on the windows ...


Battle of Britain

Battle of Britain is a top down strategy and shooter game that takes place during the historic battle of Britain, as the name would suggest. The game takes place from a top down perspective, and has a fairly interesting method of control. Instead of ...


Time Fighter

Time fighter is a free ware game in the general two dimensional shooter genre. Many of the traits the game has are very generic and taken from and used by every other game in its genre, mainly the two dimensional field, the way the character (which ...


Natural Voice Text to Speech Reader

NaturalReader is a piece of software which reads aloud written text on screen is a more natural sounding voice than most computerized voices. Free NaturalReader is a free version, where you can type or copy and paste text into the window, to be read ...


FinalFortress

Final fortress is a free downloadable demo for the full game final fortress. Final fortress is  fixed location shooter mixed with RPG elements, which isn't a completely unique concept, but is done in a fairly unique way, with your large ...


Ultrasurf

There are many cases where you need to access a website which is otherwise blocked by your ISP. You need to use a proxy but a using free proxy that is never easy and convincing. Also, whenever you want to hide your identity online, you need to use ...


WinXP Manager

WinXP Manager is the tool letting you easily change and personalize your Windows XP based system. Its the edition of the tool released by Yamicsoft for Windows XP only, and is similar to Vista Manager and Windows 7 Manager, designed for later ...



New Downloads

TeeGrid for VCL/FMX

Lightweight and fully-featured
Grid control for RAD Studio,
Delphi and C++Builder. The
Grid allows you easily and
fast ...

SAP Sybase ODBC driver
(32/64 bit)

SAP Sybase ODBC Driver for
Adaptive Server Enterprise
provides high-performance and
feature-rich connectivity
solution ...

Personal Timeclock

Personal Timeclock: Tracks and
reports your computer usage by
project and category. It can
help you with client billing,
...

SyvirBuild 2

SyvirBuild 2 comes with an
automatic network scanner that
detects all off your Windows
PCs in your local area
network. ...

Extra Subst

Extra Subst - program designed
to make access to frequently
used folders of your computer
easier. It is also used to ...

RESTrick Control Panel

You can tune your computers
according your requirements,
tune up them for the best
performance. RESTrick gives
you access ...

MixPad Music Mixer Free

MixPad is free music recording
and mixing software designed
for easy audio production. Mix
music, vocal and audio tracks,
...

BearShare MP3

Bearshare MP3 is a feature
loaded, secure and smart P2P
application designed to
download your favorite music,
movies, ...

Voxal Plus Edition

Voxal Plus Edition is a state
of the art voice changer
software to edit and add
effects to voice recordings.
You can also ...



Related Searches

Cipher Breaking
Cipher Amethyst
Cipher Caesars
Code Cipher
Command Cipher
Decoder Cipher
Desktop Cipher
Files Cipher
Fun Cipher
Challeng Cipher
Lab Cipher
Pharmace Cipher