Software Listing: Cipher
- Files Cipher
- License: Shareware
- Price: 49.95

Files Cipher can be used to encrypt a range of computer files to ensure data protection. This program is a multifunctional cryptographic tool that is easy to use and understand. The encryption algorithm with private key was specially developed by FC Soft and has been proven to be effective over many years of operation. Features include a wide scope of application, high performance rate and strong encryption. Due to a comfortable and intuitive interface, Files Cipher allows any user to protect data, even novices in information security. Main features: - Encryption. It is based on the algorithm with a private key that is not stored in the encrypted file.
- Publisher: FC Soft
- Date: 01-05-2008
- Size: 1564 KB
- Platform: Win2000, Windows Server, Windows Vista, WinOther
- Cipher
- License: Freeware
- Price: 0.00

Cipher is purely a generic API to encrypt and decrypt data. One should only need to install this module if it is asked for by another module as a dependency..
- Publisher: Earnest Berry
- Date: 14-06-2013
- Size: 10 KB
- Platform: PHP, Scripts
- FUNDAMENTALS CIPHER
- License: Freeware
- Price: 0.00

FUNDAMENTALS CIPHER was specially developed as a Delphi / FreePascal unit that implements routines for various cipher functions.
Amongs the included cipher functions we can find RC4, DES, RSA, etc. Now you can secure your data with the help of this accessible library.
.
- Publisher: David J Butler
- Date:
- Platform: WinOther
- Cipher/Decipher
- License: Freeware
- Price: 0.00

Cipher/Decipher was developed as a small and easy-to-use application that allows its users to create ciphered messages. All the messages can be built from a defined number of switched letters with the help of 2 keywords.
Cipher/Decipher is a software that can run on multiple platforms as it is developed with the help of the Java programming language.
.
- Publisher: Rui Canhestro
- Date:
- Platform: WinOther
- JBO Giova X Cipher
- License: Shareware

Giova X Cipher is an application especially designed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.
Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphabetic key (any sequence of letters and of any length) to perform polyalphabetical substitution against a random table of cipher character pairs, and a numeric key which allows the user to select any one of 650 variants of the cipher table, and you have the basis of the Giova X Cipher.
- Publisher: JBO Software
- Date:
- Platform: WinOther
- JBO Giova Cipher
- License: Shareware

Giova Cipher was developed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.
Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphabetic key (any sequence of letters and of any length) to perform polyalphabetical substitution against a random table of cipher character pairs and you have the basis of the Giova Cipher.
- Publisher: JBO Software
- Date:
- Platform: WinOther
- JBO Zeta Cipher
- License: Shareware

Zeta Cipher is an application designed to secure text and messages using a modern implementation of neo-classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.
The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.
Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphanumeric key (any sequence of permitted characters and of any length) to perform alphabetic substitution against a random table of cipher characters, and a numeric key which allows the user to select any of one thousand variants of the cipher table, along with irregular columnar transposition based on a...
- Publisher: JBO Software
- Date:
- Platform: WinOther
- JBO Xia Cipher
- License: Shareware

Xia Cipher automatically removes non-alphabetic characters from the text before encryption, decryption, or analysis (if a ciphertext contains non-alphabetic characters then it is probably not a Xia ciphertext). The stripped text is subjected to polyalphabetic substitution against multiple tables of randomly generated characters as determined by the user-entered Key Word, with interleaved irregular columnar transposition as determined by the user-entered Key Number.
Ciphertext which has been encrypted by Xia yields Frequency Analysis and Sequence Analysis results which are very similar to those for randomly generated text.
- Publisher: JBO Software
- Date:
- Platform: Win7 x64, Windows 7, WinOther, WinVista, WinVista x64
- JBO Xia B Cipher
- License: Shareware

Xia B Cipher is an encryption software developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.
The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.
Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphanumeric key (any sequence of permitted characters and of any length) to perform alphabetic substitution against multiple tables of randomly generated cipher characters, and a numeric key to perform irregular columnar transposition interleaved with the substitution, and you have the basis of the Xia B Cipher.
- Publisher: JBO Software
- Date:
- Platform: WinOther
- JBO Catflap Cipher
- License: Shareware

JBO Catflap Cipher is an application developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which cannot be factored for security.
Most traditional ciphers have a finite number of solutions ... consider a cipher system which uses an alphanumeric key (any sequence of alphanumeric and punctuation characters, and of any length) to perform polyalphabetic substitution of both upper and lower case letters, numbers, and commonly used punctuation, against a random table of cipher characters and you have the basis of the JBO Catflap Cipher.
- Publisher: JBO Software
- Date:
- Platform: WinOther
- I-Cipher AP
- License: Shareware
- Price: 45.00

Extremely fast and reliable image file encryptor/decryptor with build-in activity log to record every action. I-Cipher can process various image file formats. Encrypted images are saved as bitmap files to preserve high image quality. I-Cipher is ideal for encryption/decryption of virtually any size of images, scanned documents, or electronic art. It may prove to be an invaluable tool when it comes to image protection against an unauthorized use or theft. Only person with a correct encryption code can decrypt images back to their intelligible form..
- Publisher: AMBITWARE
- Date: 10-06-2004
- Size: 4927 KB
- Platform: Unix, Win2000, WinOther
- CryptoLab
- License: Freeware
- Price: 0.00

CryptoLab is a freeware cryptography application for Microsoft Windows, and incorporates text-based encryption / decryption through the use of plug-in cipher modules. Advanced features include SMTP email support, a Key Manager and pseudo-random key generation. Features list: Plug-in cipher modules. Advanced pseudo-random key generation. Easy-to-use tabbed interface for text files. Key Manager storage utility. Full password protection (incorporating SHA-1 hashing algorithm). Integrated SMTP email support. PDF, HTML and Word Document export options. Statistics calculator. Included encryption modules: Affine Shift ARCFOUR Blowfish Cipher Caesar Cipher Data Encryption Standard Modular Shift Algorithm (by EJC Cryptography) Rijndael (American Encryption Standard) Substitution Cipher Vigenère Cipher...
- Publisher: EJC Cryptography
- Date: 13-10-2007
- Size: 797 KB
- Platform: Win2000, Windows Server, Windows Vista, WinOther
- Magical File Encrypt
- License: Shareware
- Price: 12.99

Magical File Encrypt is powerful tool to protect your sensitive Files.You data files undergo powerful cipher operations and makes them unreadable without first decrypting them.Even if an unauthorized person gets access to your files , he will not be able to read it without decrypting the files with the correct pass. It is impossible to decrypt the files without knowing the correct password..
- Publisher: ArzooSoft Solutions
- Date: 07-01-2008
- Size: 404 KB
- Platform: Windows Server, Windows Vista, WinOther
- Crossword Twist (Linux)
- License: Shareware
- Price: 19.95

Play Crosswords on your computer! Get three fun and unique Crossword games in one! These are the three games you can enjoy in Crossword Twist. Fill-In: The good old favorite! Match words across and down the puzzle. Jigsaw: Crosswords with a twist! Match the words by solving a jigsaw puzzle. Cipher: For the decryption expert in you! Decipher the numbers to find the hidden letters. Features over 100 levels, an intuitive and easy to use interface and no time-limit pressure..
- Publisher: Kristanix Games
- Date: 26-02-2010
- Size: 11267 KB
- Platform: Linux, Linux Gnome
- aspEasyCrypt
- License: Shareware

This is an ASP component for use with the IIS Server. It allows you to hash, cipher and make checksum on strings and on files. It supports 22 types of hash, 5 checksums and 37 different ciphers. With this component you can make strong security pages, sign page or messages, made the programs to exchange key, making public and private keys, you have all the standards to cipher and hash to do it..
- Publisher: mitdata.net
- Date: 14-10-2011
- Platform: Asp, Scripts
- Cryptomak Cipher Tools
- License: Shareware

Cryptomak contains cipher and tools for encryption utility written in php such as substitution, vigenere, affine, transposition and index of coincidence. It is powered by Phrame platform which implements MVC design and Smarty template engine..
- Publisher: makcoder.sourceforge.net
- Date: 10-04-2011
- Platform: PHP, Scripts
- CodeBreaker
- License: Freeware
- Price: 0.00

CodeBreaker automatically analyzes the letter-frequencies, provides 2 editable reference tables (for texts and written numbers) in 2 languages each and thus makes it easier to solve riddle texts that have been encrypted with a substitution cipher. Perfect for solving riddles, breaking secret codes and messages and solving riddle geocaches..
- Publisher: ITSTH
- Date: 17-09-2012
- Size: 212 KB
- Platform: WinOther
- Algebraic Toy Cipher
- License: Freeware
- Price: 0.00

The Algebraic Toy Cipher is a toy cipher for algebraic research. It is scalable in the number of bits and in the number of rounds. Works over two fields GF(2)/P, being one for the s-box invertion and the other for the mixing layer linear transformation..
- Publisher: atcipher.sourceforge.net
- Date: 14-05-2012
- Size: 10 KB
- Platform: Linux, Mac OS X, WinOther
- Logistic Map Cipher
- License: Freeware
- Price: 0.00

An encryption standard based on the chaotic properties of the logistic map function. With a pseudo-random byte generator, this cipher offers encryption with great statistical improbability..
- Publisher: lmcipher.sourceforge.net
- Date: 12-10-2012
- Platform: Linux, Unix
- Character/ symbol frequency distribution analaysis on vintage ciphers
- License: Shareware

The objective is to demonstrate character/ symbol frequency distribution analysis (reference to the English language) on 2 vintage ciphers, namely Caesar cipher (a mono-alphabetic substitution cipher) and the Vigenere cipher (a poly-alphabetic substitution cipher). Under the symbol frequency distribution analysis, the statistical characteristic of the language is still observable from the cipher text from the Caesar cipher, this give leads to breaking the code by remapping it to the possible substituted symbols. However, under the Vigenere cipher, such statistical characteristic has been modified in the cipher text to deter the same remapping recovery of the plain text message.
- Publisher: Michael Chan
- Date: 13-02-2013
- Size: 92 KB
- Platform: Matlab, Scripts













