Search Results for "transposition cipher program"

Showing 37 open source projects for "transposition cipher program"

View related business solutions
  • Parasoft: Automated Testing to Deliver Superior Quality Software Icon
    Parasoft: Automated Testing to Deliver Superior Quality Software

    Parasoft provides test automation for every phase of the software development life cycle.

    Parasoft helps organizations continuously deliver high-quality software with its AI-powered software testing platform and automated test solutions. Supporting the embedded, enterprise, and IoT markets, Parasoft’s proven technologies reduce the time, effort, and cost of delivering secure, reliable, and compliant software by integrating everything from deep code analysis and unit testing to web UI and API testing, plus service virtualization and complete code coverage, into the delivery pipeline. Bringing all this together, Parasoft’s award-winning reporting and analytics dashboard provides a centralized view of quality, enabling organizations to deliver with confidence and succeed in today’s most strategic ecosystems and development initiatives—security, safety-critical, Agile, DevOps, and continuous testing.
    Learn More
  • Empower Your Workforce and Digitize Your Shop Floor Icon
    Empower Your Workforce and Digitize Your Shop Floor

    Benefits to Manufacturers

    Easily connect to most tools and equipment on the shop floor, enabling efficient data collection and boosting productivity with vital insights. Turn information into action to generate new ideas and better processes.
    Learn More
  • 1
    Vigenère

    Vigenère

    A powerful tool for cracking the Vigenère cipher

    Vigenère is a program for encrypting and decrypting text using the Vigenère cipher. Built-in cryptanalysis tools make it possible to crack the cipher without needing the key — or even knowing its length.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Toadflax

    Toadflax

    graphical front-end for editing/transposing abc music files

    ...It allows the user to load in abc music notation files and work on each one independently. The music is displayed on-screen, without needing to use a PostScript interpreter, making it a lightweight notation viewer. The Toadflax program uses a music renderer based on yaps, while py_toadflax uses the music renderer from the abcCairo project based on abcm2ps. The source can be hand-edited or transformed in various ways using an adaptation of the abc2abc program. Perhaps the most useful feature that this provides is transposition with the ability to instantly see the effect of a transposition.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    bitcrypt

    bitcrypt

    BitCrypt is a free ultra-strong encryption that hides text in bitmaps.

    BitCrypt is an elegant encryption that allows for the storage and transmission of information in an undetectable manner. The program processes a user-supplied text encrypting it with the Rijndael cipher and storing it in a user-selected bitmap image. This later step is called steganography, which means "to hide invisibly". If you intend to store sensitive information invisibly, you may encrypt it with BitCrypt and keep it in a picture image. Alternatively, if you intend to pass information to another party, you may encrypt it using BitCrypt and publish it as a part of a website. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    The Lightweight Encryption Algorithm (also known as LEA) is a 128-bit block cipher developed by South Korea in 2013 to provide confidentiality in high-speed environments such as big data and cloud computing, as well as lightweight environments such as IoT devices and mobile devices. LEA is one of the cryptographic algorithms approved by the Korean Cryptographic Module Validation Program (KCMVP) and is the national standard of Republic of Korea (KS X 3246).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Electronic Lab Notebook (ELN) Software Icon
    Electronic Lab Notebook (ELN) Software

    Ideal for any lab. Whether you’re just starting up, a small or large academic institution, or a globally operating company.

    eLabJournal is an all-in-one Electronic Lab Notebook (ELN) software that includes sample tracking and protocol management modules.
    Learn More
  • 5
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    ...PIN functionality is included in versions 1.1.0 and above. The serious perk of the app is that all the info is saved as encrypted data in the data.tsf file in the program directory. The simple yet effective encryption algorithm has a password hash, salt key and vigenère cipher key that are changed with every update. The only thing you have to do when updating is to delete the .tsf files and re-enter all your info again so that it can be encrypted using the new parameters. Detailed How-To can be found in the project wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    EnigMagick

    PHP Web based New Aeon English Qabala analysis tool

    A simple web based tool for analysing a text string using the New Aeon English Qabala ciphers and finding words and passages with matching values in the book of the law (Liber Al) and other texts. Ultimately plan to replace all key features of the old DOS based 'LEXICON' program in a web based environment, and with an easier to use interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CipherCrypt C++

    CipherCrypt C++

    A C++ program which packages Input/Output and block ciphers.

    ...The project uses basic block ciphers to scramble plain text fields. These block ciphers are by no means secure against attack, nor are they meant to be, CipherCrypt C++ is more about providing cipher functionality in a easy-to-use format for small scale projects. CipherCrypt C++ comes packaged with an SDL framework GUI which showcases the read/write and block cipher functionality in a context in which they can be used immediately. The program comes in Windows (Vs C++) and Linux (Eclipse) versions. The windows version comes with a re-distributable but the Linux version requires some set up. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    ORLA (Open Remote Linux Administration)

    ORLA (Open Remote Linux Administration)

    Monitor your GNU/Linux server with your smartphone

    ORLA, or Open Remote Linux Administration, is a project we’re working on as engineering studients in IT at Polytech Marseille Engineering School, France. The goal of ORLA is to provide Server Administrators a small yet effective monitoring tool on your Android phone. And security will not be a problem as we’ll cipher data transmission with AES-256 encryption. We just finished the design of the program and the algorithms we’ll work with, and we are going to start coding soon :) We’ll continue to maintain and upgrade the project even after the school’s deadline, because we think it can be useful to quite a lot of people.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    BEDBUG CSPRNG & Stream Cipher

    BEDBUG CSPRNG & Stream Cipher

    A family of FLEA-inspired CSPRNGs and Stream Ciphers

    BEDBUG is a small, fast, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It exhibits uniform distribution, mixes rapidly (with worst-case avalanche better than 16-bits), has no detected bias, and comes in three variants: BEDBUG128, with an internal state array of 128+3 32-bit words; BEDBUG256, with an internal state of 256+3 words; and BEDBUG512 with a 512+3-word state. The former permit seeding with a key of up to 4096 or 8192 bits, the latter with a...
    Downloads: 1 This Week
    Last Update:
    See Project
  • SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM Icon
    SalesTarget.ai | AI-Powered Lead Generation, Email Outreach, and CRM

    SalesTarget.ai streamlines your sales process, providing everything you need to find high- quality leads, automate outreach, and close deals faster

    SalesTarget is ideal for B2B sales teams, startup founders, and marketing professionals looking to streamline lead generation and outreach. It also benefits growing SaaS companies and agencies aiming to scale their outbound efforts efficiently.
    Learn More
  • 10
    MOTE CSPRNG & Stream Cipher

    MOTE CSPRNG & Stream Cipher

    A family of small-state CSPRNGs and Stream Ciphers

    MOTE is a fast, small-state, cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. MOTE exhibits uniform distribution, mixes extremely rapidly, has no detected bias, and comes in three variants: MOTE8, with an internal state array of 8+4 32-bit words; MOTE16, with an internal state of 16+4 words; and MOTE32 with a 32+4-word state. The former permit seeding with a key of up to 256 or 512 bits, the latter with a 1024-bit key. Reduced to essentials, MOTE is only...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ISC - The ISAAC Stream Cipher

    ISC - The ISAAC Stream Cipher

    ISC lets you encrypt & decrypt text and files of any type up to 4GB

    ISAAC is a cryptographically secure pseudo-random number generator (CSPRNG) and stream cipher. It was developed by Bob Jenkins from 1993-1996 and placed in the Public Domain. ISAAC is fast - especially when optimised - and portable to most architectures in nearly all programming and scripting languages. After more than 20 years of existence ISAAC has not been broken, and the little program you have here allows you to use it to encrypt and decrypt text of arbitrary length, files of any type, on a key-phrase of any complexity. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Cipher Scanner for SSH

    Java program to scan the ciphers supported by a SSH server.

    Code to check the ciphers supported by an SSH server. How to run the program: java -cp "ssh-cipher-check.jar" SSHCipherCheck <host> <port> or java -jar SSHCipherCheck <host> <port> where, <host> - Host name or IP address of the server. <port> - The port on which the SSH server is running. Saurabh Sule <saurabhsule82@yahoo.co.in>
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Simple Cipher Decoder

    Simple Cipher Decoder

    Decrypts and encrypts substitution, transposition and vigenere ciphers

    Change log 1.01: 1)Error fixed on clicking solve and arrow buttons in the vigenere decoder 2)Error fixed when number of columns exceeds text length in substiution cipher 3)Can now handle variable block length when changing columns 4)Multiple identicle conversion values onn the frequency analysis page now not allowed This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    CryptoX

    AES Encryption Program

    v2.0.0 (Latest) ---CHANGE LOG--- v1.0.0 - Original Release v1.0.1 - Source Code Cleanup v2.0.0 - Now Features File Encryption Protect your privacy! Encrypt your messages and files with a cryptographic strength of up to 256 bits before sending them to others!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CalPCS

    CalPCS

    A pitch class set analyzer.

    CalPCS is a free pitch class set calculator software. System requeriments: Java Runtime Environment 1.6 or above. Screen of at least 800x600px. Optional: A Java Sound Bank. The program displays for each set their normal order, classification, transposition, whether it is an inversion, prime form, interval vector and the invariant property.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Caesar Cipher Encrypter-Decrypter

    this program is a Caesar cipher encrypter and decrypter

    This Program is a Caeser Cipher Encrypter and Decrypter If you want to Encrypt a plain text, then press E or If you want to Decrypt a secret text, then press D If you choose to Encrypt, then you have to enter the Shift key Which will the shift each character by that key If you choose to Decrypt, then you can enter the shift key if you know it, or else you can choose to type 'all' which will give you all possible combinations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Simplest Text Encrypter

    A simple example of polyalphabetic cipher in Java.

    Cryptography fascinates everyone. A variety of encryption techniques and ciphers are used to code important data. A polyalphabetic cipher is one of the simplest cipher one can make. This is a Java program to implement polyalphabetic cipher. [How the cipher encodes?] Input Data: helloaf Key: love l - 12th letter in Alphabet o - 15th letter in Alphabet v - 22nd letter in Alphabet e - 5th letter in Alphabet Now: h(l) e(o) l(v) l(e) o(l) a(o) f(v) Further: h(+12) e(+15) l(+22) l(+5) o(+12) a(+15) f(+22) where +(number) meaning shifting the character forward by the respective number of places. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Substitution Cipher Decryption

    Decrypt messages encrypted with a substitution cipher

    The provided program helps the user with the deciphering of a substitution cipher with the 26 letter alphabet by providing the following features • Dynamic entering of ciphertext. Ciphertext can be modified at any point of the process. • Easy location of corresponding characters in the ciphertext and the substituted text by selection. • Fast frequency analysis for single letters, bigrams, trigrams and quadgrams (more N -grams can be made available by adding a single line of code)...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    Simple, lightweight, cross-platform (Windows / Linux / ARM6 Linux), cross-arch (x32 / x64), standalone command line file encryption program. GnuPG is probably the best application for cross-platform encryption. However, its usage on Windows PCs may be inconvenient (installation administrator rights; large executable size for perhaps just a one-time file decryption, complicated command-line switches for stronger encryption). NCrypt would fulfill this task, but does not operate on 64-bit...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Net Send

    Net Send

    Net Send is an Encryped Communications Program

    Written in Python, Net Send features a current two way chat dialogue that features a customizable encryption system. Users can change what their output is encrypted as before communicating. This eliminates issues with having to develop sophisticated encryptions tha risk being cracked.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    vigenere.py

    vigenere.py

    this simple program implements the Vigenere cipher in python

    For details of this cipher see; http://en.wikipedia.org/wiki/Vigenere_cipher This cipher can be broken by frequency analysis, this is a toy project, and should not be used in situations where security is important.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Cipher / Decipher 2.0

    Cipher and Decipher Messages

    this program allows you to create ciphered messages from a X number of switched letters, using 2 key words. example: key words: abcde fghij the message "cipher" becomes "hdpcjr", by replacing all occurrences from the letters in keyword 1 to the keyword2 all occurrences of "a" becomes "h" and vice-versa, "b becomes "g"....and so on.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    AlphaPeeler is a crypto educational tool. It includes frequency analysis, mono-alphabetic substitution, Caesar, transposition, Vigenere, & Playfair cipher. Professional features are: DES, Gzip, MD5, SHA1, SHA256, RIPEMD-16, RSA, & secret share files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB