CT-Logo

 

Cryptological functions in different CrypTool versions

Email Print

Selection
Cryptographic category:
Additional search phrase:
CrypTool 1 (CT1)   CrypTool 2 (CT2)   JCrypTool (JCT)  CrypTool Online (CTO)

Function CT1 CT2 JCT CTO CT 1 Path CT 2 Path JCT Path CTO Path Category CT-Version
ADFGVX X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ ADFGVX… [C] Classic Ciphers\ ADFGVX
[T] Cryptography\ Classical\ ADFGVX Cipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ ADFGVX
[D] Algorithms\ Classic\ ADFGVX Ciphers\ ADFGVX 1) Classic Ciphers
Affine Cipher X Ciphers\ Multiplicative 1) Classic Ciphers
Alberti X Ciphers\ Alberti 1) Classic Ciphers
AMSCO X Ciphers\ AMSCO 1) Classic Ciphers
Atbash X Encrypt/Decrypt\ Symmetric (classic)\ Substitution / Atbash… 1) Classic Ciphers
Autokey Vigenère D X [D] Algorithms\ Classic\ Autokey Vigenère Ciphers\ Autokey 1) Classic Ciphers
Beaufort X Ciphers\ Beaufort 1) Classic Ciphers
Bifid D X [D] Algorithms\ Classic\ Bifid Ciphers\ Bifid 1) Classic Ciphers
Byte Addition X Encrypt/Decrypt\ Symmetric (classic)\ Byte Addition… 1) Classic Ciphers
Caesar X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Caesar / Rot-13… [C] Classic Ciphers\ Caesar
[T] Cryptography\ Classical\ CaesarCipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Caesar
[D] Algorithms\ Classic\ Caesar Ciphers\ Caesar / Rot-13 1) Classic Ciphers
Double Box D [D] Algorithms\ Classic\ Double Box 1) Classic Ciphers
Enigma C\T\W X [C] Classic Ciphers\ Enigma
[T] Cryptography\ Classical\ Enigma Cipher Machine
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Enigma
Ciphers\ Enigma 1) Classic Ciphers
Four Square X Ciphers\ Four-Square 1) Classic Ciphers
Freemason X Ciphers\ Freemason 1) Classic Ciphers
Gronsfeld X Ciphers\ Gronsfeld 1) Classic Ciphers
Hill X X Encrypt/Decrypt\ Symmetric (classic)\ Hill… Ciphers\ Hill 1) Classic Ciphers
Homophone X X Encrypt/Decrypt\ Symmetric (classic)\ Homophone… Ciphers\ Homophonic 1) Classic Ciphers
Kamasutra X Ciphers\ Kamasutra 1) Classic Ciphers
Larrabee X Ciphers\ Larrabee 1) Classic Ciphers
Lorenz SZ42 C [C] Classic Ciphers\ Lorenz SZ42 1) Classic Ciphers
M209 C\T [C] Classic Ciphers\ M209
[T] Cryptography\ Classical\ M209 Cipher Machine
1) Classic Ciphers
Navajo T X [T] Cryptography\ Classical\ Navajo Code Ciphers\ Navajo 1) Classic Ciphers
Nihilist C\T X [C] Classic Ciphers\ Nihilist
[T] Cryptography\ Classical\ Nihilist Cipher
Ciphers\ Nihilist 1) Classic Ciphers
Playfair X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Playfair… [C] Classic Ciphers\ Playfair
[T] Cryptography\ Classical\ Playfair Cipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Playfair
[D] Algorithms\ Classic\ Playfair Ciphers\ Playfair 1) Classic Ciphers
Pollux X Ciphers\ Pollux 1) Classic Ciphers
Polybius X Ciphers\ Polybius 1) Classic Ciphers
Porta X Ciphers\ Porta 1) Classic Ciphers
Purple C\T [C] Classic Ciphers\ Purple
[T] Cryptography\ Classical\ PURPLE Cipher Machine
1) Classic Ciphers
Rail Fence X X Encrypt/Decrypt\ Symmetric (classic)\ Scytale / Rail Fence… Ciphers\ Zigzag (Rail Fence) 1) Classic Ciphers
Rot-13 X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Caesar / Rot-13… [C] Classic Ciphers\ Caesar
[T] Cryptography\ Classical\ CaesarCipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Caesar
[D] Algorithms\ Classic\ Caesar Ciphers\ Caesar / Rot-13 1) Classic Ciphers
Rotation X Ciphers\ Rotation 1) Classic Ciphers
Scytale X C\T\W X Encrypt/Decrypt\ Symmetric (classic)\ Scytale / Rail Fence… [C] Classic Ciphers\ Scytale
[T] Cryptography\ Classical\ Scytale Cipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Scytale
Ciphers\ Scytale 1) Classic Ciphers
Solitaire X C\T Encrypt/Decrypt\ Symmetric (classic)\ Solitaire… [C] Classic Ciphers\ Solitaire
[T] Cryptography\ Classical\ Solitaire Cipher
1) Classic Ciphers
Spanish Strip Cipher C\T [C] Classic Ciphers\ Spanish Strip Cipher
[T] Cryptography\ Classical\ Spanish Strip Cipher
1) Classic Ciphers
Substitution X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Substitution / Atbash… [C] Classic Ciphers\ Substitution
[T] Cryptography\ Classical\ Substitution Cipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Substitution
[D] Algorithms\ Classic\ Substitution Ciphers\ Monoalphabetic Substitution 1) Classic Ciphers
T-310\50 C\T [C] Classic Ciphers\ T-310\50
[T] Cryptography\ Classical\ T310/50 Cipher Machine
1) Classic Ciphers
Templar X Ciphers\ Templar 1) Classic Ciphers
Transposition (Double Column) X C D Encrypt/Decrypt\ Symmetric (classic)\ Permutation / Transposition… [C] Classic Ciphers\ Transposition [D] Algorithms\ Classic\ Transposition 1) Classic Ciphers
Transposition (Single Column) X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Permutation / Transposition… [C] Classic Ciphers\ Transposition
[T] Cryptography\ Classical\ Transposition Cipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Transposition
[D] Algorithms\ Classic\ Transposition Ciphers\ Transposition 1) Classic Ciphers
Trithemius X Ciphers\ Trithemius 1) Classic Ciphers
Vernam X Encrypt/Decrypt\ Symmetric (classic)\ Vernam\ OTP… 1) Classic Ciphers
Vigenère X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Vigenère… [C] Classic Ciphers\ Vigenère
[T] Cryptography\ Classical\ Vigenère Cipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Vigenère
[D] Algorithms\ Classic\ Vigenère Ciphers\ Vigenère 1) Classic Ciphers
XOR X C\T\W D Encrypt/Decrypt\ Symmetric (classic)\ XOR… [C] Classic Ciphers\ XOR
[T] Cryptography\ Classical\ XOR Cipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ XOR
[D] Algorithms\ Classic\ XOR 1) Classic Ciphers
3DES X C\T A Encrypt/Decrypt\ Symmetric (modern)\ Triple DES… [C] Modern Ciphers\ Symmetric\ DES
[T] Cryptography\ Modern\ Symmetric\ DES Cipher
[A] Algorithms\ Block Ciphers\ DESede 2) Modern Ciphers
Achterbahn C\T [C] Modern Ciphers\ Symmetric\ Achterbahn
[T] Cryptography\ Modern\ Symmetric\ Achterbahn Cipher
2) Modern Ciphers
AES X C\T\W D\A X Encrypt/Decrypt\ Symmetric (modern)\ AES (CBC)...
Encrypt/Decrypt\ Symmetric (modern)\ AES (self extracting)…
[C] Modern Ciphers\ Symmetric\ AES
[T] Cryptography\ Modern\ Symmetric\ AES*
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ AES
[D] Algorithms\ Symmetric\ AES
[A] Algorithms\ Block Ciphers\ Rijndael
Highlights\ AES 2) Modern Ciphers
Camellia A [A] Algorithms\ Block Ciphers\ Camellia 2) Modern Ciphers
DES X C\T\W Encrypt/Decrypt\ Symmetric (modern)\ DES… [C] Modern Ciphers\ Symmetric\ DES
[T] Cryptography\ Modern\ Symmetric\ DES Cipher
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ DES
2) Modern Ciphers
DESL X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESL… 2) Modern Ciphers
DESX X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESX… 2) Modern Ciphers
DESXL X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESXL… 2) Modern Ciphers
Dragon D [D] Algorithms\ Symmetric\ Dragon 2) Modern Ciphers
Dynamic Group Keying (DGK) C [C] Modern Ciphers\ Asymmetric\ DGK 2) Modern Ciphers
ECC-AES X Encrypt/Decrypt\ Hybrid\ ECC-AES… 2) Modern Ciphers
ECIES A [A] Algorithms\ Hybrid Ciphers\ ECIES 2) Modern Ciphers
ElGamal D\A [D] Algorithms\ Asymmetric\ ElGamal
[A] Algorithms\ Asymmetric Block Ciphers\ ElGamal
2) Modern Ciphers
Enhanced RSA Crypto System (identities‚ multi-prime) D [D] Visuals\ Extended RSA Cryptosystem 2) Modern Ciphers
Grain v1 C\T [C] Modern Ciphers\ Symmetric\ Grain v1
[T] Cryptography\ Modern\ Symmetric\ Grain v1 Cipher
2) Modern Ciphers
HC128 C\T [C] Modern Ciphers\ Symmetric\ HC128
[T] Cryptography\ Modern\ Symmetric\ HC128 Cipher
2) Modern Ciphers
HIGHT C [C] Modern Ciphers\ Symmetric\ HIGHT 2) Modern Ciphers
IDEA X D\A Encrypt/Decrypt\ Symmetric (modern)\ IDEA… [D] Algorithms\ Symmetric\ IDEA
[A] Algorithms\ Block Ciphers\ IDEA
2) Modern Ciphers
LFSR C\T D [C] Protocols\ LFSR
[T] Mathematics\ Linear Feedback Shift Register (LFSR)
[D] Algorithms\ Symmetric\ LFSR 2) Modern Ciphers
MARS X A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ MARS… [A] Algorithms\ Block Ciphers\ MARS 2) Modern Ciphers
McEliece Fujisaki A [A] Algorithms\ Hybrid Ciphers\ McElieceFujisakiCipher 2) Modern Ciphers
McEliece Kobara Imai A [A] Algorithms\ Hybrid Ciphers\ McElieceKobaraImaiCipher 2) Modern Ciphers
McEliece PKCS A [A] Algorithms\ Asymmetric Block Ciphers\ McEliecePKCS 2) Modern Ciphers
McEliece Pointcheval A [A] Algorithms\ Hybrid Ciphers\ McEliecePointchevalCipher 2) Modern Ciphers
MeRSA A [A] Algorithms\ Asymmetric Block Ciphers\ MeRSA 2) Modern Ciphers
Mickey 2 C\T [C] Modern Ciphers\ Symmetric\ Mickey 2
[T] Cryptography\ Modern\ Symmetric\ Mickey2 Cipher
2) Modern Ciphers
Misty-1 (Kasumi) A [A] Algorithms\ Block Ciphers\ Misty1 2) Modern Ciphers
MpRSA D\A [D] Visuals\ Extended RSA Cryptosystem
[A] Algorithms\ Asymmetric Block Ciphers\ MpRSA
2) Modern Ciphers
Niederreiter A [A] Algorithms\ Asymmetric Block Ciphers\ Niederreiter 2) Modern Ciphers
NLFSR C\T [C] Protocols\ NLFSR
[T] Mathematics\ Non-Linear Feedback Shift Register (NLFSR)
2) Modern Ciphers
Paillier Cryptosystem C\T [C] Modern Ciphers\ Asymmetric\ Paillier
[T] Cryptography\ Modern\ Asymmetric\ Paillier*
2) Modern Ciphers
PRESENT C\T [C] Modern Ciphers\ Symmetric\ PRESENT
[T] Cryptography\ Modern\ Symmetric\ PRESENT Cipher
2) Modern Ciphers
Rabbit C\T [C] Modern Ciphers\ Symmetric\ Rabbit
[T] Cryptography\ Modern\ Symmetric\ Rabbit Cipher
2) Modern Ciphers
RC2 X C\T\W A Encrypt/Decrypt\ Symmetric (modern)\ RC2… [C] Modern Ciphers\ Symmetric\ RC2
[T] Cryptography\ Modern\ Symmetric\ RC2 Cipher
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ RC2
[A] Algorithms\ Block Ciphers\ RC2 2) Modern Ciphers
RC4 X C\T Encrypt/Decrypt\ Symmetric (modern)\ RC4… [C] Modern Ciphers\ Symmetric\ RC4
[T] Cryptography\ Modern\ Symmetric\ RC4 Cipher
2) Modern Ciphers
RC5 A [A] Algorithms\ Block Ciphers\ RC5 2) Modern Ciphers
RC6 X D\A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ RC6… [D] Algorithms\ Symmetric\ RC6
[A] Algorithms\ Block Ciphers\ RC6
2) Modern Ciphers
Rijndael C\T [C] Modern Ciphers\ Symmetric\ AES
[T] Cryptography\ Modern\ Symmetric\ AES*
2) Modern Ciphers
RSA X C\T\W D\A Encrypt/Decrypt\ Asymmetric\ RSA
Indiv. Procedures\ RSA Cryptosystem\
[C] Modern Ciphers\ Asymmetric\ RSA
[T] Cryptography\ Modern\ Asymmetric\ RSA*
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Asymmetric Encryption/Decryption\ RSA
[D] Algorithms\ Asymmetric\ RSA
Algorithms\ Asymmetric Block Ciphers\ RSA_PKCS1_v1_5
[A] Algorithms\ Asymmetric Block Ciphers\ RSA_PKCS1_v2_1
2) Modern Ciphers
RSA-AES X Encrypt/Decrypt\ Hybrid\ RSA-AES… 2) Modern Ciphers
SAFER+ A [A] Algorithms\ Block Ciphers\ SAFER+ 2) Modern Ciphers
SAFER++ A [A] Algorithms\ Block Ciphers\ SAFER++ 2) Modern Ciphers
Salsa20 C\T [C] Modern Ciphers\ Symmetric\ Salsa20
[T] Cryptography\ Modern\ Symmetric\ Salsa20 Cipher
2) Modern Ciphers
Serpent X A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ Serpent… [A] Algorithms\ Block Ciphers\ Serpent 2) Modern Ciphers
SHA-3 (Keccak) Streamcipher T [T] Cryptography\ Modern Ciphers\ Symmetric\ Keccak Streamcipher 2) Modern Ciphers
Shacal A [A] Algorithms\ Block Ciphers\ Shacal 2) Modern Ciphers
Shacal2 A [A] Algorithms\ Block Ciphers\ Shacal2 2) Modern Ciphers
Simplified DES C\T\W [C] Modern Ciphers\ Symmetric\ SDES
[T] Cryptography\ Modern\ Symmetric\ SDES Cipher
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ SDES
2) Modern Ciphers
Sosemanuk C\T [C] Modern Ciphers\ Symmetric\ Sosemanuk
[T] Cryptography\ Modern\ Symmetric\ Sosemanuk Cipher
2) Modern Ciphers
TEA C\T\W [C] Modern Ciphers\ Symmetric\ TEA
[T] Cryptography\ Modern\ Symmetric\ TEA Cipher
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ TEA
2) Modern Ciphers
Trivium C [C] Modern Ciphers\ Symmetric\ Trivium 2) Modern Ciphers
Twofish X C\T\W A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ Twofish… [C] Modern Ciphers\ Symmetric\ Twofish
[T] Cryptography\ Modern\ Symmetric\ Twofish Cipher
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ Twofish
[A] Algorithms\ Block Ciphers\ Twofish 2) Modern Ciphers
Wired Equivalent Privacy (WEP) C [C] Protocols\ WEP Protocol 2) Modern Ciphers
XML Security D [D] Algorithms\ XML Security\ 2) Modern Ciphers
CBC MACs A [A] Algorithms\ Message Authentication Codes\ CBCMac\ 3) Hash and MAC Algorithms
Cipher-Based MACs (CMAC) A [A] Algorithms\ Message Authentication Codes\ CMac\ 3) Hash and MAC Algorithms
CRC-1/Partiy C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-10 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-11 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-12/3GPP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-12/DECT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-14/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-15 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-15/MPT1327 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/AUG-CCITT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/BUYPASS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/CCITT-FALSE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DDS-110 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DECT-R C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DECT-X C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DNP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/EN-13757 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/GENIBUS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/IBM-SDLC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/MAXIM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/MCRF4XX C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/RIELLO C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/T10-DIF C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/TELEDISK C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/TMS37157 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/USB C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/FLEXRAY-A C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/FLEXRAY-B C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/OPENPGP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-3/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-31/PHILIPS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/BZIP2 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/MPEG-2 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/POSIX C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32C C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32D C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32Q C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-4/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-40/GSM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/EPC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/USB C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-6/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-6/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/1B C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/Jones C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/WE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-7 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-7/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/CCITT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/EBU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/I-CODE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/J1850 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/MAXIM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/WCDMA C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-A C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
FORK-256 A [A] Algorithms\ Message Digests\ FORK256 3) Hash and MAC Algorithms
Hash Value of a File X D\A Indiv. Procedures\ Hash\ Hash Value of a File… [D] Hash\MD5
[D] Hash\SHA
[D] Hash\SHA3-Candidates
[A] Messages Digests\
3) Hash and MAC Algorithms
HMACs X C\T D\A Indiv. Procedures\ Hash\ Generation of HMACs… [C] Protocols\ HMAC
[T] Hash Functions\ HMAC
[D] Algorithms\ MAC\ HMacMD5
[A] Algorithms\ Message Authentication Codes\ Hmac\
3) Hash and MAC Algorithms
JAMCRC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
KERMIT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
Key Generation from Password (PKCS#5) X Indiv. Procedures\ Hash\ Key Generation from Password (PKCS #5)… 3) Hash and MAC Algorithms
MD2 X Indiv. Procedures\ Hash\ MD2 3) Hash and MAC Algorithms
MD4 X A Indiv. Procedures\ Hash\ MD4 [A] Algorithms\ Message Digests\ MD4 3) Hash and MAC Algorithms
MD5 X C\T\W D\A Indiv. Procedures\ Hash\ MD5 [C] Hash Functions\ MD5
[T] Hash Functions\ MD5
[W] Start\ Hash Functions\ MD5
[D] Algorithms\ Hash\ MD5
[A] Algorithms\ Message Digests\ MD5
3) Hash and MAC Algorithms
MODBUS C [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
Password Store Using Salted SHA-1 T [T] Hash Functions\ Password store using salted SHA-1 3) Hash and MAC Algorithms
Password Verification Using Salted SHA-1 T [T] Hash Functions\ Password verification using salted SHA-1 3) Hash and MAC Algorithms
PKCS#5 C A [C] Hash Functions\ PKCS#5 [A] Algorithms\ Password-Based Ciphers\ 3) Hash and MAC Algorithms
RIPEMD-160 X C\T\W A Indiv. Procedures\ Hash\ RIPEMD-160 [C] Hash Functions\ RIPEMD160
[T] Hash Functions\ RIPEMD160
[W] Start\ Hash Functions\ RIPEMD160
[A] Algorithms\ Message Digests\ RIPEMD 3) Hash and MAC Algorithms
SHA-1 X C\T\W A Indiv. Procedures\ Hash\ SHA-1 [C] Hash Functions\ SHA
[T] Hash Functions\ SHA1
[W] Start\ Hash Functions\ SHA-1
[A] Algorithms\ Message Digests\ SHA 3) Hash and MAC Algorithms
SHA-256 X C\T\W D\A Indiv. Procedures\ Hash\ SHA-256 [C] Hash Functions\ SHA
[T] Hash Functions\ SHA256
[W] Start\ Hash Functions\ SHA-256
[D] Algorithms\ Hash\ SHA
[A] Algorithms\ Message Digests\ SHA256
3) Hash and MAC Algorithms
SHA-3 Candidates D [D] Algorithms\ Hash\ SHA3 Candidates 3) Hash and MAC Algorithms
SHA-3 (Keccak) C\T [C] Hash Functions\ Keccak
[T] Hash Functions\ Keccak Hash (SHA-3)
3) Hash and MAC Algorithms
SHA-384 C A [C] Hash Functions\ SHA [A] Algorithms\ Message Digests\ SHA384 3) Hash and MAC Algorithms
SHA-512 X C A Indiv. Procedures\ Hash\ SHA-512 [C] Hash Functions\ SHA [A] Algorithms\ Message Digests\ SHA512 3) Hash and MAC Algorithms
Tiger C\T\W A [C] Hash Functions\ Tiger
[T] Hash Functions\ Tiger
[W] Start\ Hash Functions\ Tiger
[A] Algorithms\ Message Digests\ Tiger 3) Hash and MAC Algorithms
Two-Track MAC A [A] Algorithms\ Message Authentication Codes\ TwoTrackMac\ 3) Hash and MAC Algorithms
VSH A [A] Algorithms\ Message Digests\ VSH 3) Hash and MAC Algorithms
Whirlpool C\T\W [C] Hash Functions\ Whirlpool
[T] Hash Functions\ Whirlpool
[W] Start\ Hash Functions\ Whirlpool
3) Hash and MAC Algorithms
XFER C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
XMODEM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CMSS A [A] Algorithms\ Signatures\ CMSSSignature\ 4) Digital Signatures/PKI
Display/Export Keys X Digital Signatures/PKI\ Display/Export Keys… 4) Digital Signatures/PKI
DSA X D\A Digital Signatures/PKI\ Sign Document...\ DSA [D] Algorithms\ Signature\ DSA
[A] Algorithms\ Signatures\ DSASignature\
4) Digital Signatures/PKI
ECDSA X A Digital Signatures/PKI\ Sign Document...\ ECSP-DSA [A] Algorithms\ Signatures\ ECDSASignature\ 4) Digital Signatures/PKI
ECNR X A Digital Signatures/PKI\ Sign Document...\ ECSP-NR [A] Algorithms\ Signatures\ SHA1\ECNR 4) Digital Signatures/PKI
Extract Signature X Digital Signatures/PKI\ Extract Signature… 4) Digital Signatures/PKI
Generate/Import Keys X Digital Signatures/PKI\ Generate/Import Keys… 4) Digital Signatures/PKI
GMSS A [A] Algorithms\ Signatures\ GMSSSignature\ 4) Digital Signatures/PKI
IQDSA A [A] Algorithms\ Signatures\ IQDSASignature\ 4) Digital Signatures/PKI
IQGQ A [A] Algorithms\ Signatures\ IQGQSignature\ 4) Digital Signatures/PKI
IQRDSA A [A] Algorithms\ Signatures\ IQRDSASignature\ 4) Digital Signatures/PKI
Merkle OTS A [A] Algorithms\ Signatures\ MerkleOTSSignature\ 4) Digital Signatures/PKI
Niederreiter CFS A [A] Algorithms\ Signatures\ NiederreiterCFS 4) Digital Signatures/PKI
RSASSA-PSS A [A] Algorithms\ Signatures\ RSASSA-PSS 4) Digital Signatures/PKI
SSL (MD5 and SHA1 with RSA) A [A] Algorithms\ Signatures\ SHA1\ SSL_MD5andSHA1withRSA 4) Digital Signatures/PKI
Verify Signature X Digital Signatures/PKI\ Verify Signature… 4) Digital Signatures/PKI
Blum Blum Shub (B.B.S.) (PRNG) A [A] Algorithms\ Pseudo Random Number Generators\ BBSRandom 5) Random Number Generators
Elliptic Curve (PRNG) A [A] Algorithms\ Pseudo Random Number Generators\ ECPRNG 5) Random Number Generators
Inverse Congruence Generator (ICG) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
Linear Congruence Generator (LCG) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
Secude Library Random Number Generator X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
SHA-1 (PRNG) D\A [D] Algorithms\ Random Number Generator\ SHA1
[A] Algorithms\ Pseudo Random Number Generators\ SHA1PRNG
5) Random Number Generators
SHA-3 (Keccak) (PRNG) T [T] Tools\ Keccak PRNG 5) Random Number Generators
X^2 (mod N) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
ADFGVX Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ ADFGVX… 6) Classic Cryptanalysis
Autocorrelation X C X Analysis\ Tools for Analysis\ Autocorrelation [C] Cryptanalysis\ Generic\ AutokorrelationFunction Cryptanalysis\ Autocorrelation 6) Classic Cryptanalysis
Byte Addition Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Byte Addition 6) Classic Cryptanalysis
Caesar Analysis X C\T\W Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Caesar [C] Cryptanalysis\ Specific\ CaesarAnalyser
[T] Cryptanalysis\ Classical\ Caesar*
[W] Start\ Cryptanalysis\ Classic Encryption\ Caesar
6) Classic Cryptanalysis
Dictionary Search C\T [C] Cryptanalysis\ Generic\ Contains
[T] Hash Functions\ Dictionary Attack
6) Classic Cryptanalysis
Enigma Attacker C\T\W [C] Cryptanalysis\ Specific\ Enigma
[T] Cryptanalysis\ Classical\ Enigma Analysis
[W] Start\ Cryptanalysis\ Classic Encryption\ Enigma
6) Classic Cryptanalysis
Entropy X C D Analysis\ Tools for Analysis\ Entropy [C] Cryptanalysis\ Generic\ Cost Function [D] Analysis\ Entropy Analysis 6) Classic Cryptanalysis
Frequency Test X C\T D X Analysis\ Analyze Randomness\ Frequency Test...
Analysis\ Tools for Analysis\ Floating Frequency
[C] Cryptanalysis\ Generic\ Frequency Test
[T] Cryptanalysis\ Classical\ Frequency Analysis
[D] Analysis\ Frequency Analysis Cryptanalysis\ Frequency Analysis 6) Classic Cryptanalysis
Friedman Test C D [C] Cryptanalysis\ Generic\ Friedman Test [D] Analysis\ Friedman Test 6) Classic Cryptanalysis
Hill Analysis X Analysis\ Symmetric encryption (classic)\ Known Plaintext\ Hill… 6) Classic Cryptanalysis
Histogram X Analysis\ Tools for Analysis\ Histogram 6) Classic Cryptanalysis
Kasiski Test C [C] Cryptanalysis\ Generic\ Kasiski Test 6) Classic Cryptanalysis
Monoalphabetic Substitution T [T] Cryptanalysis\ Classical\ AnalysisMonoalphabeticSubstitution 6) Classic Cryptanalysis
N-Gram Analysis X X Analysis\ Tools for Analysis\ N-Gram… Cryptanalysis\ N-Gram Analysis 6) Classic Cryptanalysis
Periodicity Analysis X Analysis\ Tools for Analysis\ Periodicity 6) Classic Cryptanalysis
Playfair Analysis X Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Playfair… 6) Classic Cryptanalysis
Runs Test X Analysis\ Analyze Randomness\ Runs Test… 6) Classic Cryptanalysis
Scytale Analysis T\W [T] Cryptanalysis\ Scytale Brute-force Analysis
[W] Start\ Cryptanalysis\ Classic Encryption\ Scytale
6) Classic Cryptanalysis
Solitaire Analysis X C\T Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Solitaire...
Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Solitaire…
[C] Cryptanalysis\ Specific\ SolitaireAnalyser
[T] Cryptanalysis\ Classical\ Solitaire Brute-force Analysis
6) Classic Cryptanalysis
Stream Comparison C [C] Tools\ Misc\ Stream Comparator 6) Classic Cryptanalysis
Substitution Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Substitution...
Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Substitution…
6) Classic Cryptanalysis
Transposition Analysis X C\T\W D Analysis\ Symmetric Encryption (classic)\ Known Plaintext\ Single Column Transposition… [C] Cryptanalysis\ Misc\ Transposition Analyzer
[T] Cryptanalysis\ Classical\ Transposition*
[W] Start\ Cryptanalysis\ Classic Encryption\ Transposition
[D] Analysis\ Transposition Analysis 6) Classic Cryptanalysis
Vernam Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ XOR / Vernam 6) Classic Cryptanalysis
Vigenère Analysis X C\T\W D X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Vigenère
Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Vigenère (Analysis according to Schroedel)…
[C] Cryptanalysis\ Statistics\ VignereAutokeyAnalyser
[T] Cryptanalysis\ Classical\ Vigenère Analysis
[W] Start\ Cryptanalysis\ Classic Encryption\ Vigenère
[D] Analysis\ Vigenère Breaker Cryptanalysis\ Break Vigenère 6) Classic Cryptanalysis
Word Pattern Analysis C\T [C] Cryptanalysis\ Generic\ Word Patterns
[T] Cryptanalysis\ Classical\ Wordpattern*
6) Classic Cryptanalysis
3DES Brute-Force Attack X C\T Analysis\ Symmetric Encryption (modern)\ Triple DES… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
7) Modern Cryptanalysis
AES Brute-Force Attack X C\T\W Analysis\ Symmetric Encryption (modern)\ AES (CBC)… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ AES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ AES*
7) Modern Cryptanalysis
Berlekamp-Massey Algorithm C\T [C] Cryptanalysis\ Generic\ Berlekamp-Massey Algorithm
[T] Mathematics\ Berlekamp-Massey
7) Modern Cryptanalysis
Bit Commitment Scheme C\T [C] Protocols\ BitCommitmentScheme
[T] Mathematics\ ISAP Bit Commitment Scheme
7) Modern Cryptanalysis
Cost Function C [C] Cryptanalysis\ Generic\ CostFunction 7) Modern Cryptanalysis
Cube Attack C\T [C] Cryptanalysis\ Specific\ Cube Attack
[T] Cryptanalysis\ Modern\ Cube Attack on Trivium
7) Modern Cryptanalysis
DES Brute-Force Attack X C\T\W Analysis\ Symmetric Encryption (modern)\ DES… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ DES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ DES*
7) Modern Cryptanalysis
DESL Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESL… 7) Modern Cryptanalysis
DESX Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESX… 7) Modern Cryptanalysis
DESXL Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESXL… 7) Modern Cryptanalysis
Discrete Logarithm C\T [C] Cryptanalysis\ Generic\ Discrete Logarithm
[T] Mathematics\ Discrete Logarithm
7) Modern Cryptanalysis
FIPS PUB-140-1 X Analysis\ Analyze Randomness\ FIPS PUB-140-1 Test Battery 7) Modern Cryptanalysis
General Number Field Sieve (GNFS) C\T [C] Cryptanalysis\ Generic\ General Number Field Sieve
[T] Mathematics\ Factorization with General Number Field Sieve (GNFS)
7) Modern Cryptanalysis
Hash Collisions X Analysis\ Hash\ Attack on the Hash Value of the Digital Signature… 7) Modern Cryptanalysis
IDEA Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ IDEA… 7) Modern Cryptanalysis
MARS Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ MARS… 7) Modern Cryptanalysis
MD5 Collisions C\T\W [C] Hash Functions\ MD5 Collider
[T] Hash Functions\ MD5 Collision Finder
[W] Start\ Cryptanalysis\ Modern Encryption\ Hash Functions\ MD5
7) Modern Cryptanalysis
Padding Oracle C [C] Tools\ Misc\ Padding Oracle 7) Modern Cryptanalysis
Padding Oracle Attack against AES T [T] Cryptanalysis\ Modern\ PaddingOracleAttackAES 7) Modern Cryptanalysis
Padding Oracle Attack against DES T [T] Cryptanalysis\ Modern\ PaddingOracleAttackDES 7) Modern Cryptanalysis
Poker Test X Analysis\ Analyze Randomness\ Poker Test… 7) Modern Cryptanalysis
Quadratic Sieve (QS) C\T [C] Cryptanalysis\ Generic\ Quadratic Sieve (QS)
[T] Mathematics\ Factorization with Quadratic Sieve
7) Modern Cryptanalysis
RC2 Brute-Force Attack X C Analysis\ Symmetric Encryption (modern)\ RC2… [C] Cryptanalysis\ Specific\ KeySearcher 7) Modern Cryptanalysis
RC4 Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ RC4… 7) Modern Cryptanalysis
RC6 Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ RC6… 7) Modern Cryptanalysis
RSA Attacks X W Analysis\ Asymmetric Encryption\ Lattice-Based Attacks on RSA...\
Analysis\ Asymmetric Encryption\ Side-Channel Attack on "Textbook RSA"…
[W] Start\ Cryptanalysis\ Modern Encryption\ Asymmetric Encryption\ RSA 7) Modern Cryptanalysis
Serial Test X Analysis\ Analyze Randomness\ Serial Test… 7) Modern Cryptanalysis
SDES Brute-Force Attack C\T\W [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ SDES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ SDES*
7) Modern Cryptanalysis
Serpent Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ Serpent… 7) Modern Cryptanalysis
Twofish Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ Twofish… 7) Modern Cryptanalysis
Vitányi Analysis X Analysis\ Analyze Randomness\ Vitányi 7) Modern Cryptanalysis
WEP Attack C\T [C] Protocols\ Attacks on the WEP protocol
[T] Protocols\ WEP Attack
7) Modern Cryptanalysis
Insertion Steganography C\T [C] Steganography\ Insertion Steganography
[T] Steganography\ Steganography Insertion*
8) Steganography
Least Significant Bit (LSB) C\T [C] Steganography\ LSB Steganography\
[T] Steganography\ Steganography Least Significant Bit*
8) Steganography
Permutation Steganography C\T [C] Steganography\ Permutation Steganography
[T] Steganography\ Steganography Permutation*
8) Steganography
ASCII W X [W] Start\ Tools\ Encoding Codings\ ASCII 9) Codings
ASN.1 X Indiv. Procedures\ Tools\ Codes\ Decode ASN.1 Code of a Document 9) Codings
Bacon X Codings\ Bacon 9) Codings
Barcode Generator X Codings\ Barcode Generator 9) Codings
Base 64 Decode X W X Indiv. Procedures\ Tools\ Codes\ Base64 Encode/Decode\ Base64 Decode [W] Start\ Tools\ Encoding Codings\ Base64 9) Codings
Base 64 Encode X W X Indiv. Procedures\ Tools\ Codes\ Base64 Encode/Decode\ Base64 Encode [W] Start\ Tools\ Encoding Codings\ Base64 9) Codings
Code 39 X Codings\ Code39 9) Codings
Huffman D X [D] Visuals\ Huffman Coding Codings\ Huffman 9) Codings
Morse Code X Codings\ Morse code 9) Codings
Unzip X Indiv. Procedures\ Tools\ Compress\ UnZip 9) Codings
UU Decode X Indiv. Procedures\ Tools\ Codes\ UU Encode/Decode\ UU Decode 9) Codings
UU Encode X Indiv. Procedures\ Tools\ Codes\ UU Encode/Decode\ UU Encode 9) Codings
Visual Decoder C [C] Tools\ Misc\ Visual Decoder 9) Codings
Visual Encoder C [C] Tools\ Misc\ Visual Encoder 9) Codings
Zip X Indiv. Procedures\ Tools\ Compress\ Zip 9) Codings
AES Visualization X Indiv. Procedures\ Visualization of Algorithms\ AES\ 10) Learning Aids and Visualizations
Android Unlock Pattern (AUP) Visualization D [D] Visuals\ Android Unlock Pattern (AUP) 10) Learning Aids and Visualizations
Ant Colony Optimization Visualization D [D] Visuals\ Ant Colony Optimization 10) Learning Aids and Visualizations
Authentication Methods in Networks Visualization X Indiv. Procedures\ Protocols\ Network Authentication… 10) Learning Aids and Visualizations
BB84 Key Exchange T [T] Protocols\ BB84 Key Exchange 10) Learning Aids and Visualizations
BB84 Key Exchange with Eavesdropping Attack T [T] Protocols\ BB84 Key Exchange with eavesdropping attack 10) Learning Aids and Visualizations
Caesar Visualization X Indiv. Procedures\ Visualization of Algorithms\ Caesar… 10) Learning Aids and Visualizations
Chinese Remainder Theorem Visualization X D Indiv. Procedures\ Chinese Remainder Theorem Applications\ [D] Visuals\ Chinese Remainder Theorem 10) Learning Aids and Visualizations
Coin Flipping Protocol T [T] Protocols\ Coin Flipping Protocol 10) Learning Aids and Visualizations
DES Visualization X Indiv. Procedures\ Visualization of Algorithms\ DES… 10) Learning Aids and Visualizations
Differential Power Analysis Visualization D [D] Visuals\ Differential Power Analysis\ Double and Add 10) Learning Aids and Visualizations
Diffie-Hellman Key Exchange (Perfect Forward Secrecy) Visualization X D Indiv. Procedures\ Protocols\ Diffie-Hellman Demonstration… [D] Visuals\ Diffie-Hellman Key Exchange (EC) 10) Learning Aids and Visualizations
Digital Signatures Visualization X D Digital Signatures\PKI\ Signature Demonstration (Signature Generation)…
Indiv. Procedures\ RSA Cryptosystem\ Signature Demonstration (Signature Generation)…
[D] Visuals\ Signature Demonstration 10) Learning Aids and Visualizations
Dining Cryptographers Protocol T [T] Protocols\ Dining Cryptographers Protocol 10) Learning Aids and Visualizations
ElGamal Visualization D [D] Visuals\ ElGamal Cryptosystem 10) Learning Aids and Visualizations
Elliptic Curve Calculations Visualization X D Indiv. Procedures\ Number Theory - Interactive\ Point Addition on Elliptic Curves… [D] Visuals\ Elliptic Curve Calculations 10) Learning Aids and Visualizations
Enigma Visualization X C Indiv. Procedures\ Visualization of Algorithms\ Enigma… [C] Classic Ciphers\ Enigma 10) Learning Aids and Visualizations
Extended Euclidian plus the method of mutual "exhaustion" (anthyphairesis = continually subtract the smaller from the larger) Visualization D [D] Visuals\ Extended Euclidian 10) Learning Aids and Visualizations
Feige Fiat Shamir Visualization D [D] Visuals\ Feige Fiat Shamir 10) Learning Aids and Visualizations
Fiat Shamir Visualization D [D] Visuals\ Fiat Shamir 10) Learning Aids and Visualizations
Graph Isomorphism Visualization D [D] Visuals\ Graph Isomorphism 10) Learning Aids and Visualizations
Grille Visualization D [D] Visuals\ Grille 10) Learning Aids and Visualizations
Hash Algorithms Visualization X Indiv Procedures\ Hash\ Hash Demonstration… 10) Learning Aids and Visualizations
Homomorphic Encryption Visualization C\T D [C] Modern Ciphers\ Asymmetric\ Paillier
[T] Cryptography\ Modern\ Asymmetric\ Pailier*
[D] Visuals\ Homomorphic Encryption 10) Learning Aids and Visualizations
Inner States of the DES Visualization D [D] Visuals\ Inner States of the Data Encryption Standard (DES) 10) Learning Aids and Visualizations
Kleptography Visualization D [D] Visuals\ Kleptography 10) Learning Aids and Visualizations
Lattice-Based Cryptosystems - GGH Crypto Tutorials\ Cryptography\ GGH 10) Learning Aids and Visualizations
Lattice-Based Cryptosystems - LWE Crypto Tutorials\ Cryptography\ LWE 10) Learning Aids and Visualizations
Lattice-Based Attacks - Merkle-Hellman Crypto Tutorials\ Cryptanalysis\ Attack on Merkle-Hellmann Knapsack 10) Learning Aids and Visualizations
Lattice-Based Attacks - RSA Crypto Tutorials\ Cryptanalysis\ Attack on RSA (Coppersmith's Attack) 10) Learning Aids and Visualizations
Lattice-Based Problems - Shortest Vector Problem (SVP) - Gauss Crypto Tutorials\ Shortest Vector Problem\ Gauss algorithm 10) Learning Aids and Visualizations
Lattice-Based Problems - Shortest Vector Problem (SVP) - LLL Crypto Tutorials\ Shortest Vector Problem\ LLL algorithm 10) Learning Aids and Visualizations
Lattice-Based Problems - Closest Vector Problem (CVP) Crypto Tutorials\ Closest Vector Problem\ Find closest vector 10) Learning Aids and Visualizations
Magic Door Visualization D [D] Visuals\ Magic Door 10) Learning Aids and Visualizations
Matrix Screensaver Visualization X Highlights\ Matrix Screensaver 10) Learning Aids and Visualizations
Multipartite Key Exchange Visualization D [D] Visuals\ Multipartite Key Exchange 10) Learning Aids and Visualizations
Network Receiver C [C] Tools\ Data input/output\ Network Receiver 10) Learning Aids and Visualizations
Network Sender C [C] Tools\ Data input/output\ Network Sender 10) Learning Aids and Visualizations
Nihilist Visualization X Indiv. Procedures\ Visualization of Algorithms\ Nihilist… 10) Learning Aids and Visualizations
Number Theory X N Indiv. Procedures\ Number Theory - Interactive\ [N] Crypto Tutorials\ World of Primes\ Number theory\ Powering
[N] Crypto Tutorials\ World of Primes\ Number theory\ Number-theoretic functions
[N] Crypto Tutorials\ World of Primes\ Number theory\ Primitive roots
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Goldbach's conjecture
10) Learning Aids and Visualizations
Oblivious Transfer Protocol T [T] Protocols\ Oblivious Transfer Protocol (1 out of n) 10) Learning Aids and Visualizations
Password Quality Visualization X T\W X Indiv. Procedures\ Tools\ Password Quality Meter...
Indiv. Procedures\ Tools\ Password Entropy...
[T] Tools\ Password Strength
[W] Start\ Tools\ Password Strength
Highlights\ Password Check 10) Learning Aids and Visualizations
PKCS#1 Attack (Bleichenbacher) Visualization N [N] Crypto Tutorials\ Attack on PKCS#1\ Attacks on PKCS#1\ Bleichenbacher attack 10) Learning Aids and Visualizations
PKCS#1 Attack (Kuehn) Visualization N [N] Crypto Tutorials\ Attack on PKCS#1\ Attacks on PKCS#1\ Attack with shorter keys (Kuehn) 10) Learning Aids and Visualizations
PRESENT Visualization C [C] Modern Ciphers\ Symmetric\ PRESENT 10) Learning Aids and Visualizations
Public-Key Infrastructure D [D] Visuals\ Public-Key Infrastructure 10) Learning Aids and Visualizations
Randomness Visualization X Analysis\ Analyze Randomness\ 3D Visualization… 10) Learning Aids and Visualizations
RSA Visualization X D Indiv. Procedures\ RSA Cryptosystem\ [D] Visuals\ RSA Cryptosystem 10) Learning Aids and Visualizations
SAT Solver C\T [C] Tools\ Misc\ SAT Solver
[T] Mathematics\ SAT Solver
10) Learning Aids and Visualizations
Secure Email (S/MIME) Visualization X Indiv. Procedures\ Protocols\ Secure E-Mail with S/MIME… 10) Learning Aids and Visualizations
Shamir's Secret Sharing Visualization X D Indiv. Procedures\ Secret Sharing Demonstration (Shamir)… [D] Visuals\ Shamir's Secret Sharing 10) Learning Aids and Visualizations
Signatur Verification D [D] Visuals\ Signatur-Verifikation 10) Learning Aids and Visualizations
Simple Power Analysis Visualization D [D] Visuals\ Simple Power Analysis\ Square and Multiply 10) Learning Aids and Visualizations
Solving Discrete Logarithm with Babystep-Giantstep D [D] Visuals\ Shanks Babystep-Giantstep 10) Learning Aids and Visualizations
SSL/TLS Handshake D [D] Visuals\ SSL/TLS Handshake 10) Learning Aids and Visualizations
Verifiable Secret Sharing (VSS) Visualization D [D] Visuals\ Verifiable Secret Sharing 10) Learning Aids and Visualizations
Vigenère Visualization X Indiv. Procedures\ Visualization of Algorithms\ Vigenère… 10) Learning Aids and Visualizations
Virtual Smartcard C\T [C] Protocols\ Smartcard
[T] Protocols\ Communication with a SmartCard
10) Learning Aids and Visualizations
Viterbi Visualization D [D] Visuals\ Viterbi 10) Learning Aids and Visualizations
Yao's Millionaire Problem T [T] Protocols\ Yao's Millionaire Problem 10) Learning Aids and Visualizations
Zero Knowledge Protocol T [T] Protocols\ Zero Knowledge Protocol 10) Learning Aids and Visualizations
Divider Game D [D] Games\ Divider Game 11) Games
Number Shark X D X Indiv. Procedures\ Educational Games\ Number Shark [D] Games\ Number Shark Highlights\ Taxman 11) Games
Sudoku Solver D [D] Games\ Sudoku Solver 11) Games
Zudo-Ku (Zero-Knowledge Proof) D [D] Games\ Zudo-Ku 11) Games
Prime Number Test X C\T\W\N Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ Miller-Rabin Test
Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ Solovay-Strassen test
Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ AKS test (deterministic procedure)
[C] Cryptanalysis\ Generic\ Prime Test
[T] Mathematics\ Primes Test
[W] Start\ Mathematical Functions\ Prime Operations\ Prime Number Test
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Sieve of Erastosthenes
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Miller-Rabin test
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Sieve of Atkin
12) Prime numbers
Prime Number Tutorial X N Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…
[N] Crypto Tutorials\ World of Primes 12) Prime numbers
Prime Distribution N [N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number line
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number grid
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number of primes
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Ulam's spiral
12) Prime numbers
Factorization of a Number X C\T\W\N Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Brute-force
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Brent
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Pollard
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Williams
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Lenstra
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Quadratic Sieve
[C] Cryptanalysis\ Generic\ Factorizer
[C] Cryptanalysis\ Generic\ Quadratic Sieve
[T] Mathematics\ Factorization with Trial Division (brute-force)
[T] Mathematics\ Factorization with General Number Field Sieve
[W] Start\ Mathematical Functions\ Prime Factorization
[N] Crypto Tutorials\ World of Primes\ Factorization\ Brute-force
[N] Crypto Tutorials\ World of Primes\ Quadratic Sieve
12) Prime numbers
Generation of Prime Numbers X C\T\W\N Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ Miller-Rabin Test
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ Solovay-Strassen Test
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ FermatTest
[C] Tools\ Data input/output\ Prime Generator
[T] Mathematics\ Primes Generator
[W] Start\ Mathematical Functions\ Prime Operations\ Prime Number Generation
[N] Crypto Tutorials\ World of Primes\ Generation of Primes\ Generation of Primes
12) Prime numbers
Authentication Methods in Networks Visualization X Indiv. Procedures\ Protocols\ Network Authentication… 13) Protocols
BB84 Key Exchange T [T] Protocols\ BB84 Key Exchange 13) Protocols
BB84 Key Exchange with Eavesdropping Attack T [T] Protocols\ BB84 Key Exchange with eavesdropping attack 13) Protocols
Bit Commitment Scheme C\T [C] Protocols\ BitCommitmentScheme
[T] Mathematics\ ISAP Bit Commitment Scheme
13) Protocols
Coin Flipping Protocol T [T] Protocols\ Coin Flipping Protocol 13) Protocols
Diffie-Hellman Key Exchange (Perfect Forward Secrecy) Visualization X D Indiv. Procedures\ Protocols\ Diffie-Hellman Demonstration… [D] Visuals\ Diffie-Hellman Key Exchange (EC) 13) Protocols
Dining Cryptographers Protocol T [T] Protocols\ Dining Cryptographers Protocol 13) Protocols
Oblivious Transfer Protocol T [T] Protocols\ Oblivious Transfer Protocol (1 out of n) 13) Protocols
Secure Email (S/MIME) Visualization X Indiv. Procedures\ Protocols\ Secure E-Mail with S/MIME… 13) Protocols
Shamir's Secret Sharing Visualization X D Indiv. Procedures\ Secret Sharing Demonstration (Shamir)… [D] Visuals\ Shamir's Secret Sharing 13) Protocols
Virtual Smartcard C\T [C] Protocols\ Smartcard
[T] Protocols\ Communication with a SmartCard
13) Protocols
Wired Equivalent Privacy (WEP) C [C] Protocols\ WEP Protocol 13) Protocols
Yao's Millionaire Problem T [T] Protocols\ Yao's Millionaire Problem 13) Protocols
Zero Knowledge Protocol T [T] Protocols\ Zero Knowledge Protocol 13) Protocols
Cyphermatrix (Experimental Ciphers) C\T NOT in official release version (but on additional plugin's site) 99) Unsorted
Explanation
XCT1, CTO: Function is implemented within this program.
DJCT: Function is implemented in the Default Perspective (document-centric view).
AJCT: Function is implemented in the Algorithm Perspective (function-centric view).
CCT2: Function is available as component.
TCT2: Function is demonstrated in a ready-to-tun sample template.
NCT2: Function is available in the navigation bar.
WCT2: Function is part of the wizards.
[x]Path for navigation area x.
<PATH>\<FEATURE>*There are different variants for this <FEATURE> under <PATH>.

Web-Development and Design by imagine orange, powered by joomla