Did you know?

... that CrypTool has been initially developed for the purpose of security awareness trainings within Deutsche Bank.

Here you find the menu tree of the release version of CT 1.4.31.

File
New
Open...
Close
Save
Save as...
Document Properties...
Print...
Print Setup...
Recent Files
Exit
Edit
Undo
Redo
Cut
Copy
Paste
Delete
Find/Replace...
Find Next
Select All
Show Key...
Parent Window
View
Toolbar
Status Bar
Show as Text
Show as HexDump 
Bar Chart
Alphabet
End of Line
Line Wrap
Whitespace
Font
Arial 8
Arial 10
Arial 12
Arial 14
Arial 16
Arial 18
Arial 20
Courier 8
Courier 10
Courier 12
Courier 14
Courier 16
Courier 18
Courier 20
Format Text Document...
Show Box (cube's borderlines)
Encrypt/Decrypt
Symmetric (classic)
Caesar / Rot-13...
Vigenère...
Hill...
Substitution / Atbash...
Playfair...
ADFGVX...
Byte Addition...
XOR...
Vernam / OTP...
Homophone...
Permutation / Transposition...
Solitaire...
Scytale / Rail Fence...
Symmetric (modern)
IDEA...
RC2...
RC4...
DES (ECB)...
DES (CBC)...
Triple DES (ECB)...
Triple DES (CBC)...
AES (CBC)...
Further Algorithms
MARS...
RC6...
Serpent...
Twofish...
DESX...
DESL...
DESXL...
AES (self extracting)...
Asymmetric
RSA Encryption...
RSA Decryption...
RSA Demonstration...
Hybrid
RSA-AES Encryption...
RSA-AES Decryption...
ECC-AES Encryption...
ECC-AES Decryption...
Digital Signatures/PKI
PKI
Generate/Import Keys...
Display/Export Keys...
Sign Document...
Verify Signature...
Extract Signature
Signature Demonstration (Signature Generation)...
Indiv. Procedures
Hash
MD2
MD4
MD5
SHA
SHA-1
SHA-256
SHA-512
RIPEMD-160
Hash Value of a File...
Hash Demonstration...
Key Generation from Password (PKCS #5)...
Generation of HMACs...
RSA Cryptosystem
Prime Number Test...
Generate Prime Numbers...
Factorization of a Number...
RSA Demonstration...
Signature Demonstration (Signature Generation)...
Lattice Based Attacks on RSA
Factoring with a Hint...
Attack on Stereotyped Messages...
Attack on Small Secret Keys...
Protocols
Diffie-Hellman Demonstration...
Network Authentication...
Secure E-Mail with S/MIME...
Chinese Remainder Theorem Applications
Astronomy and Planetary Motion...
Modular Forward and Backward Transformation...
Secret Sharing by CRT...
Visualization of Algorithms
Caesar...
Vigenère...
Nihilist...
DES...
AES
Rijndael Animation...
Rijndael Inspector...
Rijndael Flow Visualization...
Enigma...
Secret Sharing Demonstration (Shamir)...
Tools
Codes
Base64 Encode/Decode
Base64 Encode
Base64 Decode
UU Encode/Decode
UU Encode
UU Decode
Decode ASN.1 Code of a Document
Compress
Zip 
UnZip 
Generate Random Numbers...
Password Quality Meter...
Password Entropy...
Length of a Number...
Educational Games
Number Shark
Number Theory - Interactive
Learning Tool for Number Theory...
Point Addition on Elliptic Curves...
Compute Mersenne Numbers...
Generic t-adic NAF Key Generator...
Analysis
Tools for Analysis
Entropy
Floating Frequency
Histogram
N-Gram...
Autocorrelation
Periodicity
Symmetric Encryption (classic)
Ciphertext-Only
Caesar
Vigenère
Vigenère (Analysis according to Schroedel)...
ADFGVX...
Substitution...
Solitaire...
Byte Addition
XOR / Vernam
Known Plaintext
Hill...
Single Column Transposition...
Manual Analysis
Substitution...
Playfair...
Solitaire...
Symmetric Encryption (modern)
IDEA...
RC2...
RC4...
DES (ECB)...
DES (CBC)...
Triple DES (ECB)...
Triple DES (CBC)...
AES (CBC)...
Further Algorithms
MARS...
RC6...
Serpent...
Twofish...
DESX...
DESL...
DESXL...
Asymmetric Encryption
Factorization of a Number...
Lattice Based Attacks on RSA
Factoring with a Hint...
Attack on Stereotyped Messages...
Attack on Small Secret Keys...
Side-Channel Attack on "Textbook RSA"...
Hash
Attack on the Hash Value of the Digital Signature...
Analyze Randomness
Frequency Test...
Poker Test...
Runs Test...
Serial Test...
FIPS PUB-140-1 Test Battery
Vitányi
3D Visualization...
Options
Plot Options...
Analysis Options...
Text Options...
Starting Options...
Window
Cascade
Tile
Arrange Icons
Close All
Help
Starting Page
Index
Scenarios (Tutorials)
Readme
CT Book
Presentation
About CrypTool...
 

The following pdf files contain the menu trees of all supported languages:

 

Here you will find a summary of the most important features of the current release version of CrypTool 1 (CT1). This does not include features which are additionally implemented in the successor versions CrypTool 2 (CT2) and JCrypTool (JCT). All features of all versions are listed in the CT functions table.

CT1 is a freeware program which enables you to apply and analyze cryptographic mechanisms. It has the typical look-and-feel of a Windows application. CT1 contains comprehensive online help, which can be understood without deep knowledge of cryptography. CT1 is available in English, German, Polish, Spanish, and Serbian. CT1 includes every state-of-the-art cryptographic function and allows you to learn about and use different cryptographic methods within the same environment.

The algorithms available include both classic and modern cryptosystems:

  • classic methods: the Caesar cipher, the ADFGVX cipher, the double-column transposition (permutation), the Enigma encryption algorithm, etc.
  • modern methods: the RSA and AES algorithms, hybrid encryption, algorithms based on lattice reduction and elliptic curves, etc.

 

Official presentation of the CrypTool 1 project

Last Update: March 2017
This presentation, with over 100 slides, gives an exhaustive overview about the features of CrypTool 1.4, and a short overview of the CrypTool project.

The current version of "CrypTool 1" is the CrypTool 1.4.30.
This version is written in C/C++ and requires a Win32 environment. It was compiled with the Microsoft Visual Studio 2008 development environment. Right now CT1 is available in 5 languages.
For CrypTool 1 it is planned to further on release only bug-fix versions. The next one is 1.4.31. New functions will only be implemented for CrypTool 2 and JCrypTool.

For further information, see download page.

Go To Top