File New Open... Close Save Save as... Document Properties... Print... Print Setup... Recent Files Exit | Edit Undo Redo Cut Copy Paste Delete Find/Replace... Find Next Select All Show Key... Parent Window | View Toolbar Status Bar Show as Text Show as HexDump Bar Chart Alphabet End of Line Line Wrap Whitespace Font  Arial 8  Arial 10  Arial 12  Arial 14  Arial 16  Arial 18  Arial 20  Courier 8  Courier 10  Courier 12  Courier 14  Courier 16  Courier 18  Courier 20 Format Text Document... Show Box (cube's borderlines) | Encrypt/Decrypt Symmetric (classic)  Caesar / Rot-13...  Vigenère...  Hill...  Substitution / Atbash...  Playfair...  ADFGVX...  Byte Addition...  XOR...  Vernam / OTP...  Homophone...  Permutation / Transposition...  Solitaire...  Scytale / Rail Fence... Symmetric (modern)  IDEA...  RC2...  RC4...  DES (ECB)...  DES (CBC)...  Triple DES (ECB)...  Triple DES (CBC)...  AES (CBC)...  Further Algorithms   MARS...   RC6...   Serpent...   Twofish...   DESX...   DESL...   DESXL...  AES (self extracting)... Asymmetric  RSA Encryption...  RSA Decryption...  RSA Demonstration... Hybrid  RSA-AES Encryption...  RSA-AES Decryption...  ECC-AES Encryption...  ECC-AES Decryption... | Digital Signatures/PKI PKI  Generate/Import Keys...  Display/Export Keys... Sign Document... Verify Signature... Extract Signature Signature Demonstration (Signature Generation)... | Indiv. Procedures Hash  MD2  MD4  MD5  SHA  SHA-1  SHA-256  SHA-512  RIPEMD-160  Hash Value of a File...  Hash Demonstration...  Key Generation from Password (PKCS #5)...  Generation of HMACs... RSA Cryptosystem  Prime Number Test...  Generate Prime Numbers...  Factorization of a Number...  RSA Demonstration...  Signature Demonstration (Signature Generation)...  Lattice Based Attacks on RSA   Factoring with a Hint...   Attack on Stereotyped Messages...   Attack on Small Secret Keys... Protocols  Diffie-Hellman Demonstration...  Network Authentication...  Secure E-Mail with S/MIME... Chinese Remainder Theorem Applications  Astronomy and Planetary Motion...  Modular Forward and Backward Transformation...  Secret Sharing by CRT... Visualization of Algorithms  Caesar...  Vigenère...  Nihilist...  DES...  AES   Rijndael Animation...   Rijndael Inspector...   Rijndael Flow Visualization...  Enigma... Secret Sharing Demonstration (Shamir)... Tools  Codes   Base64 Encode/Decode    Base64 Encode    Base64 Decode   UU Encode/Decode    UU Encode    UU Decode   Decode ASN.1 Code of a Document  Compress   Zip   UnZip  Generate Random Numbers...  Password Quality Meter...  Password Entropy...  Length of a Number... Educational Games  Number Shark Number Theory - Interactive  Learning Tool for Number Theory...  Point Addition on Elliptic Curves...  Compute Mersenne Numbers...  Generic t-adic NAF Key Generator... | Analysis Tools for Analysis  Entropy  Floating Frequency  Histogram  N-Gram...  Autocorrelation  Periodicity Symmetric Encryption (classic)  Ciphertext-Only   Caesar   Vigenère   Vigenère (Analysis according to Schroedel)...   ADFGVX...   Substitution...   Solitaire...   Byte Addition   XOR / Vernam  Known Plaintext   Hill...   Single Column Transposition...  Manual Analysis   Substitution...   Playfair...   Solitaire... Symmetric Encryption (modern)  IDEA...  RC2...  RC4...  DES (ECB)...  DES (CBC)...  Triple DES (ECB)...  Triple DES (CBC)...  AES (CBC)...  Further Algorithms   MARS...   RC6...   Serpent...   Twofish...   DESX...   DESL...   DESXL... Asymmetric Encryption  Factorization of a Number...  Lattice Based Attacks on RSA   Factoring with a Hint...   Attack on Stereotyped Messages...   Attack on Small Secret Keys...  Side-Channel Attack on "Textbook RSA"... Hash  Attack on the Hash Value of the Digital Signature... Analyze Randomness  Frequency Test...  Poker Test...  Runs Test...  Serial Test...  FIPS PUB-140-1 Test Battery  Vitányi  3D Visualization... | Options Plot Options... Analysis Options... Text Options... Starting Options... | Window Cascade Tile Arrange Icons Close All | Help Starting Page Index Scenarios (Tutorials) Readme CT Book Presentation About CrypTool... |