Menu Tree

File
New
Open...
Close
Save
Save as...
Document Properties...
Print...
Print Setup...
Recent Files
Exit
Edit
Undo
Redo
Cut
Copy
Paste
Delete
Find/Replace...
Find Next
Select All
Show Key...
Parent Window
View
Toolbar
Status Bar
Show as Text
Show as HexDump
Bar Chart
Alphabet
End of Line
Line Wrap
Whitespace
Font
Arial 8
Arial 10
Arial 12
Arial 14
Arial 16
Arial 18
Arial 20
Courier 8
Courier 10
Courier 12
Courier 14
Courier 16
Courier 18
Courier 20
Format Text Document...
Show Box (cube's borderlines)
Encrypt/Decrypt
Symmetric (classic)
Caesar / Rot-13...
Vigenère...
Hill...
Substitution / Atbash...
Playfair...
ADFGVX...
Byte Addition...
XOR...
Vernam / OTP...
Homophone...
Permutation / Transposition...
Solitaire...
Scytale / Rail Fence...
Symmetric (modern)
IDEA...
RC2...
RC4...
DES (ECB)...
DES (CBC)...
Triple DES (ECB)...
Triple DES (CBC)...
AES (CBC)...
Further Algorithms
MARS...
RC6...
Serpent...
Twofish...
DESX...
DESL...
DESXL...
AES (self extracting)...
Asymmetric
RSA Encryption...
RSA Decryption...
RSA Demonstration...
Hybrid
RSA-AES Encryption...
RSA-AES Decryption...
ECC-AES Encryption...
ECC-AES Decryption...
Digital Signatures/PKI
PKI
Generate/Import Keys...
Display/Export Keys...
Sign Document...
Verify Signature...
Extract Signature
Signature Demonstration (Signature Generation)...
Indiv. Procedures
Hash
MD2
MD4
MD5
SHA
SHA-1
SHA-256
SHA-512
RIPEMD-160
Hash Value of a File...
Hash Demonstration...
Key Generation from Password (PKCS #5)...
Generation of HMACs...
RSA Cryptosystem
Prime Number Test...
Generate Prime Numbers...
Factorization of a Number...
RSA Demonstration...
Signature Demonstration (Signature Generation)...
Lattice Based Attacks on RSA
Factoring with a Hint...
Attack on Stereotyped Messages...
Attack on Small Secret Keys...
Protocols
Diffie-Hellman Demonstration...
Network Authentication...
Secure E-Mail with S/MIME...
Chinese Remainder Theorem Applications
Astronomy and Planetary Motion...
Modular Forward and Backward Transformation...
Secret Sharing by CRT...
Visualization of Algorithms
Caesar...
Vigenère...
Nihilist...
DES...
AES
Rijndael Animation...
Rijndael Inspector...
Rijndael Flow Visualization...
Enigma...
Secret Sharing Demonstration (Shamir)...
Tools
Codes
Base64 Encode/Decode
Base64 Encode
Base64 Decode
UU Encode/Decode
UU Encode
UU Decode
Decode ASN.1 Code of a Document
Compress
Zip
UnZip
Generate Random Numbers...
Password Quality Meter...
Password Entropy...
Length of a Number...
Educational Games
Number Shark
Number Theory - Interactive
Learning Tool for Number Theory...
Point Addition on Elliptic Curves...
Compute Mersenne Numbers...
Generic t-adic NAF Key Generator...
Analysis
Tools for Analysis
Entropy
Floating Frequency
Histogram
N-Gram...
Autocorrelation
Periodicity
Symmetric Encryption (classic)
Ciphertext-Only
Caesar
Vigenère
Vigenère (Analysis according to Schroedel)...
ADFGVX...
Substitution...
Solitaire...
Byte Addition
XOR / Vernam
Known Plaintext
Hill...
Single Column Transposition...
Manual Analysis
Substitution...
Playfair...
Solitaire...
Symmetric Encryption (modern)
IDEA...
RC2...
RC4...
DES (ECB)...
DES (CBC)...
Triple DES (ECB)...
Triple DES (CBC)...
AES (CBC)...
Further Algorithms
MARS...
RC6...
Serpent...
Twofish...
DESX...
DESL...
DESXL...
Asymmetric Encryption
Factorization of a Number...
Lattice Based Attacks on RSA
Factoring with a Hint...
Attack on Stereotyped Messages...
Attack on Small Secret Keys...
Side-Channel Attack on "Textbook RSA"...
Hash
Attack on the Hash Value of the Digital Signature...
Analyze Randomness
Frequency Test...
Poker Test...
Runs Test...
Serial Test...
FIPS PUB-140-1 Test Battery
Vitányi
3D Visualization...
Options
Plot Options...
Analysis Options...
Text Options...
Starting Options...
Window
Cascade
Tile
Arrange Icons
Close All
Help
Starting Page
Index
Scenarios (Tutorials)
Readme
CT Book
Presentation
About CrypTool...


The following pdf files contain the menu trees of all supported languages: