Menu Tree
File New Open... Close Save Save as... Document Properties... Print... Print Setup... Recent Files Exit | Edit Undo Redo Cut Copy Paste Delete Find/Replace... Find Next Select All Show Key... Parent Window | View Toolbar Status Bar Show as Text Show as HexDump Bar Chart Alphabet End of Line Line Wrap Whitespace Font Arial 8 Arial 10 Arial 12 Arial 14 Arial 16 Arial 18 Arial 20 Courier 8 Courier 10 Courier 12 Courier 14 Courier 16 Courier 18 Courier 20 Format Text Document... Show Box (cube's borderlines) | Encrypt/Decrypt Symmetric (classic) Caesar / Rot-13... Vigenère... Hill... Substitution / Atbash... Playfair... ADFGVX... Byte Addition... XOR... Vernam / OTP... Homophone... Permutation / Transposition... Solitaire... Scytale / Rail Fence... Symmetric (modern) IDEA... RC2... RC4... DES (ECB)... DES (CBC)... Triple DES (ECB)... Triple DES (CBC)... AES (CBC)... Further Algorithms MARS... RC6... Serpent... Twofish... DESX... DESL... DESXL... AES (self extracting)... Asymmetric RSA Encryption... RSA Decryption... RSA Demonstration... Hybrid RSA-AES Encryption... RSA-AES Decryption... ECC-AES Encryption... ECC-AES Decryption... | Digital Signatures/PKI PKI Generate/Import Keys... Display/Export Keys... Sign Document... Verify Signature... Extract Signature Signature Demonstration (Signature Generation)... | Indiv. Procedures Hash MD2 MD4 MD5 SHA SHA-1 SHA-256 SHA-512 RIPEMD-160 Hash Value of a File... Hash Demonstration... Key Generation from Password (PKCS #5)... Generation of HMACs... RSA Cryptosystem Prime Number Test... Generate Prime Numbers... Factorization of a Number... RSA Demonstration... Signature Demonstration (Signature Generation)... Lattice Based Attacks on RSA Factoring with a Hint... Attack on Stereotyped Messages... Attack on Small Secret Keys... Protocols Diffie-Hellman Demonstration... Network Authentication... Secure E-Mail with S/MIME... Chinese Remainder Theorem Applications Astronomy and Planetary Motion... Modular Forward and Backward Transformation... Secret Sharing by CRT... Visualization of Algorithms Caesar... Vigenère... Nihilist... DES... AES Rijndael Animation... Rijndael Inspector... Rijndael Flow Visualization... Enigma... Secret Sharing Demonstration (Shamir)... Tools Codes Base64 Encode/Decode Base64 Encode Base64 Decode UU Encode/Decode UU Encode UU Decode Decode ASN.1 Code of a Document Compress Zip UnZip Generate Random Numbers... Password Quality Meter... Password Entropy... Length of a Number... Educational Games Number Shark Number Theory - Interactive Learning Tool for Number Theory... Point Addition on Elliptic Curves... Compute Mersenne Numbers... Generic t-adic NAF Key Generator... | Analysis Tools for Analysis Entropy Floating Frequency Histogram N-Gram... Autocorrelation Periodicity Symmetric Encryption (classic) Ciphertext-Only Caesar Vigenère Vigenère (Analysis according to Schroedel)... ADFGVX... Substitution... Solitaire... Byte Addition XOR / Vernam Known Plaintext Hill... Single Column Transposition... Manual Analysis Substitution... Playfair... Solitaire... Symmetric Encryption (modern) IDEA... RC2... RC4... DES (ECB)... DES (CBC)... Triple DES (ECB)... Triple DES (CBC)... AES (CBC)... Further Algorithms MARS... RC6... Serpent... Twofish... DESX... DESL... DESXL... Asymmetric Encryption Factorization of a Number... Lattice Based Attacks on RSA Factoring with a Hint... Attack on Stereotyped Messages... Attack on Small Secret Keys... Side-Channel Attack on "Textbook RSA"... Hash Attack on the Hash Value of the Digital Signature... Analyze Randomness Frequency Test... Poker Test... Runs Test... Serial Test... FIPS PUB-140-1 Test Battery Vitányi 3D Visualization... | Options Plot Options... Analysis Options... Text Options... Starting Options... | Window Cascade Tile Arrange Icons Close All | Help Starting Page Index Scenarios (Tutorials) Readme CT Book Presentation About CrypTool... |
The following pdf files contain the menu trees of all supported languages: