Did you know?

That CrypTool was originally designed as an internal business application for information security training. CrypTool has since developed into an important open-source project in the field of cryptology. Over 50 volunteer developers worldwide contribute to the program.

What is CrypTool 1

CrypTool 1 (CT1) is an open-source Windows program for cryptography and cryptanalysis. It’s the most wide-spreaded e-learning software of its kind.

What is CrypTool 2?

CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades.

What is JCrypTool?

JCrypTool (JCT) is an open-source e-learning platform, allowing to experiment comprehensively with cryptography on Linux, MAC OS X, and Windows.

What is CrypTool-Online?

CrypTool-Online (CTO) runs in a browser and provides a variety of encryption and cryptanalysis methods including illustrated examples and tools like password generator and password meter.

What is MysteryTwister C3?

MysteryTwister C3 (MTC3) is an international Crypto Cipher Contest offering a broad variety of challenges, a moderated forum, and an ongoing hall-of-fame.

Selection
Cryptographic category:
Additional search phrase:
CrypTool 1 (CT1)    CrypTool 2 (CT2)    JCrypTool (JCT)   CrypTool Online (CTO) 

Function CT1 CT2 JCT CTO CT 1 Path CT 2 Path JCT Path CTO Path Category CT-Version
ADFGVX X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ ADFGVX… [C] Classic Ciphers\ ADFGVX
[T] Cryptanalysis\ Classical\ ADFGVX Cipher dictionary attack
[T] Cryptography\ Classical\ ADFGVX Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ ADFGVX
[D] Algorithms\ Classic\ ADFGVX Ciphers\ ADFGVX 1) Classic Ciphers
Affine Cipher X Ciphers\ Multiplicative 1) Classic Ciphers
Alberti X Ciphers\ Alberti 1) Classic Ciphers
AMSCO X Ciphers\ AMSCO 1) Classic Ciphers
Atbash X Encrypt/Decrypt\ Symmetric (classic)\ Substitution / Atbash… 1) Classic Ciphers
Autokey Vigenère D X [D] Algorithms\ Classic\ Autokey Vigenère Ciphers\ Autokey 1) Classic Ciphers
Beaufort X Ciphers\ Beaufort 1) Classic Ciphers
Bifid D X [D] Algorithms\ Classic\ Bifid Ciphers\ Bifid 1) Classic Ciphers
Byte Addition X Encrypt/Decrypt\ Symmetric (classic)\ Byte Addition… 1) Classic Ciphers
Caesar X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Caesar / Rot-13… [C] Classic Ciphers\ Caesar
[T] Cryptography\ Classical\ Caesar Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Caesar
[D] Algorithms\ Classic\ Caesar Ciphers\ Caesar / Rot-13 1) Classic Ciphers
Double Box D [D] Algorithms\ Classic\ Double Box 1) Classic Ciphers
Enigma C\T\W X [C] Classic Ciphers\ Enigma
[T] Cryptanalysis\ Classical\ Enigma Analysis
[T] Cryptography\ Classical\ Enigma Cipher Machine
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Enigma
[W] Cryptanalysis\ Classic Encryption\ Enigma
Ciphers\ Enigma 1) Classic Ciphers
Four Square X Ciphers\ Four-Square 1) Classic Ciphers
Freemason X Ciphers\ Freemason 1) Classic Ciphers
Gronsfeld X Ciphers\ Gronsfeld 1) Classic Ciphers
Hill X C\T X Encrypt/Decrypt\ Symmetric (classic)\ Hill… [C] Classic Ciphers\ Hill Cipher
[T] Cryptography\ Classical\ Hill Cipher
Ciphers\ Hill 1) Classic Ciphers
Homophone X X Encrypt/Decrypt\ Symmetric (classic)\ Homophone… Ciphers\ Homophonic 1) Classic Ciphers
Kamasutra X Ciphers\ Kamasutra 1) Classic Ciphers
Larrabee X Ciphers\ Larrabee 1) Classic Ciphers
Lorenz SZ42 C [C] Classic Ciphers\ Lorenz SZ42 1) Classic Ciphers
M-138 C\T [C] Classic Ciphers\ M-138
[T] Cryptography\ Classical\ M-138
1) Classic Ciphers
M209 C\T [C] Classic Ciphers\ M209
[T] Cryptography\ Classical\ M209 Cipher Machine
[T] Cryptography\ Classical\ M209 Key Setup
1) Classic Ciphers
Navajo T X [T] Cryptography\ Classical\ Navajo Code Ciphers\ Navajo 1) Classic Ciphers
Nihilist C\T X [C] Classic Ciphers\ Nihilist
[T] Cryptography\ Classical\ Nihilist Cipher
Ciphers\ Nihilist 1) Classic Ciphers
Playfair X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Playfair… [C] Classic Ciphers\ Playfair
[T] Cryptography\ Classical\ Playfair Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Playfair
[D] Algorithms\ Classic\ Playfair Ciphers\ Playfair 1) Classic Ciphers
Pollux X Ciphers\ Pollux 1) Classic Ciphers
Polybius X Ciphers\ Polybius 1) Classic Ciphers
Porta X Ciphers\ Porta 1) Classic Ciphers
Purple C\T [C] Classic Ciphers\ Purple
[T] Cryptography\ Classical\ PURPLE Cipher Machine
1) Classic Ciphers
Rail Fence X X Encrypt/Decrypt\ Symmetric (classic)\ Scytale / Rail Fence… Ciphers\ Zigzag (Rail Fence) 1) Classic Ciphers
Rot-13 X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Caesar / Rot-13… [C] Classic Ciphers\ Caesar
[T] Cryptography\ Classical\ CaesarCipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Caesar
[D] Algorithms\ Classic\ Caesar Ciphers\ Caesar / Rot-13 1) Classic Ciphers
Rotation X Ciphers\ Rotation 1) Classic Ciphers
Scytale X C\T\W X Encrypt/Decrypt\ Symmetric (classic)\ Scytale / Rail Fence… [C] Classic Ciphers\ Scytale
[T] Cryptanalysis\ Classical\ Scytale Brute-force Analysis
[T] Cryptography\ Classical\ Scytale Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Scytale
[W] Cryptanalysis\ Classic Encryption\ Scytale
Ciphers\ Scytale 1) Classic Ciphers
Solitaire X C\T Encrypt/Decrypt\ Symmetric (classic)\ Solitaire… [C] Classic Ciphers\ Solitaire
[T] Cryptography\ Classical\ Solitaire Cipher
1) Classic Ciphers
Spanish Strip Cipher C\T [C] Classic Ciphers\ Spanish Strip Cipher
[T] Cryptography\ Classical\ Spanish Strip Cipher
1) Classic Ciphers
Substitution X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Substitution / Atbash… [C] Classic Ciphers\ Substitution
[T] Cryptography\ Classical\ Navajo Code
[T] Cryptography\ Classical\ Substitution Cipher
[T] Cryptography\ Classical\ Substitution Cipher using a password
[T] Tools\ Split a text
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Substitution
[D] Algorithms\ Classic\ Substitution Ciphers\ Monoalphabetic Substitution 1) Classic Ciphers
T-310\50 C\T [C] Classic Ciphers\ T-310\50
[T] Cryptography\ Classical\ T310/50 Cipher Machine
1) Classic Ciphers
Templar X Ciphers\ Templar 1) Classic Ciphers
Transposition (Double Column) X C D Encrypt/Decrypt\ Symmetric (classic)\ Permutation / Transposition… [C] Classic Ciphers\ Transposition [D] Algorithms\ Classic\ Transposition 1) Classic Ciphers
Transposition (Single Column) X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Permutation / Transposition… [C] Classic Ciphers\ Transposition
[T] Cryptography\ Classical\ Transposition Cipher
[D] Algorithms\ Classic\ Transposition Ciphers\ Transposition 1) Classic Ciphers
Trithemius X Ciphers\ Trithemius 1) Classic Ciphers
Vernam X C Encrypt/Decrypt\ Symmetric (classic)\ Vernam\ OTP… [C] Classic Ciphers\ Vernam 1) Classic Ciphers
Vigenère X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Vigenère… [C] Classic Ciphers\ Vigenère
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[T] Cryptanalysis\ Classical\ Vigenère Analysis
[T] Cryptography\ Classical\ Vigenère Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Vigenère
[W] Cryptanalysis\ Classic Encryption\ Vigenère
[D] Algorithms\ Classic\ Vigenère Ciphers\ Vigenère 1) Classic Ciphers
XOR X C\T\W D Encrypt/Decrypt\ Symmetric (classic)\ XOR… [C] Classic Ciphers\ XOR
[T] Cryptography\ Classical\ One Time Pad Demo
[T] Cryptography\ Classical\ One Time Pad Misusage
[T] Cryptography\ Classical\ XOR Cipher
[T] Cryptography\ Modern\ Symmetric\ DES Complementation Property
[T] Cryptography\ Modern\ Symmetric\ Keccak Cipher
[T] Hash Functions\ HMAC
[W] Encryption/Decryption\ Classic Encryption/Decryption\ XOR
[D] Algorithms\ Classic\ XOR 1) Classic Ciphers
3DES X C A Encrypt/Decrypt\ Symmetric (modern)\ Triple DES… [C] Modern Ciphers\ Symmetric\ DES [A] Block Ciphers\ Block Ciphers\ DESede_CBC (OID: 1.2.840.113549.3.7) 2) Modern Ciphers
Achterbahn C\T [C] Modern Ciphers\ Symmetric\ Achterbahn
[T] Cryptography\ Modern\ Symmetric\ Achterbahn Cipher
2) Modern Ciphers
AES X C\T\W D X Encrypt/Decrypt\ Symmetric (modern)\ AES (CBC)...
Encrypt/Decrypt\ Symmetric (modern)\ AES (self extracting)…
[C] Modern Ciphers\ Symmetric\ AES
[T] Codes\ AES (CBC) with PKCS#5 and IV, output as QR Code
[T] Codes\ QR Code Encryption
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (1)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (1)
[T] Cryptanalysis\ Modern\ CBC-Attack
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (2)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (2)
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on AES
[T] Cryptography\ Modern\ Asymmetric\ Cramer-Shoup with AES
[T] Cryptography\ Modern\ Symmetric\ AES Cipher with SHA hashes
[T] Cryptography\ Modern\ Symmetric\ AES encryption with implicit conversion
[T] Cryptography\ Modern\ Symmetric\ AES Cipher (File Input)
[T] Cryptography\ Modern\ Symmetric\ AES with PKCS#5
[T] Cryptography\ Modern\ Symmetric\ AES (CBC) with PKCS#5 and IV
[T] Cryptography\ Modern\ Symmetric\ AES (ECB) with PKCS#5
[T] Cryptography\ Modern\ Symmetric\ AES Cipher (Text Input)
[
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_CBC (OID: 2.16.840.1.101.3.4.1.2)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_CFB (OID: 2.16.840.1.101.3.4.1.4)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_ECB (OID: 2.16.840.1.101.3.4.1.1)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_OFB (OID: 2.16.840.1.101.3.4.1.3)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_CBC (OID: 2.16.840.1.101.3.4.1.22)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_CFB (OID: 2.16.840.1.101.3.4.1.24)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_ECB (OID: 2.16.840.1.101.3.4.1.21)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_OFB (OID: 2.16.840.1.101.3.4.1.23)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES256_CBC (OID: 2.16.840.1.101.3.4.1.42)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES256_ECB (OID: 2.16.840.1.101.3.4.1.41)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES256_CFB (OID: 2.16.840.1.101.3.4.1.44)
[A] Block Ciphers\ Block Ciphers\ Rijn
Highlights\ AES 2) Modern Ciphers
Camellia C\T A [C] Modern Ciphers\ Symmetric\ Camellia
[T] Cryptography\ Modern\ Symmetric\ Camellia Cipher
[A] Block Ciphers\ Block Ciphers\ Camellia128_CBC (OID: 1.2.392.200011.61.1.1.1.2)
[A] Block Ciphers\ Block Ciphers\ Camellia192_CBC (OID: 1.2.392.200011.61.1.1.1.3)
[A] Block Ciphers\ Block Ciphers\ Camellia256_CBC (OID: 1.2.392.200011.61.1.1.1.4)
2) Modern Ciphers
Cramer-Shoup C\T [C] Modern Ciphers\ Asymmetric\ Cramer-Shoup
[T] Cryptography\ Modern\ Asymmetric\ Cramer-Shoup with AES
[C] Modern Ciphers\ Asymmetric\ Cramer-Shoup Key Generator
[T] Cryptography\ Modern\ Asymmetric\ Cramer-Shoup with AES
2) Modern Ciphers
DES X C\T\W Encrypt/Decrypt\ Symmetric (modern)\ DES… [C] Modern Ciphers\ Symmetric\ DES
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptanalysis\ Modern\ DES Known-Plaintext Analysis
[T] Cryptanalysis\ Modern\ DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on DES
[T] Cryptography\ Modern\ Symmetric\ Block Modes of Symmetric Ciphers
[T] Cryptography\ Modern\ Symmetric\ DES Cipher
[T] Cryptography\ Modern\ Symmetric\ DES Complementation Property
[T] Cryptography\ Modern\ Symmetric\ Triple DES Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ DES
[W] Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ DES\ Ciphertext-only
2) Modern Ciphers
DESL X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESL… 2) Modern Ciphers
DESX X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESX… 2) Modern Ciphers
DESXL X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESXL… 2) Modern Ciphers
Dragon D [D] Algorithms\ Symmetric\ Dragon 2) Modern Ciphers
Dynamic Group Keying (DGK) C [C] Modern Ciphers\ Asymmetric\ DGK
[C] Modern Ciphers\ Asymmetric\ DGK Key Generator
2) Modern Ciphers
ECC-AES X Encrypt/Decrypt\ Hybrid\ ECC-AES… 2) Modern Ciphers
ECIES A [A] Hybrid Ciphers\ ECIES 2) Modern Ciphers
ElGamal A [A] Asymmetric Block Ciphers\ ElGamal (OID: 1.3.14.7.2.1.1) 2) Modern Ciphers
Enhanced RSA Crypto System (identities‚ multi-prime) D [D] Visualizations\ RSA Cryptosystem
[D] Visualizations\ Extended RSA Cryptosystem
2) Modern Ciphers
Grain v1 C\T [C] Modern Ciphers\ Symmetric\ Grain v1
[T] Cryptography\ Modern\ Symmetric\ Grain v1 Cipher
2) Modern Ciphers
HC128 C\T [C] Modern Ciphers\ Symmetric\ HC128
[T] Cryptography\ Modern\ Symmetric\ HC128 Cipher
2) Modern Ciphers
HIGHT C [C] Modern Ciphers\ Symmetric\ HIGHT 2) Modern Ciphers
IDEA X D Encrypt/Decrypt\ Symmetric (modern)\ IDEA… [A] Block Ciphers\ Block Ciphers\ IDEA_ECB (OID: 1.3.6.1.4.1.188.7.1.1.1)
[A] Block Ciphers\ Block Ciphers\ IDEA_CBC (OID: 1.3.6.1.4.1.188.7.1.1.2)
[A] Block Ciphers\ Block Ciphers\ IDEA_CFB (OID: 1.3.6.1.4.1.188.7.1.1.3)
[A] Block Ciphers\ Block Ciphers\ IDEA_OFB (OID: 1.3.6.1.4.1.188.7.1.1.4)
2) Modern Ciphers
LFSR C\T D [C] Protocols\ LFSR
[T] Mathematics\ Linear Feedback Shift Register (LFSR)
[D] Algorithms\ Symmetric\ LFSR 2) Modern Ciphers
MARS X A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ MARS… [A] Block Ciphers\ MARS 2) Modern Ciphers
McEliece Fujisaki A [A] Hybrid Ciphers\ McElieceFujisakiCipher (OID: 1.3.6.1.4.1.8301.3.1.3.4.2.1) 2) Modern Ciphers
McEliece Kobara Imai A [A] Hybrid Ciphers\ McElieceKobaraImaiCipher (OID: 1.3.6.1.4.1.8301.3.1.3.4.2.3) 2) Modern Ciphers
McEliece PKCS A [A] Asymmetric Block Ciphers\ McEliecePKCS (OID: 1.3.6.1.4.1.8301.3.1.3.4.1) 2) Modern Ciphers
McEliece Pointcheval A [A] Hybrid Ciphers\ McEliecePointchevalCipher (OID: 1.3.6.1.4.1.8301.3.1.3.4.2.2) 2) Modern Ciphers
MeRSA A [A] Asymmetric Block Ciphers\ MeRSA
[A] Signatures\ MeRSA
2) Modern Ciphers
Mickey 2 C\T [C] Modern Ciphers\ Symmetric\ Mickey 2
[T] Cryptography\ Modern\ Symmetric\ Mickey2 Cipher
2) Modern Ciphers
Misty-1 (Kasumi) A [A] Block Ciphers\ Misty1 2) Modern Ciphers
MpRSA D [D] Visualizations\ RSA Cryptosystem
[D] Visualizations\ Extended RSA Cryptosystem
2) Modern Ciphers
Niederreiter A [A] Asymmetric Block Ciphers\ Niederreiter 2) Modern Ciphers
NLFSR C\T [C] Protocols\ NLFSR
[T] Mathematics\ Non-Linear Feedback Shift Register (NLFSR)
2) Modern Ciphers
Paillier Cryptosystem C\T [C] Modern Ciphers\ Asymmetric\ Paillier
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher (Number Input)
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher with Addition
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher with Blinding
[T] Cryptography\ Modern\ Asymmetric\ Paillier Key Generator
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher (Text Input)
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher (Voting)
2) Modern Ciphers
PRESENT C\T [C] Modern Ciphers\ Symmetric\ PRESENT
[T] Cryptography\ Modern\ Symmetric\ PRESENT Cipher
[T] Tools\ Keccak PRNG
2) Modern Ciphers
Rabbit C\T [C] Modern Ciphers\ Symmetric\ Rabbit
[T] Cryptography\ Modern\ Symmetric\ Rabbit Cipher
2) Modern Ciphers
RC2 X C\T\W A Encrypt/Decrypt\ Symmetric (modern)\ RC2… [C] Modern Ciphers\ Symmetric\ RC2
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptography\ Modern\ Symmetric\ RC2 Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ RC2
[A] Block Ciphers\ Block Ciphers\ RC2_CBC (OID: 1.2.840.113549.3.2) 2) Modern Ciphers
RC4 X C\T D Encrypt/Decrypt\ Symmetric (modern)\ RC4… [C] Modern Ciphers\ Symmetric\ RC4
[T] Cryptography\ Modern\ Symmetric\ RC4 Cipher
[D] Algorithms\ Symmetric\ ARC4/Spritz 2) Modern Ciphers
RC5 A [A] Block Ciphers\ RC5 2) Modern Ciphers
RC6 X D\A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ RC6… [A] Block Ciphers\ RC6 2) Modern Ciphers
Rijndael C\T [C] Modern Ciphers\ Symmetric\ AES
[T] Cryptography\ Modern\ Symmetric\ AES*
2) Modern Ciphers
RSA X C\T\W A Encrypt/Decrypt\ Asymmetric\ RSA
Indiv. Procedures\ RSA Cryptosystem\
[C] Modern Ciphers\ Asymmetric\ RSA
[T] Codes\ RSA signed QR code
[T] Cryptography\ Modern\ Asymmetric\ RSA Cipher
[T] Cryptography\ Modern\ Asymmetric\ RSA Decryption
[T] Cryptography\ Modern\ Asymmetric\ RSA Encryption
[T] Protocols\ Yao's Millionaire Problem
[W] Cryptanalysis\ Modern Encryption\ Asymmetric Encryption\ RSA
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Asymmetric Encryption/Decryption\ RSA\ RSA Decryption
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Asymmetric Encryption/Decryption\ RSA\ RSA Encryption
[C] Modern Ciphers\ Asymmetric\ RSA Key Generator
[T] Codes\ RSA signed QR code
[T] Cryptography\ Modern\ Asymmetric\ RSA Cipher
[T] Cryptography\ Modern\ Asymmetric\ RSA Key Generator
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
[T] Protocols\ Yao's Millionaire Problem
[A] Asymmetric Block Ciphers\ RSA (OID: 1.2.840.113549.1.1.1)
[A] Asymmetric Block Ciphers\ RbRSA (OID: 1.2.840.113549.1.1.7)
[A] Asymmetric Block Ciphers\ RprimeRSA
2) Modern Ciphers
RSA-AES X Encrypt/Decrypt\ Hybrid\ RSA-AES… 2) Modern Ciphers
SAFER+ A [A] Block Ciphers\ SAFER+ 2) Modern Ciphers
SAFER++ A [A] Block Ciphers\ SAFER++ 2) Modern Ciphers
Salsa20 C\T [C] Modern Ciphers\ Symmetric\ Salsa20
[T] Cryptography\ Modern\ Symmetric\ Salsa20 Cipher
2) Modern Ciphers
Serpent X A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ Serpent… [A] Block Ciphers\ Block Ciphers\ Serpent128_CBC (OID: 1.3.6.1.4.1.11591.13.2.2)
[A] Block Ciphers\ Block Ciphers\ Serpent128_CFB (OID: 1.3.6.1.4.1.11591.13.2.4)
[A] Block Ciphers\ Block Ciphers\ Serpent128_ECB (OID: 1.3.6.1.4.1.11591.13.2.1)
[A] Block Ciphers\ Block Ciphers\ Serpent128_OFB (OID: 1.3.6.1.4.1.11591.13.2.3)
[A] Block Ciphers\ Block Ciphers\ Serpent192_CBC (OID: 1.3.6.1.4.1.11591.13.2.22)
[A] Block Ciphers\ Block Ciphers\ Serpent192_CFB (OID: 1.3.6.1.4.1.11591.13.2.24)
[A] Block Ciphers\ Block Ciphers\ Serpent192_ECB (OID: 1.3.6.1.4.1.11591.13.2.21)
[A] Block Ciphers\ Block Ciphers\ Serpent192_OFB (OID: 1.3.6.1.4.1.11591.13.2.23)
[A] Block Ciphers\ Block Ciphers\ Serpent256_CBC (OID: 1.3.6.1.4.1.11591.13.2.42)
[A] Block Ciphers\ Block Ciphers\ Serpent256_CFB (OID: 1.3.6.1.4.1.11591.13.2.44)
[A] Block Ciphers\ Block Ciphers\ Serpent256_ECB (OID: 1.3.6.1.4.1.11591.13.2.41)
[A] Block Ciphers\ Block Ciphers\ Serpent256_OFB (OID: 1.3.6.1.4.1.11591.13.2.43)
2) Modern Ciphers
SHA-3 (Keccak) Streamcipher T [T] Cryptography\ Modern Ciphers\ Symmetric\ Keccak Streamcipher 2) Modern Ciphers
Shacal A [A] Block Ciphers\ Shacal 2) Modern Ciphers
Shacal2 A [A] Block Ciphers\ Shacal2 2) Modern Ciphers
Simplified DES C\T\W [C] Modern Ciphers\ Symmetric\ SDES
[T] Cryptanalysis\ Modern\ SDES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Analysis using Entropy
[T] Cryptanalysis\ Modern\ SDES Known-Plaintext Analysis
[T] Cryptography\ Modern\ Symmetric\ SDES Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ SDES
[W] Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ SDES\ Ciphertext-only
2) Modern Ciphers
Sosemanuk C\T [C] Modern Ciphers\ Symmetric\ Sosemanuk
[T] Cryptography\ Modern\ Symmetric\ Sosemanuk Cipher
2) Modern Ciphers
TEA C\T\W [C] Modern Ciphers\ Symmetric\ TEA
[T] Cryptography\ Modern\ Symmetric\ TEA Cipher
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ TEA
2) Modern Ciphers
Trivium C [C] Modern Ciphers\ Symmetric\ Trivium 2) Modern Ciphers
Twofish X C\T\W A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ Twofish… [C] Modern Ciphers\ Symmetric\ Twofish
[T] Cryptography\ Modern\ Symmetric\ Twofish Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ Twofish
[A] Block Ciphers\ Twofish 2) Modern Ciphers
Wired Equivalent Privacy (WEP) C\T [C] Protocols\ WEP Protocol
[T] Protocols\ WEP Attack
2) Modern Ciphers
XML Security D [D] Algorithms\ XML Security\ 2) Modern Ciphers
BLAKE C\T [C] Hash functions\ BLAKE
[T] Hash Functions\ BLAKE
[T] Hash Functions\ Password storage using salted BLAKE-256
[T] Hash Functions\ Password verification using salted BLAKE-256
3) Hash and MAC Algorithms
CBC MACs A [A] Message Authentication Codes\ Message Authentication Codes\ CBCmacAES128
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacAES192
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacAES256
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacCamellia
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacDESede
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacIDEA
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacMARS
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacMisty1
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacRC2
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacRC5
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacRC6
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacSAFER+
[A] Message Authentication Codes\ Message Authentication Codes\
3) Hash and MAC Algorithms
Cipher-Based MACs (CMAC) A [A] Message Authentication Codes\ Message Authentication Codes\ CmacAES128
[A] Message Authentication Codes\ Message Authentication Codes\ CmacAES192
[A] Message Authentication Codes\ Message Authentication Codes\ CmacAES256
[A] Message Authentication Codes\ Message Authentication Codes\ CmacDESede
3) Hash and MAC Algorithms
CRC-1/Partiy C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-10 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-11 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-12/3GPP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-12/DECT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-14/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-15 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-15/MPT1327 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/AUG-CCITT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/BUYPASS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/CCITT-FALSE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DDS-110 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DECT-R C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DECT-X C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DNP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/EN-13757 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/GENIBUS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/IBM-SDLC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/MAXIM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/MCRF4XX C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/RIELLO C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/T10-DIF C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/TELEDISK C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/TMS37157 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/USB C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/FLEXRAY-A C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/FLEXRAY-B C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/OPENPGP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-3/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-31/PHILIPS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/BZIP2 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/MPEG-2 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/POSIX C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32C C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32D C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32Q C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-4/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-40/GSM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/EPC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/USB C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-6/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-6/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/1B C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/Jones C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/WE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-7 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-7/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/CCITT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/EBU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/I-CODE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/J1850 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/MAXIM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/WCDMA C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-A C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
DHA256 A [A] Message Digests\ DHA256 3) Hash and MAC Algorithms
FORK-256 A [A] Message Digests\ FORK256 3) Hash and MAC Algorithms
Grøstl C\T [C] Hash functions\ Grøstl
[T] Hash Functions\ Grøstl
[T] Hash Functions\ Password storage using salted Grøstl-256
[T] Hash Functions\ Password verification using salted Grøstl-256
3) Hash and MAC Algorithms
Hash Value of a File X D\A Indiv. Procedures\ Hash\ Hash Value of a File… [D] Hash\MD5
[D] Hash\SHA
[D] Hash\SHA3-Candidates
[A] Messages Digests\
3) Hash and MAC Algorithms
HMACs X C\T A Indiv. Procedures\ Hash\ Generation of HMACs… [C] Protocols\ HMAC
[T] Hash Functions\ HMAC
[A] Message Authentication Codes\ Message Authentication Codes\ Hmac (OID: 1.3.6.1.5.5.8.1.2)
[A] Message Authentication Codes\ Message Authentication Codes\ HmacDHA256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacFORK256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacMD4
[A] Message Authentication Codes\ Message Authentication Codes\ HmacMD5 (OID: 1.3.6.1.5.5.8.1.1)
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD128
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD160 (OID: 1.3.6.1.5.5.8.1.4)
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD320
[A] Message Authentication Codes\ Message Authentication Codes\ HmacSHA224
[A] Message Authentication Codes\ Message Authentication Codes\ HmacSHA256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacSHA384
3) Hash and MAC Algorithms
ImageHash C\T [C] Hash functions\ ImageHash
[T] Hash Functions\ ImageHash
[T] Hash Functions\ ImageHash -- smooth comparison
3) Hash and MAC Algorithms
JAMCRC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
KERMIT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
Key Generation from Password (PKCS#5) X Indiv. Procedures\ Hash\ Key Generation from Password (PKCS #5)… 3) Hash and MAC Algorithms
MD2 X Indiv. Procedures\ Hash\ MD2 3) Hash and MAC Algorithms
MD4 X A Indiv. Procedures\ Hash\ MD4 [A] Message Digests\ MD4 (OID: 1.2.840.113549.2.4) 3) Hash and MAC Algorithms
MD5 X C\T\W D Indiv. Procedures\ Hash\ MD5 [C] Hash functions\ MD5
[T] Codes\ RSA signed QR code
[T] Cryptography\ Modern\ Symmetric\ AES with PKCS#5
[T] Hash Functions\ HMAC
[T] Hash Functions\ MD5
[T] Hash Functions\ MD5 Collision Finder
[T] Hash Functions\ MD5 Salted Hash Comparison
[W] Cryptanalysis\ Modern Encryption\ Hash Functions\ MD5
[A] Message Digests\ MD5 (OID: 1.2.840.113549.2.5) 3) Hash and MAC Algorithms
MODBUS C [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
Password Store Using Salted SHA-1 T [T] Hash Functions\ Password store using salted SHA-1 3) Hash and MAC Algorithms
Password Verification Using Salted SHA-1 T [T] Hash Functions\ Password verification using salted SHA-1 3) Hash and MAC Algorithms
PKCS#5 C A [C] Hash functions\ PKCS#5
[T] Codes\ AES (CBC) with PKCS#5 and IV, output as QR Code
[T] Codes\ QR Code Encryption
[T] Cryptography\ Modern\ Symmetric\ AES with PKCS#5
[T] Cryptography\ Modern\ Symmetric\ AES (CBC) with PKCS#5 and IV
[T] Cryptography\ Modern\ Symmetric\ AES (ECB) with PKCS#5
[T] Tools\ Simple Video and Audio Chat using AES encryption
[T] Tools\ Diffie-Hellman AES Video Audio Chat
[A] Password-Based Ciphers\ PBES2 (OID: 1.2.840.113549.1.5.13)
[A] Password-Based Ciphers\ PbeWithMD5AndDES_CBC (OID: 1.2.840.113549.1.5.3)
[A] Password-Based Ciphers\ PbeWithSHA1AndDES_CBC (OID: 1.2.840.113549.1.5.10)
[A] Password-Based Ciphers\ PbeWithSHAAnd3_KeyTripleDES_CBC (OID: 1.2.840.113549.1.12.1.3)
[A] Password-Based Ciphers\ PbeWithSHAAnd40BitRC2_CBC (OID: 1.2.840.113549.1.12.1.6)
3) Hash and MAC Algorithms
RIPEMD-160 X C\T\W A Indiv. Procedures\ Hash\ RIPEMD-160 [C] Hash functions\ RIPEMD160
[T] Hash Functions\ RIPEMD160
[A] Message Digests\ RIPEMD128 (OID: 1.3.36.3.2.2)
[A] Message Digests\ RIPEMD160 (OID: 1.3.36.3.2.1)
[A] Message Digests\ RIPEMD256 (OID: 1.3.36.3.2.3)
[A] Message Digests\ RIPEMD320
3) Hash and MAC Algorithms
SHA C\T\W D [C] Hash functions\ SHA
[T] Hash Functions\ SHA-1 Collision
[T] Hash Functions\ SHA-1
[T] Cryptography\ Modern\ Symmetric\ AES Cipher with SHA hashes
[T] Hash Functions\ Dictionary Attack
[T] Hash Functions\ PBKDF-1 (PKCS#5 2.0)
[T] Protocols\ Coin Flipping Protocol
[T] Hash Functions\ SHA-256
[T] Tools\ Password Generator
[T] Tools\ Simple AES Chat
[D] Algorithms\ Hash\ SHA 3) Hash and MAC Algorithms
SHA-1 X C D Indiv. Procedures\ Hash\ SHA-1 [C] Hash functions\ SHA [A] Message Digests\ SHA1 (OID: 1.3.14.3.2.26) 3) Hash and MAC Algorithms
SHA-256 X C D\A Indiv. Procedures\ Hash\ SHA-256 [C] Hash functions\ SHA [A] Message Digests\ SHA256 (OID: 2.16.840.1.101.3.4.2.1) 3) Hash and MAC Algorithms
SHA-3 Candidates C D [C] Hash functions\ SHA [D] Algorithms\ Hash\ SHA3-Candidates 3) Hash and MAC Algorithms
SHA-3 (Keccak) C [C] Hash functions\ SHA 3) Hash and MAC Algorithms
SHA-384 C A [C] Hash functions\ SHA [A] Message Digests\ SHA384 (OID: 2.16.840.1.101.3.4.2.2) 3) Hash and MAC Algorithms
SHA-512 X C A Indiv. Procedures\ Hash\ SHA-512 [C] Hash functions\ SHA [A] Message Digests\ SHA512 (OID: 2.16.840.1.101.3.4.2.3) 3) Hash and MAC Algorithms
Tiger C\T\W A [C] Hash Functions\ Tiger
[T] Hash Functions\ Tiger
[A] Message Digests\ Tiger (OID: 1.3.6.1.4.1.11591.12.2) 3) Hash and MAC Algorithms
Two-Track MAC A [A] Message Authentication Codes\ Message Authentication Codes\ TTmac128
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac160
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac32
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac64
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac96
3) Hash and MAC Algorithms
VSH A [A] Message Digests\ VSH 3) Hash and MAC Algorithms
Whirlpool C\T\W [C] Hash Functions\ Whirlpool
[T] Hash Functions\ Whirlpool
3) Hash and MAC Algorithms
XFER C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
XMODEM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CMSS A [A] Signatures\ Signatures\ CMSS (OID: 1.3.6.1.4.1.8301.3.1.3.2.6)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_1 (OID: 1.3.6.1.4.1.8301.3.1.3.2.1)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_2 (OID: 1.3.6.1.4.1.8301.3.1.3.2.2)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_3 (OID: 1.3.6.1.4.1.8301.3.1.3.2.3)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_4 (OID: 1.3.6.1.4.1.8301.3.1.3.2.4)
[A] Signatures\ Signatures\ CMSSwithSHA256andWinternitzOTS_1 (OID: 1.3.6.1.4.1.8301.3.1.3.2.5)
[A] Signatures\ Signatures\ CMSSwithSHA256andWinternitzOTS_3 (OID: 1.3.6.1.4.1.8301.3.1.3.2.7)
[A] Signatures\ Signatures\ CMSSwithSHA256andWinternitzOTS_4 (OID: 1.3.6.1.4.1.8301.3.1.3.2.8)
[A] Signatures\ Signatures\ CMSSwithSHA384andWinternitzOTS_1 (OID: 1.3.6.1.4.1.8301.3.1.3.2.9)
[A] Signatures\ Signatures\ CMSSwithSHA384andWinternitzOTS_2 (OID: 1.3.6.1.4.1.8301.3.1.3.2.10)
[A] Signatures\ Signatures\ CMSSwithSHA384andWinternitzOTS_3 (OID: 1.
4) Digital Signatures/PKI
Display/Export Keys X Digital Signatures/PKI\ Display/Export Keys… 4) Digital Signatures/PKI
DSA X A Digital Signatures/PKI\ Sign Document...\ DSA [A] Signatures\ Signatures\ RAW/DSA 4) Digital Signatures/PKI
ECDSA X A Digital Signatures/PKI\ Sign Document...\ ECSP-DSA [A] Signatures\ Signatures\ RawECDSA
[A] Signatures\ Signatures\ SHA1/ECDSA (OID: 1.2.840.10045.4.1)
[A] Signatures\ Signatures\ SHA224/ECDSA (OID: 1.2.840.10045.4.3.1)
[A] Signatures\ Signatures\ SHA256/ECDSA (OID: 1.2.840.10045.4.3.2)
[A] Signatures\ Signatures\ SHA384/ECDSA (OID: 1.2.840.10045.4.3.3)
[A] Signatures\ Signatures\ SHA512/ECDSA (OID: 1.2.840.10045.4.3.4)
4) Digital Signatures/PKI
ECNR X A Digital Signatures/PKI\ Sign Document...\ ECSP-NR [A] Signatures\ SHA1/ECNR 4) Digital Signatures/PKI
Extract Signature X Digital Signatures/PKI\ Extract Signature… 4) Digital Signatures/PKI
Generate/Import Keys X Digital Signatures/PKI\ Generate/Import Keys… 4) Digital Signatures/PKI
GMSS A [A] Signatures\ Signatures\ GMSSwithSHA1 (OID: 1.3.6.1.4.1.8301.3.1.3.3.1)
[A] Signatures\ Signatures\ GMSSwithSHA224 (OID: 1.3.6.1.4.1.8301.3.1.3.3.2)
[A] Signatures\ Signatures\ GMSSwithSHA256 (OID: 1.3.6.1.4.1.8301.3.1.3.3.3)
[A] Signatures\ Signatures\ GMSSwithSHA384 (OID: 1.3.6.1.4.1.8301.3.1.3.3.4)
[A] Signatures\ Signatures\ GMSSwithSHA512 (OID: 1.3.6.1.4.1.8301.3.1.3.3.5)
4) Digital Signatures/PKI
IQDSA A [A] Signatures\ Signatures\ IQDSA (OID: 1.3.6.1.4.1.8301.3.1.1.2)
[A] Signatures\ Signatures\ RIPEMD160withIQDSA (OID: 1.3.6.1.4.1.8301.3.1.1.3)
4) Digital Signatures/PKI
IQGQ A [A] Signatures\ Signatures\ IQGQ (OID: 1.3.6.1.4.1.8301.3.1.1.5)
[A] Signatures\ Signatures\ RIPEMD160withIQDSA (OID: 1.3.6.1.4.1.8301.3.1.1.3)
4) Digital Signatures/PKI
IQRDSA A [A] Signatures\ Signatures\ IQRDSA (OID: 1.3.6.1.4.1.8301.3.1.1.8)
[A] Signatures\ Signatures\ RIPEMD160withIQRDSA (OID: 1.3.6.1.4.1.8301.3.1.1.9)
4) Digital Signatures/PKI
Merkle OTS A [A] Signatures\ Signatures\ MerkleOTSwithSHA1 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.1)
[A] Signatures\ Signatures\ MerkleOTSwithSHA256 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.2)
[A] Signatures\ Signatures\ MerkleOTSwithSHA384 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.3)
[A] Signatures\ Signatures\ MerkleOTSwithSHA512 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.4)
4) Digital Signatures/PKI
Niederreiter CFS A [A] Signatures\ NiederreiterCFS (OID: 1.3.6.1.4.1.8301.3.1.3.4.3.2) 4) Digital Signatures/PKI
RSA A [A] Signatures\ Signatures\ MD5/RSA/RAW
[A] Signatures\ Signatures\ MD5withRSA (OID: 1.2.840.113549.1.1.4)
[A] Signatures\ Signatures\ RIPEMD160/RSA (OID: 1.3.36.3.3.1.2)
[A] Signatures\ Signatures\ RIPEMD160/RSA/RAW
[A] Signatures\ Signatures\ SHA1/RSA (OID: 1.2.840.113549.1.1.5)
[A] Signatures\ Signatures\ SHA1/RSA/RAW
[A] Signatures\ Signatures\ SHA224/RSA (OID: 1.2.840.113549.1.1.14)
[A] Signatures\ Signatures\ SHA224/RSA/RAW
[A] Signatures\ Signatures\ SHA256/RSA/RAW
[A] Signatures\ Signatures\ SHA256withRSA (OID: 1.2.840.113549.1.1.11)
[A] Signatures\ Signatures\ SHA384/RSA/RAW
[A] Signatures\ Signatures\ SHA384withRSA (OID: 1.2.840.113549.1.1.12)
[A] Signatures\ Signatures\ SHA512/RSA/RAW
[A] Signatures\ Signatures\ SHA512withRSA (OID: 1.2.840.113549.1.1.13)
[A] Signatures\ RbRSA (OID: 1.2.840.113549.1.1.10)
[A] Signatures\ RprimeRSA
4) Digital Signatures/PKI
RSASSA-PSS A [A] Algorithms\ Signatures\ RSASSA-PSS 4) Digital Signatures/PKI
SHA with DSA A [A] Signatures\ Signatures\ SHAwithDSA (OID: 1.3.14.3.2.13) 4) Digital Signatures/PKI
SSL (MD5 and SHA1 with RSA) A [A] Signatures\ SSL_MD5andSHA1withRSA 4) Digital Signatures/PKI
Verify Signature X Digital Signatures/PKI\ Verify Signature… 4) Digital Signatures/PKI
Blum Blum Shub (B.B.S.) (PRNG) A [A] Pseudo Random Number Generators\ BBSRandom 5) Random Number Generators
Elliptic Curve (PRNG) A [A] Pseudo Random Number Generators\ ECPRNG 5) Random Number Generators
Inverse Congruence Generator (ICG) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
Linear Congruence Generator (LCG) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
Secude Library Random Number Generator X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
SHA-1 (PRNG) A [A] Pseudo Random Number Generators\ SHA1PRNG 5) Random Number Generators
SHA-3 (Keccak) (PRNG) T [C] Hash functions\ Keccak
[T] Cryptography\ Modern\ Symmetric\ Keccak Cipher
[T] Hash Functions\ Keccak Hash (SHA-3)
[T] Tools\ Keccak PRNG
5) Random Number Generators
X^2 (mod N) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
ADFGVX Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ ADFGVX… 6) Classic Cryptanalysis
Alphabets C [C] Tools\ Data input/output\ Alphabets 6) Classic Cryptanalysis
Alphabet Permutator C\T [C] Tools\ Data flow\ Alphabet Permutator
[T] Cryptography\ Classical\ Substitution Cipher using a password
6) Classic Cryptanalysis
Autocorrelation X C X Analysis\ Tools for Analysis\ Autocorrelation [C] Cryptanalysis\ Generic\ Autocorrelation Cryptanalysis\ Autocorrelation 6) Classic Cryptanalysis
Autokey Analysis X Cryptanalysis\ Break Autokey 6) Classic Cryptanalysis
Byte Addition Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Byte Addition 6) Classic Cryptanalysis
Caesar Analysis X C\T\W Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Caesar [C] Cryptanalysis\ Specific\ Caesar Analyzer
[T] Cryptanalysis\ Classical\ Caesar Analysis using character frequencies
[T] Cryptanalysis\ Classical\ Caesar Brute-force Analysis
[W] Cryptanalysis\ Classic Encryption\ Caesar
6) Classic Cryptanalysis
Cyphermatrix (Experimental Cipher) C\T NOT in official release version (but on additional plugin's site) 6) Classic Cryptanalysis
Dictionary Search C\T [C] Tools\ Data input/output\ Dictionary
[T] Cryptanalysis\ Classical\ Caesar Brute-force Analysis
[T] Cryptanalysis\ Classical\ Scytale Brute-force Analysis
[T] Cryptanalysis\ Classical\ Solitaire Brute-force Analysis
[T] Cryptanalysis\ Classical\ Wordpattern Analysis
[T] Hash Functions\ Dictionary Attack
6) Classic Cryptanalysis
Enigma Attacker C\T\W [C] Cryptanalysis\ Specific\ Enigma
[T] Cryptanalysis\ Classical\ Enigma Analysis
[W] Start\ Cryptanalysis\ Classic Encryption\ Enigma
6) Classic Cryptanalysis
Entropy X C D Analysis\ Tools for Analysis\ Entropy [C] Cryptanalysis\ Generic\ Cost Function [D] Analysis\ Entropy Analysis 6) Classic Cryptanalysis
Fialka C\T [C] Classic Ciphers\ Fialka
[T] Cryptography\ Classical\ Fialka ED Check
[T] Cryptography\ Classical\ Fialka ED Mixed Mode Check
[T] Cryptography\ Classical\ Fialka ED NumLock10 Check
[T] Cryptography\ Classical\ Fialka Key Output
[T] Cryptography\ Classical\ Fialka M-125-3 PROTON II
[T] Cryptography\ Classical\ Fialka M-125 PROTON I
6) Classic Cryptanalysis
Frequency Test X C\T D X Analysis\ Analyze Randomness\ Frequency Test...
Analysis\ Tools for Analysis\ Floating Frequency
[C] Cryptanalysis\ Generic\ Frequency Test
[T] Cryptanalysis\ Classical\ Caesar Analysis using character frequencies
[T] Cryptanalysis\ Classical\ Enigma Analysis
[T] Cryptanalysis\ Classical\ Frequency Analysis
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[D] Analysis\ Frequency Analysis Cryptanalysis\ Frequency Analysis 6) Classic Cryptanalysis
Friedman Test C D [C] Cryptanalysis\ Generic\ Friedman Test
[T] Cryptanalysis\ Classical\ Enigma Analysis
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[D] Analysis\ Friedman Test 6) Classic Cryptanalysis
Hill Analysis X Analysis\ Symmetric encryption (classic)\ Known Plaintext\ Hill… 6) Classic Cryptanalysis
Histogram X Analysis\ Tools for Analysis\ Histogram 6) Classic Cryptanalysis
Kasiski Test C [C] Cryptanalysis\ Generic\ Kasiski Test 6) Classic Cryptanalysis
M-138 Analyzer C\T [C] Cryptanalysis\ Specific\ M-138 Analyzer
[T] Cryptanalysis\ Classical\ M-138 Ciphertext only Attack
[T] Cryptanalysis\ Classical\ M-138 Known-Plaintext Attack
[T] Cryptanalysis\ Classical\ M-138 Partially Known-Plaintext Attack
6) Classic Cryptanalysis
Monoalphabetic Substitution W [C] Cryptanalysis\ Specific\ Monoalphabetic Substitution Analyzer
[T] Cryptanalysis\ Classical\ Monoalphabetic Substitution Analyzer
6) Classic Cryptanalysis
N-Gram Analysis X X Analysis\ Tools for Analysis\ N-Gram… Cryptanalysis\ N-Gram Analysis 6) Classic Cryptanalysis
Periodicity Analysis X Analysis\ Tools for Analysis\ Periodicity 6) Classic Cryptanalysis
Playfair Analysis X Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Playfair… 6) Classic Cryptanalysis
Runs Test X Analysis\ Analyze Randomness\ Runs Test… 6) Classic Cryptanalysis
Scytale Analysis T\W [T] Cryptanalysis\ Scytale Brute-force Analysis
[W] Start\ Cryptanalysis\ Classic Encryption\ Scytale
6) Classic Cryptanalysis
Solitaire Analysis X C\T Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Solitaire...
Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Solitaire…
[C] Cryptanalysis\ Specific\ SolitaireAnalyser
[T] Cryptanalysis\ Classical\ Solitaire Brute-force Analysis
6) Classic Cryptanalysis
Stream Comparison C [C] Tools\ Misc\ Stream Comparator 6) Classic Cryptanalysis
Substitution Analysis X D Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Substitution...
Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Substitution…
[D] Analysis\ Substitution Analysis 6) Classic Cryptanalysis
Transcriptor Analysis C\T [C] Cryptanalysis\ Generic\ Transcriptor
[T] Cryptanalysis\ Classical\ Transcriptor -- manual mode
[T] Cryptanalysis\ Classical\ Transcriptor -- semi-automatic mode
6) Classic Cryptanalysis
Transposition Analysis X C\T\W D Analysis\ Symmetric Encryption (classic)\ Known Plaintext\ Single Column Transposition… [C] Cryptanalysis\ Specific\ Transposition Analyzer
[T] Cryptanalysis\ Classical\ Dictionary attack on the Double Columnar Transposition Cipher
[T] Cryptanalysis\ Classical\ Transposition Brute-force Analysis
[T] Cryptanalysis\ Classical\ Transposition Crib Analysis
[T] Cryptanalysis\ Classical\ Transposition Genetic Analysis
[T] Cryptanalysis\ Classical\ Transposition Hill Climbing Analysis
[W] Cryptanalysis\ Classic Encryption\ Transposition\ Brute-force
[W] Cryptanalysis\ Classic Encryption\ Transposition\ Crib
[W] Cryptanalysis\ Classic Encryption\ Transposition\ Genetic
[D] Analysis\ Transposition Analysis 6) Classic Cryptanalysis
Vernam Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ XOR / Vernam 6) Classic Cryptanalysis
Vigenère Analysis X C\T\W D X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Vigenère
Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Vigenère (Analysis according to Schroedel)…
[C] Cryptanalysis\ Specific\ Vigenère Analyzer
[T] Cryptanalysis\ Classical\ Kryptos K1 Analysis
[T] Cryptanalysis\ Classical\ Kryptos K2 Analysis
[W] Cryptanalysis\ Classic Encryption\ Vigenère
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[T] Cryptanalysis\ Classical\ Vigenère Analysis
[D] Analysis\ Vigenère Breaker Cryptanalysis\ Break Vigenère 6) Classic Cryptanalysis
Viterbi Analysis D [D] Analysis\ Viterbi Analysis 6) Classic Cryptanalysis
Word Pattern Analysis C\T [C] Cryptanalysis\ Generic\ Word Patterns
[T] Cryptanalysis\ Classical\ Wordpattern Analysis
[T] Cryptanalysis\ Classical\ Wordpattern Analysis with self-defined dictionary
6) Classic Cryptanalysis
3DES Brute-Force Attack X C\T Analysis\ Symmetric Encryption (modern)\ Triple DES… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
7) Modern Cryptanalysis
AES Brute-Force Attack X C\T\W Analysis\ Symmetric Encryption (modern)\ AES (CBC)… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ AES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ AES*
7) Modern Cryptanalysis
Berlekamp-Massey Algorithm C\T [C] Cryptanalysis\ Generic\ Berlekamp-Massey Algorithm
[T] Mathematics\ Berlekamp-Massey
7) Modern Cryptanalysis
Bit Commitment Scheme C\T [C] Protocols\ Bit Commitment Scheme
[T] Mathematics\ ISAP Bit Commitment Scheme
7) Modern Cryptanalysis
Cost Function C\T [C] Cryptanalysis\ Generic\ Cost Function
[T] Cryptanalysis\ Classical\ Transposition Brute-force Analysis
[T] Cryptanalysis\ Classical\ Transposition Crib Analysis
[T] Cryptanalysis\ Classical\ Transposition Genetic Analysis
[T] Cryptanalysis\ Classical\ Transposition Hill Climbing Analysis
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (1)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (1)
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptanalysis\ Modern\ DES Known-Plaintext Analysis
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (2)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (2)
[T] Cryptanalysis\ Modern\ DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Analysis using Entropy
[T] Cryptanalysis\ Modern\ SDES Known-Plaintext Analysis
7) Modern Cryptanalysis
Cube Attack C\T [C] Cryptanalysis\ Specific\ Cube Attack
[T] Cryptanalysis\ Modern\ Cube Attack on Trivium
7) Modern Cryptanalysis
DES Brute-Force Attack X C\T\W Analysis\ Symmetric Encryption (modern)\ DES… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ DES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ DES*
7) Modern Cryptanalysis
DESL Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESL… 7) Modern Cryptanalysis
DESX Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESX… 7) Modern Cryptanalysis
DESXL Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESXL… 7) Modern Cryptanalysis
Discrete Logarithm C\T [C] Cryptanalysis\ Generic\ Discrete Logarithm
[T] Mathematics\ Discrete Logarithm
7) Modern Cryptanalysis
Distributed AES Analysis X Cryptanalysis\ Distributed AES Analysis 7) Modern Cryptanalysis
FIPS PUB-140-1 X Analysis\ Analyze Randomness\ FIPS PUB-140-1 Test Battery 7) Modern Cryptanalysis
General Number Field Sieve (GNFS) C\T [C] Cryptanalysis\ Generic\ General Number Field Sieve
[T] Mathematics\ Factorization with General Number Field Sieve (GNFS)
7) Modern Cryptanalysis
Hash Collisions X Analysis\ Hash\ Attack on the Hash Value of the Digital Signature… 7) Modern Cryptanalysis
Heartbleed analysis W [W] Tools\ Heartbleed analysis 7) Modern Cryptanalysis
IDEA Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ IDEA… 7) Modern Cryptanalysis
IDP Analyzer C\T [C] Cryptanalysis\ Specific\ IDP Analyzer
[T] Cryptanalysis\ Classical\ Dictionary attack on the Double Columnar Transposition Cipher
7) Modern Cryptanalysis
Key Searcher C\T [C] Cryptanalysis\ Specific\ Key Searcher
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (1)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (1)
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptanalysis\ Modern\ DES Known-Plaintext Analysis
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (2)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (2)
[T] Cryptanalysis\ Modern\ DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Analysis using Entropy
[T] Cryptanalysis\ Modern\ SDES Known-Plaintext Analysis
7) Modern Cryptanalysis
MARS Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ MARS… 7) Modern Cryptanalysis
MD5 Collisions C\T\W [C] Hash functions\ MD5 Collider
[T] Hash Functions\ MD5 Collision Finder
7) Modern Cryptanalysis
Padding Oracle C\T [C] Tools\ Misc\ Padding Oracle
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on AES
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on DES
7) Modern Cryptanalysis
Padding Oracle Attack against AES C\T [C] Tools\ Misc\ Padding Oracle Attack
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on AES
7) Modern Cryptanalysis
Padding Oracle Attack against DES C\T [C] Tools\ Misc\ Padding Oracle Attack
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on DES
7) Modern Cryptanalysis
Poker Test X Analysis\ Analyze Randomness\ Poker Test… 7) Modern Cryptanalysis
Quadratic Sieve (QS) C\T [C] Cryptanalysis\ Generic\ Quadratic Sieve (QS)
[T] Mathematics\ Factorization with Quadratic Sieve
7) Modern Cryptanalysis
RC2 Brute-Force Attack X C Analysis\ Symmetric Encryption (modern)\ RC2… [C] Cryptanalysis\ Specific\ KeySearcher 7) Modern Cryptanalysis
RC4 Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ RC4… 7) Modern Cryptanalysis
RC6 Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ RC6… 7) Modern Cryptanalysis
RSA Attacks X W Analysis\ Asymmetric Encryption\ Lattice-Based Attacks on RSA...\
Analysis\ Asymmetric Encryption\ Side-Channel Attack on "Textbook RSA"…
[W] Start\ Cryptanalysis\ Modern Encryption\ Asymmetric Encryption\ RSA 7) Modern Cryptanalysis
Serial Test X Analysis\ Analyze Randomness\ Serial Test… 7) Modern Cryptanalysis
SDES Brute-Force Attack C\T\W [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ SDES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ SDES*
7) Modern Cryptanalysis
Serpent Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ Serpent… 7) Modern Cryptanalysis
Twofish Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ Twofish… 7) Modern Cryptanalysis
Vitányi Analysis X Analysis\ Analyze Randomness\ Vitányi 7) Modern Cryptanalysis
WEP Attack C\T [C] Protocols\ Attacks on the WEP protocol
[T] Protocols\ WEP Attack
7) Modern Cryptanalysis
Insertion Steganography C\T [C] Steganography\ Insertion Steganography
[T] Steganography\ Steganography Insertion Decryption
[T] Steganography\ Steganography Insertion Encryption
[T] Steganography\ Steganography Permutation Encryption
8) Steganography
Least Significant Bit (LSB) C\T [C] Steganography\ LSB Steganography
[T] Steganography\ Steganography Least Significant Bit Decryption
[T] Steganography\ Steganography Least Significant Bit Encryption
[T] Steganography\ Steganography Least Significant Bit Data Transfer
8) Steganography
Permutation Steganography C\T [C] Steganography\ Permutation Steganography
[T] Steganography\ Steganography Permutation Decryption
[T] Steganography\ Steganography Permutation Image Transfer
8) Steganography
Watermark Creator C\T [C] Steganography\ Watermark Creator
[T] Steganography\ Watermark Creator -- invisible watermark
[T] Steganography\ Watermark Creator -- Robustness
[T] Steganography\ Watermark Creator -- visible watermark
8) Steganography
ASCII W X [W] Codes\ Encoding Codings\ ASCII 9) Codings
ASN.1 X Indiv. Procedures\ Tools\ Codes\ Decode ASN.1 Code of a Document 9) Codings
Bacon X Codings\ Bacon 9) Codings
Barcode Generator X Codings\ Barcode Generator 9) Codings
Base 64 Decode X W X Indiv. Procedures\ Tools\ Codes\ Base64 Encode/Decode\ Base64 Decode [W] Codes\ Encoding Codings\ Base64 9) Codings
Base 64 Encode X W X Indiv. Procedures\ Tools\ Codes\ Base64 Encode/Decode\ Base64 Encode [W] Codes\ Encoding Codings\ Base64 9) Codings
Code 39 X Codings\ Code39 9) Codings
Hamming Distance C\T [C] Tools\ Misc\ HammingDistance
[T] Hash Functions\ ImageHash
[T] Hash Functions\ ImageHash -- smooth comparison
[T] Mathematics\ Hamming Distance
9) Codings
Huffman C\T D X [C] Tools\ Misc\ Huffman
[T] Tools\ Huffman's algorithm (ASCII)
[T] Tools\ Huffman's algorithm (BMG, JPG)
[T] Tools\ Huffman's algorithm (UTF-8)
[D] Visualizations\ Huffman Coding Codings\ Huffman 9) Codings
Morse Code C\T\W X [C] Tools\ Misc\ Morse Code
[T] Codes\ Morse code
[W] Codes\ Morse code
Codings\ Morse code 9) Codings
Unzip X Indiv. Procedures\ Tools\ Compress\ UnZip 9) Codings
UU Decode X Indiv. Procedures\ Tools\ Codes\ UU Encode/Decode\ UU Decode 9) Codings
UU Encode X Indiv. Procedures\ Tools\ Codes\ UU Encode/Decode\ UU Encode 9) Codings
Visual Code C\T\W [C] Tools\ Misc\ Visual Decoder
[C] Tools\ Misc\ Visual Encoder
[T] Codes\ AES (CBC) with PKCS#5 and IV, output as QR Code
[T] Codes\ Create QR Code
[T] Codes\ QR Code Encryption
[T] Codes\ RSA signed QR code
[T] Codes\ VCard
[T] Codes\ Decode QR code file
[T] Codes\ QR Code Encryption
[T] Codes\ RSA signed QR code
[T] Codes\ Simple detection of optical codes
[W] Codes\ Create visual code
[W] Codes\ Decode visual code
9) Codings
Visual Decoder C [C] Tools\ Misc\ Visual Decoder 9) Codings
Visual Encoder C [C] Tools\ Misc\ Visual Encoder 9) Codings
Zip X Indiv. Procedures\ Tools\ Compress\ Zip 9) Codings
AES Visualization X C\T Indiv. Procedures\ Visualization of Algorithms\ AES\ [C] Modern Ciphers\ Symmetric\ AES Visualization
[T] Cryptography\ Modern\ Symmetric\ AES Visualization
10) Learning Aids and Visualizations
Android Unlock Pattern (AUP) Visualization D [D] Visualizations\ Android Unlock Pattern (AUP) 10) Learning Aids and Visualizations
Ant Colony Optimization Visualization D [D] Visualizations\ Ant Colony Optimization 10) Learning Aids and Visualizations
Authentication Methods in Networks Visualization X Indiv. Procedures\ Protocols\ Network Authentication… 10) Learning Aids and Visualizations
Avalanche Visualization C\T [C] Tools\ Misc\ Avalanche Visualization
[T] Cryptanalysis\ Modern\ Avalanche (AES)
[T] Cryptanalysis\ Modern\ Avalanche (classic ciphers)
[T] Cryptanalysis\ Modern\ Avalanche (compare classic ciphers)
[T] Cryptanalysis\ Modern\ Avalanche (DES)
[T] Cryptanalysis\ Modern\ Avalanche (hash functions)
[T] Cryptanalysis\ Modern\ Avalanche (modern ciphers)
10) Learning Aids and Visualizations
BB84 Key Exchange T [T] Protocols\ BB84 Key Exchange 10) Learning Aids and Visualizations
BB84 Key Exchange with Eavesdropping Attack T [T] Protocols\ BB84 Key Exchange with eavesdropping attack 10) Learning Aids and Visualizations
Caesar Visualization X Indiv. Procedures\ Visualization of Algorithms\ Caesar… 10) Learning Aids and Visualizations
Certificate Verification D [D] Visualizations\ Certificate Verification 10) Learning Aids and Visualizations
Chinese Remainder Theorem Visualization X D Indiv. Procedures\ Chinese Remainder Theorem Applications\ [D] Visualizations\ Chinese Remainder Theorem 10) Learning Aids and Visualizations
Coin Flipping Protocol C\T [C] Protocols\ Coin Flipping
[T] Protocols\ Coin Flipping Protocol
10) Learning Aids and Visualizations
Decimalization C\T [C] Tools\ Misc\ Decimalization
[T] Mathematics\ Decimalization
[T] Tools\ Random Decimal Number
10) Learning Aids and Visualizations
DES Visualization X C\T Indiv. Procedures\ Visualization of Algorithms\ DES… [C] Modern Ciphers\ Symmetric\ DESVisualization
[T] Cryptography\ Modern\ Symmetric\ DES Visualization
10) Learning Aids and Visualizations
Differential Power Analysis Visualization D [D] Visualizations\ Differential Power Analysis / Double and Add 10) Learning Aids and Visualizations
Diffie-Hellman Key Exchange (Perfect Forward Secrecy) Visualization X D Indiv. Procedures\ Protocols\ Diffie-Hellman Demonstration… [D] Visualizations\ Diffie-Hellman Key Exchange (EC) 10) Learning Aids and Visualizations
Digital Signatures Visualization X D Digital Signatures\PKI\ Signature Demonstration (Signature Generation)…
Indiv. Procedures\ RSA Cryptosystem\ Signature Demonstration (Signature Generation)…
[D] Visualizations\ Signature Demonstration 10) Learning Aids and Visualizations
Dining Cryptographers Protocol T [T] Protocols\ Dining Cryptographers Protocol 10) Learning Aids and Visualizations
ElGamal Visualization D [D] Visualizations\ ElGamal Cryptosystem 10) Learning Aids and Visualizations
Elliptic Curve Calculations Visualization X D Indiv. Procedures\ Number Theory - Interactive\ Point Addition on Elliptic Curves… [D] Visualizations\ Elliptic Curve Calculations 10) Learning Aids and Visualizations
Enigma Visualization X C Indiv. Procedures\ Visualization of Algorithms\ Enigma… [C] Classic Ciphers\ Enigma 10) Learning Aids and Visualizations
Extended Euclidian plus the method of mutual "exhaustion" (anthyphairesis = continually subtract the smaller from the larger) Visualization D [D] Visualizations\ Extended Euclidean / Reciprocal Subtraction 10) Learning Aids and Visualizations
Feige Fiat Shamir Visualization D [D] Visualizations\ Feige Fiat Shamir 10) Learning Aids and Visualizations
Fiat Shamir Visualization D [D] Visualizations\ Fiat Shamir 10) Learning Aids and Visualizations
Graph Isomorphism Visualization D [D] Visualizations\ Graph Isomorphism 10) Learning Aids and Visualizations
Grille Visualization D [D] Visualizations\ Grille 10) Learning Aids and Visualizations
Hash Algorithms Visualization X D Indiv Procedures\ Hash\ Hash Demonstration… [D] Visualizations\ Hash Sensitivity 10) Learning Aids and Visualizations
Homomorphic Encryption Visualization C\T D [C] Modern Ciphers\ Asymmetric\ Paillier
[T] Cryptography\ Modern\ Asymmetric\ Pailier*
[D] Visualizations\ Homomorphic Encryption 10) Learning Aids and Visualizations
Inner States of the DES Visualization D [D] Visualizations\ Inner States of the Data Encryption Standard (DES) 10) Learning Aids and Visualizations
Kleptography Visualization D [D] Visualizations\ Kleptography 10) Learning Aids and Visualizations
Lattice-Based Cryptosystems - GGH N [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptography\ GGH 10) Learning Aids and Visualizations
Lattice-Based Cryptosystems - LWE N [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptography\ LWE 10) Learning Aids and Visualizations
Lattice-Based Attacks - Merkle-Hellman N D [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptanalysis\ Merkle-Hellman Knapsack [D] Visualizations\ Merkle-Hellman Knapsack Cryptosystem 10) Learning Aids and Visualizations
Lattice-Based Attacks - RSA N [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptanalysis\ RSA (Coppersmith's attack) 10) Learning Aids and Visualizations
Lattice-Based Problems - Shortest Vector Problem (SVP) - Gauss N [N] Crypto tutorials\ Lattice-based cryptography\ Shortest Vector Problem (SVP)\ Gauss algorithm 10) Learning Aids and Visualizations
Lattice-Based Problems - Shortest Vector Problem (SVP) - LLL N [N] Crypto tutorials\ Lattice-based cryptography\ Shortest Vector Problem (SVP)\ LLL algorithm 10) Learning Aids and Visualizations
Lattice-Based Problems - Closest Vector Problem (CVP) N [N] Crypto tutorials\ Lattice-based cryptography\ Closest Vector Problem (CVP)\ Find closest vector 10) Learning Aids and Visualizations
Length of a number X Indiv. Procedures\ Tools\ Length of a number… 10) Learning Aids and Visualizations
Magic Door Visualization D [D] Visualizations\ Magic Door 10) Learning Aids and Visualizations
Merkle Signature Scheme (MSS, XMSS, XMSS_XT) D [D] Visualizations\ Merkle Signature Scheme (MerkleTree) 10) Learning Aids and Visualizations
Multipartite Key Exchange Visualization D [D] Visualizations\ Multipartite Key Exchange 10) Learning Aids and Visualizations
Network Receiver C [C] Tools\ Data input/output\ Network Receiver 10) Learning Aids and Visualizations
Network Sender C [C] Tools\ Data input/output\ Network Sender 10) Learning Aids and Visualizations
Nihilist Visualization X Indiv. Procedures\ Visualization of Algorithms\ Nihilist… 10) Learning Aids and Visualizations
Number Theory X N Indiv. Procedures\ Number Theory - Interactive\
Indiv. Procedures\ Number Theory - Interactive\ Generic t-adic-NAF Key Generator
[N] Crypto tutorials\ World of Primes\ Number theory\ Goldbach's conjecture
[N] Crypto tutorials\ World of Primes\ Number theory\ Powering
[N] Crypto tutorials\ World of Primes\ Number theory\ Number-theoretic functions
[N] Crypto tutorials\ World of Primes\ Number theory\ Primitive roots
10) Learning Aids and Visualizations
Oblivious Transfer Protocol C\T [C] Protocols\ Oblivious Transfer 1
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
[C] Protocols\ Oblivious Transfer 2
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
10) Learning Aids and Visualizations
Password Quality Visualization X T\W X Indiv. Procedures\ Tools\ Password Quality Meter...
Indiv. Procedures\ Tools\ Password Entropy...
[C] Tools\ Misc\ PasswordStrength
[T] Tools\ Password Generator
[T] Tools\ Check Password Strength
[W] Tools\ Password Strength
Highlights\ Password Check 10) Learning Aids and Visualizations
PKCS#1 Attack (Bleichenbacher) Visualization N [N] Crypto Tutorials\ Attack on PKCS#1\ Attacks on PKCS#1\ Bleichenbacher attack 10) Learning Aids and Visualizations
PKCS#1 Attack (Kuehn) Visualization N [N] Crypto Tutorials\ Attack on PKCS#1\ Attacks on PKCS#1\ Attack with shorter keys (Kuehn) 10) Learning Aids and Visualizations
PRESENT Visualization C [C] Modern Ciphers\ Symmetric\ PRESENT 10) Learning Aids and Visualizations
Public-Key Infrastructure D [D] Visualizations\ Public-Key Infrastructure 10) Learning Aids and Visualizations
Randomness Visualization X Analysis\ Analyze Randomness\ 3D Visualization… 10) Learning Aids and Visualizations
RC4 / Spritz D [D] Visualizations\ ARC4 / Spritz 10) Learning Aids and Visualizations
RSA Visualization X D Indiv. Procedures\ RSA Cryptosystem\ [D] Visualizations\ RSA Cryptosystem
[D] Visualizations\ Extended RSA Cryptosystem
10) Learning Aids and Visualizations
SAT Solver C\T [C] Tools\ Misc\ SAT Solver
[T] Mathematics\ SAT Solver (File Input)
[T] Mathematics\ SAT Solver (Text Input)
10) Learning Aids and Visualizations
Secure Email (S/MIME) Visualization X Indiv. Procedures\ Protocols\ Secure E-Mail with S/MIME… 10) Learning Aids and Visualizations
Shamir's Secret Sharing Visualization X D Indiv. Procedures\ Secret Sharing Demonstration (Shamir)… [D] Visualizations\ Shamir's Secret Sharing 10) Learning Aids and Visualizations
Signatur Verification D [D] Visualizations\ Signature Verification 10) Learning Aids and Visualizations
Simple Power Analysis Visualization D [D] Visualizations\ Simple Power Analysis / Square and Multiply 10) Learning Aids and Visualizations
Solving Discrete Logarithm with Babystep-Giantstep D [D] Visualizations\ Shanks Babystep-Giantstep 10) Learning Aids and Visualizations
SSL/TLS Handshake D [D] Visualizations\ SSL/TLS Handshake 10) Learning Aids and Visualizations
Verifiable Secret Sharing (VSS) Visualization D [D] Visualizations\ Verifiable Secret Sharing 10) Learning Aids and Visualizations
Vigenère Visualization X Indiv. Procedures\ Visualization of Algorithms\ Vigenère… 10) Learning Aids and Visualizations
Virtual Smartcard C\T [C] Protocols\ Smartcard
[T] Protocols\ Communication with a SmartCard
10) Learning Aids and Visualizations
Viterbi Visualization D [D] Visuals\ Viterbi 10) Learning Aids and Visualizations
WOTS/WOTS+ D [D] Visualizations\ WOTS/WOTS+ 10) Learning Aids and Visualizations
Yao's Millionaire Problem T [C] Protocols\ Yao 1
[C] Protocols\ Yao 2
[C] Protocols\ Yao 3
[T] Protocols\ Yao's Millionaire Problem
10) Learning Aids and Visualizations
Zero Knowledge Protocol C\T [C] Protocols\ Zero Knowledge Prover
[C] Protocols\ Zero Knowledge Verifier
[T] Protocols\ Zero Knowledge Protocol
10) Learning Aids and Visualizations
Divider Game D [D] Games\ Divider Game 11) Games
Number Shark X D X Indiv. Procedures\ Educational Games\ Number Shark [D] Games\ Number Shark Highlights\ Taxman 11) Games
Sudoku Solver D [D] Games\ Sudoku-Solver 11) Games
Zudo-Ku (Zero-Knowledge Proof) D [D] Games\ Zudo-Ku 11) Games
Prime Number Test X C\T\W\N Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ Miller-Rabin Test
Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ Solovay-Strassen test
Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ AKS test (deterministic procedure)
[C] Cryptanalysis\ Generic\ Prime Test
[T] Mathematics\ Primes Test
[W] Start\ Mathematical Functions\ Prime Operations\ Prime Number Test
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Sieve of Erastosthenes
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Miller-Rabin test
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Sieve of Atkin
[W] Mathematical Functions\ Prime Factorization
12) Prime numbers
Prime Number Tutorial X N Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…
[N] Crypto Tutorials\ World of Primes 12) Prime numbers
Prime Distribution N [N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number line
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number grid
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number of primes
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Ulam's spiral
12) Prime numbers
Factorization of a Number X N Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Brute-force
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Brent
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Pollard
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Williams
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Lenstra
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Quadratic Sieve
[N] Crypto tutorials\ World of Primes\ Factorization\ Quadratic Sieve
[N] Crypto tutorials\ World of Primes\ Factorization\ Brute-force
[C] Cryptanalysis\ Generic\ Factorizer
[T] Mathematics\ Factorization with Trial Division (brute-force)
12) Prime numbers
Generation of Prime Numbers X C\T\W\N Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ Miller-Rabin Test
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ Solovay-Strassen Test
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ FermatTest
[C] Tools\ Data input/output\ Prime Generator
[T] Codes\ QR Code Encryption
[T] Mathematics\ Primes Generator
[T] Protocols\ Diffie-Hellman Key-Exchange over network
[T] Tools\ Diffie-Hellman AES Video Audio Chat
[W] Mathematical Functions\ Prime Operations\ Prime Number Generation
[N] Crypto tutorials\ World of Primes\ Generation of primes\ Generation of primes
12) Prime numbers
Authentication Methods in Networks Visualization X Indiv. Procedures\ Protocols\ Network Authentication… 13) Protocols
BB84 Key Exchange C\T [C] Protocols\ BB84 Error Detector
[C] Protocols\ BB84 Key Generator
[C] Protocols\ BB84 Man in the Middle
[C] Protocols\ BB84 Photon Decoder
[C] Protocols\ BB84 Photon Encoder
[C] Protocols\ BB84 Photonbase Generator
[T] Protocols\ BB84 Key Exchange
[T] Protocols\ BB84 Key Exchange with eavesdropping attack
13) Protocols
BB84 Key Exchange with Eavesdropping Attack T [T] Protocols\ BB84 Key Exchange with eavesdropping attack 13) Protocols
Bit Commitment Scheme C\T [C] Protocols\ BitCommitmentScheme
[T] Mathematics\ ISAP Bit Commitment Scheme
13) Protocols
Coin Flipping Protocol T [T] Protocols\ Coin Flipping Protocol 13) Protocols
Diffie-Hellman Key Exchange (Perfect Forward Secrecy) Visualization X D Indiv. Procedures\ Protocols\ Diffie-Hellman Demonstration… [D] Visuals\ Diffie-Hellman Key Exchange (EC) 13) Protocols
Dining Cryptographers Protocol T [T] Protocols\ Dining Cryptographers Protocol 13) Protocols
Oblivious Transfer Protocol C\T [C] Protocols\ Oblivious Transfer 1
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
[C] Protocols\ Oblivious Transfer 2
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
13) Protocols
Secure Email (S/MIME) Visualization X Indiv. Procedures\ Protocols\ Secure E-Mail with S/MIME… 13) Protocols
Shamir's Secret Sharing Visualization X D Indiv. Procedures\ Secret Sharing Demonstration (Shamir)… [D] Visuals\ Shamir's Secret Sharing 13) Protocols
Virtual Smartcard C\T [C] Protocols\ Smartcard
[T] Protocols\ Communication with a SmartCard
[C] Protocols\ Smartcard Interpreter
13) Protocols
Wired Equivalent Privacy (WEP) C [C] Protocols\ WEP Protocol 13) Protocols
Yao's Millionaire Problem T [C] Protocols\ Yao 1
[C] Protocols\ Yao 2
[C] Protocols\ Yao 3
[T] Protocols\ Yao's Millionaire Problem
13) Protocols
Zero Knowledge Protocol C\T [C] Protocols\ Zero Knowledge Prover
[C] Protocols\ Zero Knowledge Verifier
[T] Protocols\ Zero Knowledge Protocol
13) Protocols
Boolean Function Parser C [C] Tools\ Boolean\ Boolean Function Parser 14) Tools
Boolean Operator C\T [C] Tools\ Boolean\ Boolean Binary Operator
[T] Mathematics\ Booleans
[C] Tools\ Boolean\ Boolean If-Else Operator
[C] Tools\ Boolean\ Boolean Not Operator
14) Tools
Clock C [C] Tools\ Data flow\ Clock 14) Tools
Password Generator X Highlights\ Password Generator 14) Tools
String Operations C\T [C] Tools\ Misc\ String Operations
[T] Mathematics\ Levenshtein Distance
14) Tools
Explanation
XCT1, CTO: Function is implemented within this program.
DJCT: Function is implemented in the Default Perspective (document-centric view).
AJCT: Function is implemented in the Algorithm Perspective (function-centric view).
CCT2: Function is available as component.
TCT2: Function is demonstrated in a ready-to-tun sample template.
NCT2: Function is available in the navigation bar.
WCT2: Function is part of the wizards.
[x]Path for navigation area x.
<PATH>\<FEATURE>*There are different variants for this <FEATURE> under <PATH>.

Go To Top