Cryptological functions from all CrypTool versions

Auswahl

Function CT1 CT2 JCT CTO CT1 Path CT2 Path JCT Path CTO Path Category CT-Version
RSA [attack] X T/W [X] \ Analysis \ Asymmetric Encryption \ Lattice-Based Attacks on RSA...
[X] \ Analysis \ Asymmetric Encryption \ Side-Channel Attack on "Textbook RSA"…
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Lattice-Based Attacks on RSA...
[T] \ Cryptanalysis \ Modern \ RSA Common Factor Attack
[W] \ Cryptanalysis \ Modern Encryption \ Asymmetric Encryption \ RSA
7) Modern Cryptanalysis
Hash attack (collisions) X [X] \ Analysis \ Hash \ Attack on the Hash Value of the Digital Signature… 7) Modern Cryptanalysis
ADFGVX [analysis] X T [X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ ADFGVX… [T] \ Cryptanalysis \ Classical \ ADFGVX dictionary attack 6) Classic Cryptanalysis
Byte addition [analysis] X [X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Byte Addition 6) Classic Cryptanalysis
Caesar / Rot-13 [analysis] X T/W/C [X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Caesar [C] \ Cryptanalysis \ Specific \ Caesar Analyzer
[T] \ Cryptanalysis \ Classical \ Caesar Analysis using character frequencies
[T] \ Cryptanalysis \ Classical \ Caesar Brute-force Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Caesar
6) Classic Cryptanalysis
Solitaire [analysis] X T/C [X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Solitaire...
[X] \ Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Solitaire…
[C] \ Cryptanalysis \ Specific \ Solitaire Analyzer
[T] \ Cryptanalysis \ Classical \ Solitaire Brute-force Analysis
6) Classic Cryptanalysis
Substitution [analysis] X C/T/W D [X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Substitution...
[X] \ Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Substitution…
[C] \ Cryptanalysis \ Specific \ Monoalphabetic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer with arbitrary Ciphertext Alphabet
[W] \ Cryptanalysis \ Classic Encryption \ Monoalphabetic Substitution
[D] \ Analysis \ Substitution Analysis 6) Classic Cryptanalysis
Vigenère [analysis] X T/W/C D X [X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère
[X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère (Analysis according to Schroedel)…
[C] \ Cryptanalysis \ Specific \ Vigenère Analyzer
[T] \ Cryptanalysis \ Classical \ Vigenère Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Vigenère
[D] \ Analysis \ Vigenère Breaker [X] \ Cryptanalysis \ Vigenère Analysis 6) Classic Cryptanalysis
Vernam [analysis] X [X] \ Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ XOR / Vernam 6) Classic Cryptanalysis
Transposition [analysis] X T/C/W D [X] \ Analysis \ Symmetric Encryption (classic) \ Known Plaintext \ Single Column Transposition… [C] \ Cryptanalysis \ Specific \ Transposition Analyzer
[T] \ Cryptanalysis \ Classical \ Transposition Brute-force Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Crib Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Genetic Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Hill Climbing Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Brute-force
[W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Genetic
[D] \ Analysis \ Transposition Analysis 6) Classic Cryptanalysis
Hill cipher [analysis] X [X] \ Analysis \ Symmetric encryption (classic) \ Known Plaintext \ Hill… 6) Classic Cryptanalysis
Playfair [analysis] X T/C [X] \ Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Playfair… [C] \ Cryptanalysis \ Specific \ Playfair Analyzer
[T] \ Cryptanalysis \ Classical \ Playfair Analysis
6) Classic Cryptanalysis
AES [analysis] X T/W [X] \ Analysis \ Symmetric Encryption (modern) \ AES (CBC)… [T] \ Cryptanalysis \ Modern \ AES Analysis using Entropy (1)
[T] \ Cryptanalysis \ Modern \ AES Analysis using Entropy (2) – with changeable plaintext
[T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (1)
[T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (2)
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Ciphertext-only
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Known plaintext
7) Modern Cryptanalysis
DES [analysis] X T/W [X] \ Analysis \ Symmetric Encryption (modern) \ DES… [T] \ Cryptanalysis \ Modern \ DES Analysis using Entropy
[T] \ Cryptanalysis \ Modern \ DES Brute-force Analysis
[T] \ Cryptanalysis \ Modern \ DES Known-Plaintext Analysis
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ DES \ Known plaintext
7) Modern Cryptanalysis
IDEA [attack] X [X] \ Analysis \ Symmetric Encryption (modern) \ IDEA… 7) Modern Cryptanalysis
RC2 [attack] X [X] \ Analysis \ Symmetric Encryption (modern) \ RC2… 7) Modern Cryptanalysis
RC4 [attack] X [X] \ Analysis \ Symmetric Encryption (modern) \ RC4… 7) Modern Cryptanalysis
Triple DES (3DES) [analysis] X T [X] \ Analysis \ Symmetric Encryption (modern) \ Triple DES… [T] \ Cryptanalysis \ Modern \ Triple DES Brute-force Analysis 7) Modern Cryptanalysis
DESL [analysis] X [X] \ Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESL… 7) Modern Cryptanalysis
DESX [analysis] X [X] \ Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESX… 7) Modern Cryptanalysis
DESXL [analysis] X [X] \ Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESXL… 7) Modern Cryptanalysis
MARS [attack] X [X] \ Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ MARS… 7) Modern Cryptanalysis
RC6 [attack] X [X] \ Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ RC6… 7) Modern Cryptanalysis
Serpent [attack] X [X] \ Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Serpent… 7) Modern Cryptanalysis
Twofish [attack] X [X] \ Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Twofish… 7) Modern Cryptanalysis
Autocorrelation X C X [X] \ Analysis \ Tools for Analysis \ Autocorrelation [C] \ Cryptanalysis \ Generic \ Autocorrelation [X] \ Cryptanalysis \ Autocorrelation 6) Classic Cryptanalysis
Entropy [analysis] X D [X] \ Analysis \ Tools for Analysis \ Entropy [D] \ Analysis \ Entropy Analysis 6) Classic Cryptanalysis
Frequency test X C/T D [X] \ Analysis \ Analyze Randomness \ Frequency Test...
[X] \ Analysis \ Tools for Analysis \ Floating Frequency
[C] \ Cryptanalysis \ Generic \ Frequency Test
[T] \ Cryptanalysis \ Classical \ Frequency Analysis
[D] \ Analysis \ Frequency Analysis 6) Classic Cryptanalysis
Histogram X [X] \ Analysis \ Tools for Analysis \ Histogram 6) Classic Cryptanalysis
N-gram [analysis] X X [X] \ Analysis \ Tools for Analysis \ N-Gram… [X] \ Cryptanalysis \ N-Gram Analysis 6) Classic Cryptanalysis
Periodicity [analysis] X [X] \ Analysis \ Tools for Analysis \ Periodicity 6) Classic Cryptanalysis
Randomness [visual] X [X] \ Analysis \ Analyze Randomness \ 3D Visualization… 10) Learning Aids and Visualizations
FIPS PUB-140-1 (test PRNG) X [X] \ Analysis \ Analyze Randomness \ FIPS PUB-140-1 Test Battery 7) Modern Cryptanalysis
Poker-Test (test PRNG) X [X] \ Analysis \ Analyze Randomness \ Poker Test… 7) Modern Cryptanalysis
Runs Test (test PRNG) X [X] \ Analysis \ Analyze Randomness \ Runs Test… 6) Classic Cryptanalysis
Serial test (test PRNG) X [X] \ Analysis \ Analyze Randomness \ Serial Test… 7) Modern Cryptanalysis
Vitányi [analysis] X [X] \ Analysis \ Analyze Randomness \ Vitányi 7) Modern Cryptanalysis
DSA signature X A/D [X] \ Digital Signatures, PKI \ Sign Document... \ DSA
[X] \ Digital Signatures, PKI \ Sign Document... \ RSA
[A] \ Signatures \ DSASignature \ RAW/DSA
[A] \ Signatures \ DSASignature \ SHAwithDSA
[A] \ Signatures \ IQDSASignature \ IQDSA
[A] \ Signatures \ IQDSASignature \ RIPEMD160withIQDSA
[A] \ Signatures \ IQRDSASignature \ IQRDSA
[A] \ Signatures \ IQRDSASignature \ RIPEMD160withIQRDSA
[D] \ Algorithms \ Signature \ DSA
4) Digital Signatures, PKI
ECDSA signature X A [X] \ Digital Signatures, PKI \ Sign Document... \ ECSP-DSA [A] \ Signatures \ ECDSASignature \ RawECDSA
[A] \ Signatures \ ECDSASignature \ SHA1/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA224/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA256/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA384/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA512/ECDSA
4) Digital Signatures, PKI
ECNR signature X A [X] \ Digital Signatures, PKI \ Sign Document... \ ECSP-NR [A] \ Signatures \ SHA1/ECNR 4) Digital Signatures, PKI
Keys (generate / import) X [X] \ Digital Signatures, PKI \ PKI \ Generate/Import Keys… 4) Digital Signatures, PKI
Keys (display / export) X [X] \ Digital Signatures, PKI \ PKI \ Display/Export Keys… 4) Digital Signatures, PKI
Signature [visual] X D [X] \ Digital Signatures, PKI \ Signature Demonstration (Signature Generation)…
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Signature Demonstration (Signature Generation)…
[D] \ Visuals \ Signature Demonstration 10) Learning Aids and Visualizations
Signature extraction X [X] \ Digital Signatures, PKI \ Extract Signature… 4) Digital Signatures, PKI
Signature verification X D [X] \ Digital Signatures, PKI \ Verify Signature… [D] \ Visuals \ Signature Verification 4) Digital Signatures, PKI
HMAC X T/C [X] \ Indiv. Procedures \ Hash \ Generation of HMACs… [C] \ Protocols \ HMAC
[T] \ Hash Functions \ HMAC
3) Hash and MAC Algorithms
Hash algorithms [visual] X D [X] \ Indiv Procedures \ Hash \ Hash demonstration…
[X] \ Indiv. Procedures \ Hash \ Hash Value of a File…
[D] \ Visuals \ Hash Sensitivity 3) Hash and MAC Algorithms
MD2 X [X] \ Indiv. Procedures \ Hash \ MD2 3) Hash and MAC Algorithms
MD4 X A [X] \ Indiv. Procedures \ Hash \ MD4 [A] \ Message Authentication Codes \ HMac \ HmacMD4 3) Hash and MAC Algorithms
MD5 X T/C A/D [X] \ Indiv. Procedures \ Hash \ MD5 [C] \ Hash functions \ MD5
[T] \ Hash Functions \ MD5
[T] \ Hash Functions \ MD5 Collision Finder
[T] \ Hash Functions \ MD5 Salted Hash Comparison
[A] \ Message Authentication Codes \ HMac \ HmacMD5
[D] \ Algorithms \ Hash \ MD5
[D] \ Algorithms \ MAC \ HMacMD5
3) Hash and MAC Algorithms
RIPEMD-160 X [X] \ Indiv. Procedures \ Hash \ RIPEMD-160 3) Hash and MAC Algorithms
Key generation from password (PKCS#5) X [X] \ Indiv. Procedures \ Hash \ Key Generation from Password (PKCS #5)… 3) Hash and MAC Algorithms
SHA X C/T A/D [X] \ Indiv. Procedures \ Hash \ SHA
[X] \ Indiv. Procedures \ Hash \ SHA-1
[X] \ Indiv. Procedures \ Hash \ SHA-256
[X] \ Indiv. Procedures \ Hash \ SHA-512
[C] \ Hash functions \ SHA
[T] \ Hash Functions \ SHA-1
[T] \ Hash Functions \ SHA-1 Collision
[T] \ Hash Functions \ SHA-256
[A] \ Message Digests \ SHA1
[A] \ Message Digests \ SHA224
[A] \ Message Digests \ SHA256
[A] \ Message Digests \ SHA384
[A] \ Message Digests \ SHA512
[A] \ Pseudo Random Number Generators \ SHA1PRNG
[D] \ Algorithms \ Hash \ SHA
[D] \ Algorithms \ Hash \ SHA3-Candidates
[D] \ Algorithms \ Random Number Generator \ SHA1
3) Hash and MAC Algorithms
RSA X C/T/W A/D [X] \ Encrypt/Decrypt \ Asymmetric \ RSA
[X] \ Indiv. Procedures \ RSA Cryptosystem
[C] \ Modern Ciphers \ Asymmetric \ RSA
[C] \ Modern Ciphers \ Asymmetric \ RSA Key Generator
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Cipher
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Decryption
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Encryption
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Key Generator
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Decryption
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Encryption
[A] \ Asymmetric Block Ciphers \ MeRSA
[A] \ Asymmetric Block Ciphers \ RSA
[A] \ Asymmetric Block Ciphers \ RbRSA
[A] \ Asymmetric Block Ciphers \ RprimeRSA
[D] \ Algorithms \ Asymmetric \ RSA
[D] \ Visuals \ Extended RSA Cryptosystem
[D] \ Visuals \ RSA Cryptosystem
2) Modern Ciphers
Primes (generators, tests, factorization, tutorials) X T/C/N/W [X] \ Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number…
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers…
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Fermat Test
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Miller-Rabin Test
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Solovay-Strassen Test
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test…
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ AKS test (deterministic procedure)
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Fermat Test
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Miller-Rabin Test
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Solovay-Strassen test
[C] \ Cryptanalysis \ Generic \ Prime Test
[C] \ Tools \ Data input/output \ Prime Generator
[N] \ Crypto tutorials \ World of Primes
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number grid
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number line
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number of primes
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Ulam's spiral
[N] \ Crypto tutorials \ World of Primes \ Generation of primes \ Generation of primes
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Miller-Rabin test
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Atkin
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Eratosthenes
[T] \ Mathematics \ Next Smaller Prime Number
[T] \ Mathematics \ Primes Generator
[T] \ Mathematics \ Primes Test
[W] \ Mathematical Functions \ Prime Operations \ Prime Number Generation
12) Prime numbers
Factorization of a number X C/T/N/W [X] \ Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brent
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brute-force
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Lenstra
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Pollard
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Quadratic Sieve
[X] \ Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Williams
[C] \ Cryptanalysis \ Generic \ Factorizer
[C] \ Cryptanalysis \ Generic \ Quadratic Sieve
[N] \ Crypto tutorials \ World of Primes \ Factorization \ Brute-force
[N] \ Crypto tutorials \ World of Primes \ Factorization \ Quadratic Sieve
[T] \ Mathematics \ Factorization with Quadratic Sieve (QS)
[T] \ Mathematics \ Factorization with Trial Division (brute-force)
[W] \ Mathematical Functions \ Prime Factorization
12) Prime numbers
Chinese remainder theorem (CRT) [visual] X D [X] \ Indiv. Procedures \ Chinese Remainder Theorem Applications \ [D] \ Visuals \ Chinese Remainder Theorem (CRT) 10) Learning Aids and Visualizations
Number Shark (taxman) X D X [X] \ Indiv. Procedures \ Educational Games \ Number Shark [D] \ Games \ Number Shark [X] \ Highlights \ Taxman 11) Games
Authentication methods in networks [visual] X [X] \ Indiv. Procedures \ Protocols \ Network Authentication… 10) Learning Aids and Visualizations
Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy) [visual] X [X] \ Indiv. Procedures \ Protocols \ Diffie-Hellman Demonstration… 10) Learning Aids and Visualizations
Secure email (S/MIME) [visual] X [X] \ Indiv. Procedures \ Protocols \ Secure E-Mail with S/MIME… 10) Learning Aids and Visualizations
Shamir's secret sharing [MPC] [visual] X D [X] \ Indiv. Procedures \ Secret Sharing Demonstration (Shamir)… [D] \ Visuals \ Shamir's Secret Sharing 10) Learning Aids and Visualizations
ASN.1 X [X] \ Indiv. Procedures \ Tools \ Codes \ Decode ASN.1 Code of a Document 9) Codings
Base 64 encode/decode X X [X] \ Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Decode
[X] \ Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Encode
[X] \ Codings \ Base64 9) Codings
Zip/Unzip X [X] \ Indiv. Procedures \ Tools \ Compress \ UnZip
[X] \ Indiv. Procedures \ Tools \ Compress \ Zip
9) Codings
UU decode/encode X [X] \ Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Decode
[X] \ Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Encode
9) Codings
Length of a number X [X] \ Indiv. Procedures \ Tools \ Length of a number… 10) Learning Aids and Visualizations
Password quality [visual] X C/T/W X [X] \ Indiv. Procedures \ Tools \ Password Entropy...
[X] \ Indiv. Procedures \ Tools \ Password Quality Meter...
[C] \ Tools \ Misc \ PasswordStrength
[T] \ Tools \ Check Password Strength
[W] \ Tools \ Password Strength
[X] \ Highlights \ Password Check
[X] \ Highlights \ Password Meter
10) Learning Aids and Visualizations
Pseudo random number generator (PRNG) X C/T/W [X] \ Indiv. Procedures \ Tools \ Generate Random Numbers… \ Inverse congruence generator (ICG) [PRNG]
[X] \ Indiv. Procedures \ Tools \ Generate Random Numbers… \ Linear congruence generator (LCG) [PRNG]
[X] \ Indiv. Procedures \ Tools \ Generate Random Numbers… \ Secude Library random number generator
[X] \ Indiv. Procedures \ Tools \ Generate Random Numbers… \ X^2 (mod N) [PRNG]
[C] \ Tools \ Random Number \ LFSR
[C] \ Tools \ Random Number \ NLFSR
[C] \ Tools \ Random Number \ Random Number Generator
[T] \ Tools \ Random number generators
[W] \ Tools \ Random numbers
5) Random Number Generators
AES [visual] X C/T X [X] \ Indiv. Procedures \ Visualization of Algorithms \ AES \ [C] \ Modern Ciphers \ Symmetric \ AES Visualization
[T] \ Cryptography \ Modern \ Symmetric \ AES Visualization
[X] \ Highlights \ AES (step-by-step) 10) Learning Aids and Visualizations
Caesar / Rot-13 [visual] X [X] \ Indiv. Procedures \ Visualization of Algorithms \ Caesar… 10) Learning Aids and Visualizations
DES [visual] X C/T [X] \ Indiv. Procedures \ Visualization of Algorithms \ DES… [C] \ Modern Ciphers \ Symmetric \ DESVisualization
[T] \ Cryptography \ Modern \ Symmetric \ DES Visualization
10) Learning Aids and Visualizations
Enigma [visual] X [X] \ Indiv. Procedures \ Visualization of Algorithms \ Enigma… 10) Learning Aids and Visualizations
Nihilist [visual] X [X] \ Indiv. Procedures \ Visualization of Algorithms \ Nihilist… 10) Learning Aids and Visualizations
Vigenère [visual] X [X] \ Indiv. Procedures \ Visualization of Algorithms \ Vigenère… 10) Learning Aids and Visualizations
Number theory (also see Primes) X N [X] \ Indiv. Procedures \ Number Theory - Interactive \ Compute Mersenne Numbers...
[X] \ Indiv. Procedures \ Number Theory - Interactive \ Generic t-adic-NAF Key Generator
[X] \ Indiv. Procedures \ Number Theory - Interactive \ Learning Tool for Number Theory...
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Goldbach's conjecture
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Number-theoretic functions
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Primitive roots
10) Learning Aids and Visualizations
EC calculations [visual] X [X] \ Indiv. Procedures \ Number Theory - Interactive \ Point Addition on Elliptic Curves… 10) Learning Aids and Visualizations
RSA-AES X [X] \ Encrypt/Decrypt \ Hybrid \ RSA-AES… 2) Modern Ciphers
ECC-AES X [X] \ Encrypt/Decrypt \ Hybrid \ ECC-AES… 2) Modern Ciphers
ADFGX / ADFGVX X C/T/W D X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ ADFGVX… [C] \ Classic Ciphers \ ADFGVX
[C] \ Cryptanalysis \ Specific \ ADFGVX Analyzer
[T] \ Cryptanalysis \ Classical \ ADFGVX heuristic analysis
[T] \ Cryptography \ Classical \ ADFGVX Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ ADFGVX
[D] \ Algorithms \ Classic \ ADFGVX [X] \ Ciphers \ ADFG(V)X 1) Classic Ciphers
Byte addition X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Byte Addition… 1) Classic Ciphers
Caesar / Rot-13 X C/T/W D X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Caesar / Rot-13… [C] \ Classic Ciphers \ Caesar
[T] \ Cryptography \ Classical \ Caesar Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Caesar
[D] \ Algorithms \ Classic \ Caesar [X] \ Ciphers \ Caesar 1) Classic Ciphers
Hill cipher X C/T X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Hill… [C] \ Classic Ciphers \ Hill Cipher
[T] \ Cryptography \ Classical \ Hill Cipher
[X] \ Ciphers \ Hill 1) Classic Ciphers
Homophonic substitution cipher X T [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Homophone… [T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature -- Decryption
[T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature -- Encryption
1) Classic Ciphers
Transposition (single column transposition) X C/T/W D [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Permutation / Transposition… [C] \ Classic Ciphers \ Transposition
[T] \ Cryptography \ Classical \ Transposition Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Transposition
[D] \ Algorithms \ Classic \ Transposition 1) Classic Ciphers
Playfair cipher X C/T/W D [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Playfair… [C] \ Classic Ciphers \ Playfair
[T] \ Cryptography \ Classical \ Playfair Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Playfair
[D] \ Algorithms \ Classic \ Playfair 1) Classic Ciphers
Rail fence X X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Scytale / Rail Fence… [X] \ Ciphers \ Railfence 1) Classic Ciphers
Scytale X C/T/W X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Scytale / Rail Fence… [C] \ Classic Ciphers \ Scytale
[T] \ Cryptography \ Classical \ Scytale Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Scytale
[X] \ Ciphers \ Scytale 1) Classic Ciphers
Solitaire X C/T [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Solitaire… [C] \ Classic Ciphers \ Solitaire
[T] \ Cryptography \ Classical \ Solitaire Cipher
1) Classic Ciphers
Substitution X T/C/W D X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… [C] \ Classic Ciphers \ Substitution
[T] \ Cryptography \ Classical \ Substitution Cipher
[T] \ Cryptography \ Classical \ Substitution Cipher using a password
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Substitution
[D] \ Algorithms \ Classic \ Substitution [X] \ Ciphers \ Monoalphabet. Substitution 1) Classic Ciphers
Atbash X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… 1) Classic Ciphers
Vernam X C/T [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Vernam \ OTP… [C] \ Classic Ciphers \ Vernam
[T] \ Cryptography \ Classical \ Vernam Cipher
1) Classic Ciphers
Vigenère cipher X C/T/W D X [X] \ Encrypt/Decrypt \ Symmetric (classic) \ Vigenère… [C] \ Classic Ciphers \ Vigenère
[T] \ Cryptography \ Classical \ Vigenère Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Vigenère
[D] \ Algorithms \ Classic \ Autokey-Vigenère
[D] \ Algorithms \ Classic \ Vigenère
[X] \ Ciphers \ Vigenère 1) Classic Ciphers
XOR X C/T/W D [X] \ Encrypt/Decrypt \ Symmetric (classic) \ XOR… [C] \ Classic Ciphers \ XOR
[T] \ Cryptography \ Classical \ XOR Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ XOR
[D] \ Algorithms \ Classic \ XOR 1) Classic Ciphers
AES X T/C/W A/D [X] \ Encrypt/Decrypt \ Symmetric (modern) \ AES (CBC)...
[X] \ Encrypt/Decrypt \ Symmetric (modern) \ AES (self extracting)…
[C] \ Modern Ciphers \ Symmetric \ AES
[T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (File Input)
[T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (Text Input)
[T] \ Cryptography \ Modern \ Symmetric \ AES Cipher with SHA hashes
[T] \ Cryptography \ Modern \ Symmetric \ AES encryption with implicit conversion
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ AES
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_CBC
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_CBC
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_CBC
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_OFB
[D] \ Algorithms \ Symmetric \ AES
2) Modern Ciphers
DES X T/C/W A/D [X] \ Encrypt/Decrypt \ Symmetric (modern) \ DES… [C] \ Modern Ciphers \ Symmetric \ DES
[T] \ Cryptography \ Modern \ Symmetric \ DES Cipher
[T] \ Cryptography \ Modern \ Symmetric \ DES Complementation Property
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ DES
[A] \ Block Ciphers \ DESede \ DESede_CBC
[A] \ Password-Based Ciphers \ PbeWithMD5AndDES_CBC
[A] \ Password-Based Ciphers \ PbeWithSHA1AndDES_CBC
[D] \ Visuals \ Inner States of the Data Encryption Standard (DES)
2) Modern Ciphers
IDEA X A/D [X] \ Encrypt/Decrypt \ Symmetric (modern) \ IDEA… [A] \ Block Ciphers \ IDEA \ IDEA_CBC
[A] \ Block Ciphers \ IDEA \ IDEA_CFB
[A] \ Block Ciphers \ IDEA \ IDEA_ECB
[A] \ Block Ciphers \ IDEA \ IDEA_OFB
[D] \ Algorithms \ Symmetric \ IDEA
2) Modern Ciphers
RC2 X C/T/W A [X] \ Encrypt/Decrypt \ Symmetric (modern) \ RC2… [C] \ Modern Ciphers \ Symmetric \ RC2
[T] \ Cryptography \ Modern \ Symmetric \ RC2 Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ RC2
[A] \ Block Ciphers \ RC2 \ RC2_CBC
[A] \ Password-Based Ciphers \ PbeWithSHAAnd40BitRC2_CBC
2) Modern Ciphers
RC4 X C/T D [X] \ Encrypt/Decrypt \ Symmetric (modern) \ RC4… [C] \ Modern Ciphers \ Symmetric \ RC4
[T] \ Cryptography \ Modern \ Symmetric \ RC4 Cipher
[D] \ Algorithms \ Symmetric \ ARC4/Spritz
[D] \ Visuals \ ARC4 / Spritz
2) Modern Ciphers
Triple DES (3DES) X T A [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Triple DES (3DES)... [T] \ Cryptography \ Modern \ Symmetric \ Triple DES Cipher [A] \ Password-Based Ciphers \ PbeWithSHAAnd3_KeyTripleDES_CBC 2) Modern Ciphers
DESL X [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESL… 2) Modern Ciphers
DESX X [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESX… 2) Modern Ciphers
DESXL X [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESXL… 2) Modern Ciphers
MARS X A [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ MARS… [A] \ Block Ciphers \ MARS 2) Modern Ciphers
RC6 X A/D [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ RC6… [A] \ Block Ciphers \ RC6
[D] \ Algorithms \ Symmetric \ RC6
2) Modern Ciphers
Serpent X A [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Serpent… [A] \ Block Ciphers \ Serpent \ Serpent128_CBC
[A] \ Block Ciphers \ Serpent \ Serpent128_CFB
[A] \ Block Ciphers \ Serpent \ Serpent128_ECB
[A] \ Block Ciphers \ Serpent \ Serpent128_OFB
[A] \ Block Ciphers \ Serpent \ Serpent192_CBC
[A] \ Block Ciphers \ Serpent \ Serpent192_CFB
[A] \ Block Ciphers \ Serpent \ Serpent192_ECB
[A] \ Block Ciphers \ Serpent \ Serpent192_OFB
[A] \ Block Ciphers \ Serpent \ Serpent256_CBC
[A] \ Block Ciphers \ Serpent \ Serpent256_CFB
[A] \ Block Ciphers \ Serpent \ Serpent256_ECB
[A] \ Block Ciphers \ Serpent \ Serpent256_OFB
2) Modern Ciphers
Twofish X C/T/W A [X] \ Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Twofish… [C] \ Modern Ciphers \ Symmetric \ Twofish
[T] \ Cryptography \ Modern \ Symmetric \ Twofish Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ Twofish
[A] \ Block Ciphers \ Twofish 2) Modern Ciphers
Bacon X [X] \ Codings \ Bacon 9) Codings
Visual codes (QR, EAN8, WAN13, Code39, Code128, PDF417) T/C/W X [C] \ Tools \ Codes \ Visual Decoder
[C] \ Tools \ Codes \ Visual Encoder
[T] \ Codes \ Create QR Code
[T] \ Codes \ Decode QR code file
[T] \ Codes \ QR Code Encryption
[T] \ Codes \ RSA signed QR code
[T] \ Codes \ Simple detection of optical codes
[W] \ Codes \ Create visual code
[W] \ Codes \ Decode visual code
[X] \ Codings \ Barcode Generator 9) Codings
Beaufort X [X] \ Ciphers \ Beaufort 1) Classic Ciphers
Distributed AES [analysis] X [X] \ Cryptanalysis \ Distributed AES Analysis 7) Modern Cryptanalysis
Enigma C/T/W X [C] \ Classic Ciphers \ Enigma
[T] \ Cryptography \ Classical \ Enigma Cipher Machine
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Enigma
[X] \ Ciphers \ Enigma (step-by-step) 1) Classic Ciphers
Frequency analysis X [X] \ Cryptanalysis \ Frequency Analysis 6) Classic Cryptanalysis
Gronsfeld X [X] \ Ciphers \ Gronsfeld 1) Classic Ciphers
Huffman C/T D X [C] \ Tools \ Codes \ Huffman
[T] \ Tools \ Huffman's algorithm (ASCII)
[T] \ Tools \ Huffman's algorithm (BMG, JPG)
[T] \ Tools \ Huffman's algorithm (UTF-8)
[D] \ Visuals \ Huffman Coding [X] \ Codings \ Huffman 9) Codings
Kamasutra X [X] \ Ciphers \ Kamasutra 1) Classic Ciphers
Morse code C/T/W X [C] \ Tools \ Codes \ Morse Code
[T] \ Codes \ Morse code
[W] \ Codes \ Morse Code
[X] \ Codings \ Morse Code 9) Codings
RSA [visual] X [X] \ Highlights \ RSA (step-by-step) 2) Modern Ciphers
Password generator X [X] \ Highlights \ Password Generator 14) Tools
Porta X [X] \ Ciphers \ Porta 1) Classic Ciphers
Affine cipher X [X] \ Ciphers \ Multiplicative 1) Classic Ciphers
Redefence X [X] \ Ciphers \ Redefence 1) Classic Ciphers
Rotation X [X] \ Ciphers \ Rotation 1) Classic Ciphers
Trithemius X [X] \ Ciphers \ Trithemius 1) Classic Ciphers
ASCII X [X] \ Codings \ ASCII 9) Codings
Autokey Vigenère [analysis] X [X] \ Cryptanalysis \ Autokey Analysis 6) Classic Cryptanalysis
Autokey Vigenère X [X] \ Ciphers \ Autokey 1) Classic Ciphers
Alphabets C/T [C] \ Tools \ Data flow \ Alphabet Permutator
[C] \ Tools \ Data input/output \ Alphabets
[T] \ Tools \ Usage of Alphabets and Alphabet Permutator
6) Classic Cryptanalysis
Camellia C/T A [C] \ Modern Ciphers \ Symmetric \ Camellia
[T] \ Cryptography \ Modern \ Symmetric \ Camellia Cipher
[A] \ Block Ciphers \ Camellia \ Camellia128_CBC
[A] \ Block Ciphers \ Camellia \ Camellia192_CBC
[A] \ Block Ciphers \ Camellia \ Camellia256_CBC
2) Modern Ciphers
Data input/output C/T [C] \ Tools \ Boolean \ Boolean Input
[C] \ Tools \ Boolean \ Boolean Output
[C] \ Tools \ Data flow \ CSVReader
[C] \ Tools \ Data flow \ Clock
[C] \ Tools \ Data input/output \ Audio Input
[C] \ Tools \ Data input/output \ Audio Output
[C] \ Tools \ Data input/output \ Camera
[C] \ Tools \ Data input/output \ Clipboard Input
[C] \ Tools \ Data input/output \ Clipboard Output
[C] \ Tools \ Data input/output \ Dictionary
[C] \ Tools \ Data input/output \ File Input
[C] \ Tools \ Data input/output \ IP Frame Generator
[C] \ Tools \ Data input/output \ Network Receiver
[C] \ Tools \ Data input/output \ Network Sender
[C] \ Tools \ Data input/output \ Number Input
[C] \ Tools \ Data input/output \ Text Input
[C] \ Tools \ Misc \ ImageProcessor
[T] \ Tools \ Random Decimal Number
[T] \ Tools \ Take a Picture using the webcam
14) Tools
Data flow C/T [C] \ Tools \ Boolean \ Boolean Binary Operator
[C] \ Tools \ Boolean \ Boolean Function Parser
[C] \ Tools \ Boolean \ Boolean If-Else Operator
[C] \ Tools \ Boolean \ Boolean Not Operator
[C] \ Tools \ Codes \ String Decoder
[C] \ Tools \ Codes \ String Encoder
[C] \ Tools \ Data flow \ Array Indexer
[C] \ Tools \ Data flow \ Concatenate
[C] \ Tools \ Data flow \ Gate
[C] \ Tools \ Data flow \ Splitter
[C] \ Tools \ Data flow \ Variable Load
[C] \ Tools \ Data flow \ Variable Store
[C] \ Tools \ Data input/output \ File Output
[C] \ Tools \ Data input/output \ Picture Output
[C] \ Tools \ Data input/output \ Text Output
[C] \ Tools \ Misc \ Comparators
[C] \ Tools \ Misc \ Converter
[C] \ Tools \ Misc \ Inc Dec
[C] \ Tools \ Misc \ Length
[C] \ Tools \ Misc \ Stream Comparator
[C] \ Tools \ Misc \ String Operations
[T] \ Tools \ Loop
[T] \ Tools \ Split a text
14) Tools
Cyclic redundancy check (CRC) T/C [C] \ Hash functions \ CRC
[T] \ Hash Functions \ CRC
[T] \ Hash Functions \ CRC Null problems
3) Hash and MAC Algorithms
Tools C [C] \ Cryptanalysis \ Generic \ Contains
[C] \ Tools \ Misc \ Number Operation
[C] \ Tools \ Misc \ Progress
14) Tools
Scytale [analysis] T/W [T] \ Cryptanalysis \ Classical \ Scytale Brute-force Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Scytale
6) Classic Cryptanalysis
Achterbahn C/T [C] \ Modern Ciphers \ Symmetric \ Achterbahn
[T] \ Cryptography \ Modern \ Symmetric \ Achterbahn Cipher
2) Modern Ciphers
Berlekamp-Massey algorithm C/T [C] \ Cryptanalysis \ Generic \ Berlekamp-Massey Algorithm
[T] \ Mathematics \ Berlekamp-Massey
7) Modern Cryptanalysis
Cube [attack] C [C] \ Cryptanalysis \ Specific \ Cube Attack 7) Modern Cryptanalysis
Trivium [attack] T [T] \ Cryptanalysis \ Modern \ Cube Attack on Trivium 7) Modern Cryptanalysis
Enigma [attack] T/W/C [C] \ Cryptanalysis \ Specific \ Enigma Analyzer
[T] \ Cryptanalysis \ Classical \ Enigma Analyzer
[W] \ Cryptanalysis \ Classic Encryption \ Enigma
6) Classic Cryptanalysis
Fialka C/T [C] \ Classic Ciphers \ Fialka
[T] \ Cryptography \ Classical \ Fialka ED Check
[T] \ Cryptography \ Classical \ Fialka ED Mixed Mode Check
[T] \ Cryptography \ Classical \ Fialka ED NumLock10 Check
[T] \ Cryptography \ Classical \ Fialka Key Output
[T] \ Cryptography \ Classical \ Fialka M-125 PROTON I
[T] \ Cryptography \ Classical \ Fialka M-125-3 PROTON II
6) Classic Cryptanalysis
Classical ciphers [analysis] T [T] \ Cryptanalysis \ Classical \ Statistic Tests for Classical Ciphers 6) Classic Cryptanalysis
HIGHT C [C] \ Modern Ciphers \ Symmetric \ HIGHT 2) Modern Ciphers
WEP [attack] T/C [C] \ Protocols \ Attacks on the WEP protocol
[T] \ Protocols \ WEP Attack
7) Modern Cryptanalysis
Kasiski test C [C] \ Cryptanalysis \ Generic \ Kasiski's Test 6) Classic Cryptanalysis
LFSR T D [T] \ Mathematics \ Linear Feedback Shift Register (LFSR) [D] \ Algorithms \ Symmetric \ LFSR 1) Klassische Chiffren
M-138 C/T [C] \ Classic Ciphers \ M-138
[T] \ Cryptography \ Classical \ M-138
1) Classic Ciphers
M-138 [attack] C/T [C] \ Cryptanalysis \ Specific \ M-138 Analyzer
[T] \ Cryptanalysis \ Classical \ M-138 Ciphertext only Attack
[T] \ Cryptanalysis \ Classical \ M-138 Known-Plaintext Attack
[T] \ Cryptanalysis \ Classical \ M-138 Partially-Known Plaintext Attack
6) Classic Cryptanalysis
PKCS#5 AES T [T] \ Codes \ AES (CBC) with PKCS#5 and IV, output as QR Code
[T] \ Cryptography \ Modern \ Symmetric \ AES (CBC) with PKCS#5 and IV
[T] \ Cryptography \ Modern \ Symmetric \ AES (ECB) with PKCS#5
[T] \ Cryptography \ Modern \ Symmetric \ AES with PKCS#5
2) Modern Ciphers
MD5 collisions [attack] W [W] \ Cryptanalysis \ Modern Encryption \ Hash Functions \ MD5 3) Hash and MAC Algorithms
NLFSR T [T] \ Mathematics \ Non-Linear Feedback Shift Register (NLFSR) 2) Modern Ciphers
Dictionary [attack] T [T] \ Hash Functions \ Dictionary Attack on a password hash value 7) Modern Cryptanalysis
Avalanche effect C/T [C] \ Tools \ Misc \ Avalanche Visualization
[T] \ Cryptanalysis \ Modern \ Avalanche (AES)
[T] \ Cryptanalysis \ Modern \ Avalanche (DES)
[T] \ Cryptanalysis \ Modern \ Avalanche (classic ciphers)
[T] \ Cryptanalysis \ Modern \ Avalanche (compare classic ciphers)
[T] \ Cryptanalysis \ Modern \ Avalanche (hash functions)
[T] \ Cryptanalysis \ Modern \ Avalanche (modern ciphers)
10) Learning Aids and Visualizations
BB84 C [C] \ Protocols \ BB84 Error Detector
[C] \ Protocols \ BB84 Key Generator
[C] \ Protocols \ BB84 Photon Decoder
[C] \ Protocols \ BB84 Photon Encoder
[C] \ Protocols \ BB84 Photonbase Generator
13) Protocols
Key exchange (BB84) T [T] \ Protocols \ BB84 Key Exchange
[T] \ Protocols \ BB84 Key Exchange with eavesdropping attack
13) Protocols
BB84 [attack] C [C] \ Protocols \ BB84 Man in the Middle 13) Protocols
BLAKE C/T [C] \ Hash functions \ BLAKE
[T] \ Hash Functions \ BLAKE
[T] \ Hash Functions \ Password storage using salted BLAKE-256
[T] \ Hash Functions \ Password verification using salted BLAKE-256
3) Hash and MAC Algorithms
Blind signature C/T [C] \ Modern Ciphers \ Asymmetric \ Blind Signature Generator
[C] \ Modern Ciphers \ Asymmetric \ Blind Signature Verifier
[T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature Paillier
[T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature RSA
2) Modern Ciphers
Boolean functions T [T] \ Mathematics \ Booleans 14) Tools
Paillier T/C [C] \ Modern Ciphers \ Asymmetric \ Paillier Key Generator
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Voting)
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Blinding
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Key Generator
2) Modern Ciphers
ISAP bit commitment scheme T/C [C] \ Protocols \ ISAP Bit Commitment Scheme
[T] \ Mathematics \ ISAP Bit Commitment Scheme
7) Modern Cryptanalysis
Paillier (homomorphic encryption, HE) T/C [C] \ Modern Ciphers \ Asymmetric \ Paillier
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Number Input)
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Text Input)
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Addition
2) Modern Ciphers
ISBN T [T] \ Codes \ ISBN-10 Check
[T] \ Codes \ ISBN-13 Check
9) Codings
Key exchange (Diffie-Hellman DH) T D [T] \ Protocols \ Diffie-Hellman Key-Exchange
[T] \ Protocols \ Diffie-Hellman Key-Exchange over network
[D] \ Visuals \ Diffie-Hellman Key Exchange (EC) 13) Protocols
Coin flipping protocol T/C [C] \ Protocols \ Coin Flipping
[T] \ Protocols \ Coin Flipping Protocol
13) Protocols
Zero knowledge protocol T/C [C] \ Protocols \ Zero Knowledge Prover
[C] \ Protocols \ Zero Knowledge Verifier
[T] \ Protocols \ Zero Knowledge Protocol
10) Learning Aids and Visualizations
Dining cryptographers protocol T [T] \ Protocols \ Dining Cryptographers Protocol 10) Learning Aids and Visualizations
Yao's millionaire problem (protocol) [MPC] T/C [C] \ Protocols \ Yao 1
[C] \ Protocols \ Yao 2
[C] \ Protocols \ Yao 3
[T] \ Protocols \ Yao's Millionaire Problem Protocol
13) Protocols
Cost function C [C] \ Cryptanalysis \ Generic \ Cost Function 7) Modern Cryptanalysis
SDES [analysis] T/W [T] \ Cryptanalysis \ Modern \ SDES Analysis using Entropy
[T] \ Cryptanalysis \ Modern \ SDES Brute-force Analysis
[T] \ Cryptanalysis \ Modern \ SDES Known-Plaintext Analysis
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Ciphertext-only
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Known plaintext
7) Modern Cryptanalysis
Cramer-Shoup C/T [C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup
[C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup Key Generator
[T] \ Cryptography \ Modern \ Asymmetric \ Cramer-Shoup with AES
2) Modern Ciphers
CBC [attack] T [T] \ Cryptanalysis \ Modern \ CBC-Attack 2) Modern Ciphers
Padding oracle attack (POA) T/C [C] \ Cryptanalysis \ Specific \ Padding Oracle
[C] \ Cryptanalysis \ Specific \ Padding Oracle Attack
[T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on AES
[T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on DES
2) Modern Ciphers
Secure chat – applied cryptography T [T] \ Tools \ Diffie-Hellman AES Video Audio Chat
[T] \ Tools \ Simple AES Chat
[T] \ Tools \ Simple Video and Audio Chat using AES encryption
3) Hash and MAC Algorithms
Block mode T [T] \ Cryptography \ Modern \ Symmetric \ Block Modes of Symmetric Ciphers 2) Modern Ciphers
SDES C/T/W [C] \ Modern Ciphers \ Symmetric \ SDES
[T] \ Cryptography \ Modern \ Symmetric \ SDES Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ SDES
2) Modern Ciphers
Differential cryptanalysis (DCA) C/T [C] \ Cryptanalysis \ Specific \ DCA KeyRecovery
[C] \ Cryptanalysis \ Specific \ DCA Oracle
[C] \ Cryptanalysis \ Specific \ DCA PathFinder
[C] \ Cryptanalysis \ Specific \ DCA PathVisualizer
[C] \ Cryptanalysis \ Specific \ DCA ToyCipher
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (automatic mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (automatic mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (automatic mode)
7) Modern Cryptanalysis
Differential cryptanalysis (DCA) [visual] T [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (tutorial mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (tutorial mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (tutorial mode)
10) Learning Aids and Visualizations
Decimalization C/T [C] \ Tools \ Misc \ Decimalization
[T] \ Mathematics \ Decimalization
10) Learning Aids and Visualizations
DGK (homomorphic encryption, HE) C [C] \ Modern Ciphers \ Asymmetric \ DGK
[C] \ Modern Ciphers \ Asymmetric \ DGK Key Generator
2) Modern Ciphers
Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF) C/T [C] \ Modern Ciphers \ Symmetric \ Format Preserving Encryption (FPE)
[T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption
[T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption (XML)
2) Modern Ciphers
Grain C/T [C] \ Modern Ciphers \ Symmetric \ Grain v1
[T] \ Cryptography \ Modern \ Symmetric \ Grain v1 Cipher
2) Modern Ciphers
Grøstl C/T [C] \ Hash functions \ Grøstl
[T] \ Hash Functions \ Grøstl
[T] \ Hash Functions \ Password storage using salted Grøstl-256
[T] \ Hash Functions \ Password verification using salted Grøstl-256
3) Hash and MAC Algorithms
HC128 C/T [C] \ Modern Ciphers \ Symmetric \ HC128
[T] \ Cryptography \ Modern \ Symmetric \ HC128 Cipher
2) Modern Ciphers
Key derivation function (KDF) C/T [C] \ Hash functions \ HKDF SHA-256
[C] \ Hash functions \ KKDF SHA-256
[C] \ Hash functions \ KKDF SHAKE256
[T] \ Hash Functions \ KDF Performance Comparison (with presentation)
[T] \ Hash Functions \ KDF Performance Comparison (without presentation)
3) Hash and MAC Algorithms
Homophonic substitution [analysis] C/T [C] \ Cryptanalysis \ Specific \ Homophonic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Homophonic Substitution Analysis
6) Classic Cryptanalysis
Zodiac-408 [analysis] T [T] \ Cryptanalysis \ Classical \ Zodiac-408 Analysis 6) Classic Cryptanalysis
Image hash C/T [C] \ Hash functions \ ImageHash
[T] \ Hash Functions \ ImageHash
[T] \ Hash Functions \ ImageHash -- smooth comparison
3) Hash and MAC Algorithms
Keccak (hash, cipher, PRNG) C/T [C] \ Hash functions \ Keccak
[T] \ Cryptography \ Modern \ Symmetric \ Keccak Cipher
[T] \ Hash Functions \ Keccak Hash (SHA-3)
[T] \ Tools \ Keccak pseudorandom number generator (PRNG)
5) Random Number Generators
LAMBDA1 C/T [C] \ Classic Ciphers \ LAMBDA1
[T] \ Cryptography \ Modern \ Symmetric \ LAMBDA1 block cipher
1) Classic Ciphers
M209 C/T [C] \ Classic Ciphers \ M209
[T] \ Cryptography \ Classical \ M209 Cipher Machine
[T] \ Cryptography \ Classical \ M209 Key Setup
1) Classic Ciphers
MD5 attack (collisions) C [C] \ Hash functions \ MD5 Collider 7) Modern Cryptanalysis
Mickey 2 C/T [C] \ Modern Ciphers \ Symmetric \ Mickey 2
[T] \ Cryptography \ Modern \ Symmetric \ Mickey 2 Cipher
2) Modern Ciphers
HTTP protocol T [T] \ Protocols \ HTTP Request 13) Protocols
Heartbleed [analysis] T/W [T] \ Protocols \ Heartbleed Test
[W] \ Tools \ Heartbleed analysis
13) Protocols
Simple multi-client communication – applied cryptography T [T] \ Protocols \ Simple Multi Client Communication 13) Protocols
Simple webserver T [T] \ Protocols \ Simple Webserver 13) Protocols
Discrete logarithm T [T] \ Mathematics \ Discrete Logarithm 7) Modern Cryptanalysis
Oblivious transfer protocol [MPC] C/T [C] \ Protocols \ Oblivious Transfer 1
[C] \ Protocols \ Oblivious Transfer 2
[T] \ Protocols \ Oblivious Transfer Protocol (1 out of n)
10) Learning Aids and Visualizations
Purple C/T [C] \ Classic Ciphers \ Purple
[T] \ Cryptography \ Classical \ PURPLE Cipher Machine
1) Classic Ciphers
Rabbit C/T [C] \ Modern Ciphers \ Symmetric \ Rabbit
[T] \ Cryptography \ Modern \ Symmetric \ Rabbit Cipher
2) Modern Ciphers
PRESENT T/C [C] \ Modern Ciphers \ Symmetric \ PRESENT
[T] \ Cryptography \ Modern \ Symmetric \ PRESENT Cipher
2) Modern Ciphers
Salsa20 C/T [C] \ Modern Ciphers \ Symmetric \ Salsa20
[T] \ Cryptography \ Modern \ Symmetric \ Salsa20 Cipher
2) Modern Ciphers
SAT solver C/T [C] \ Cryptanalysis \ Generic \ SAT Solver
[T] \ Mathematics \ SAT Solver (File Input)
[T] \ Mathematics \ SAT Solver (Text Input)
14) Tools
Sosemanuk C/T [C] \ Modern Ciphers \ Symmetric \ Sosemanuk
[T] \ Cryptography \ Modern \ Symmetric \ Sosemanuk Cipher
2) Modern Ciphers
Spanish strip cipher (SSC) C/T [C] \ Classic Ciphers \ Spanish Strip Cipher
[T] \ Cryptography \ Classical \ Spanish Strip Cipher
1) Classic Ciphers
Speck cipher C/T [C] \ Modern Ciphers \ Symmetric \ Speck
[T] \ Cryptography \ Modern \ Symmetric \ Speck Cipher
2) Modern Ciphers
Steganography C/T [C] \ Steganography \ Insertion Steganography
[C] \ Steganography \ LSB Steganography
[C] \ Steganography \ Permutation Steganography
[T] \ Steganography \ Steganography Insertion Decryption
[T] \ Steganography \ Steganography Insertion Encryption
[T] \ Steganography \ Steganography Least Significant Bit Data Transfer
[T] \ Steganography \ Steganography Least Significant Bit Decryption
[T] \ Steganography \ Steganography Least Significant Bit Encryption
[T] \ Steganography \ Steganography Permutation Decryption
[T] \ Steganography \ Steganography Permutation Encryption
[T] \ Steganography \ Steganography Permutation Image Transfer
8) Steganography
Lorenz SZ42 C [C] \ Classic Ciphers \ Lorenz SZ42 1) Classic Ciphers
T-310 C/T [C] \ Classic Ciphers \ T-310
[T] \ Cryptography \ Classical \ T-310/50 Cipher Machine
[T] \ Cryptography \ Classical \ T-310/51 Cipher Machine
1) Classic Ciphers
Transcriptor [analysis] C/T [C] \ Cryptanalysis \ Generic \ Transcriptor
[T] \ Cryptanalysis \ Classical \ Transcriptor -- manual mode
[T] \ Cryptanalysis \ Classical \ Transcriptor -- semi-automatic mode
6) Classic Cryptanalysis
VCard T [T] \ Codes \ VCard 9) Codings
Watermark creator C/T [C] \ Steganography \ Watermark Creator
[T] \ Steganography \ Watermark Creator -- Robustness
[T] \ Steganography \ Watermark Creator -- invisible watermark
[T] \ Steganography \ Watermark Creator -- visible watermark
8) Steganography
Navajo code T [T] \ Cryptography \ Classical \ Navajo Code 1) Classic Ciphers
TEA C/T/W [C] \ Modern Ciphers \ Symmetric \ TEA
[T] \ Cryptography \ Modern \ Symmetric \ TEA Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ TEA
2) Modern Ciphers
Trivium C [C] \ Modern Ciphers \ Symmetric \ Trivium 2) Modern Ciphers
Kryptos K1 [analysis] T [T] \ Cryptanalysis \ Classical \ Kryptos K1 Analysis 6) Classic Cryptanalysis
Kryptos K2 [analysis] T [T] \ Cryptanalysis \ Classical \ Kryptos K2 Analysis 6) Classic Cryptanalysis
WEP C [C] \ Protocols \ WEP protocol 2) Modern Ciphers
One-time pad (OTP) T [T] \ Cryptography \ Classical \ One-time Pad Demo
[T] \ Cryptography \ Classical \ One-time Pad Misusage
1) Classic Ciphers
Word pattern [analysis] T/C [C] \ Cryptanalysis \ Generic \ Word Patterns
[T] \ Cryptanalysis \ Classical \ Wordpattern Analysis
[T] \ Cryptanalysis \ Classical \ Wordpattern Analysis with self-defined dictionary
6) Classic Cryptanalysis
Friedman test C D [C] \ Cryptanalysis \ Generic \ Friedman Test [D] \ Analysis \ Friedman Test 6) Classic Cryptanalysis
Hamming distance C/T [C] \ Tools \ Misc \ HammingDistance
[T] \ Mathematics \ Hamming Distance
9) Codings
IDP [analysis] C [C] \ Cryptanalysis \ Specific \ IDP Analyzer 7) Modern Cryptanalysis
Transposition (double column transposition) [attack] T [T] \ Cryptanalysis \ Classical \ Dictionary attack on the Double Columnar Transposition Cipher 7) Modern Cryptanalysis
Key searcher C [C] \ Cryptanalysis \ Specific \ KeySearcher 7) Modern Cryptanalysis
Lattice [visual] N [N] \ Crypto tutorials \ Lattice-based cryptography
[N] \ Crypto tutorials \ Lattice-based cryptography \ Closest Vector Problem (CVP) \ Find closest vector
[N] \ Crypto tutorials \ Lattice-based cryptography \ Lattice-based cryptography \ GGH
[N] \ Crypto tutorials \ Lattice-based cryptography \ Lattice-based cryptography \ LWE
[N] \ Crypto tutorials \ Lattice-based cryptography \ Shortest Vector Problem (SVP) \ Gauss algorithm
[N] \ Crypto tutorials \ Lattice-based cryptography \ Shortest Vector Problem (SVP) \ LLL algorithm
10) Learning Aids and Visualizations
Lattice [attack] N [N] \ Crypto tutorials \ Lattice-based cryptography \ Lattice-based cryptanalysis \ Merkle-Hellman Knapsack
[N] \ Crypto tutorials \ Lattice-based cryptography \ Lattice-based cryptanalysis \ RSA (Coppersmith's attack)
10) Learning Aids and Visualizations
Nihilist cipher C/T [C] \ Classic Ciphers \ Nihilist
[T] \ Cryptography \ Classical \ Nihilist Cipher
1) Classic Ciphers
PKCS#1 [attack] N [N] \ Crypto tutorials \ Attacks on PKCS#1
[N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Attack with shorter keys (Kuehn)
[N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Bleichenbacher attack
10) Learning Aids and Visualizations
PKCS#5 C [C] \ Hash functions \ PKCS#5 3) Hash and MAC Algorithms
Powering [visual] N [N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating base)(RSA)
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating exponent)
12) Prime numbers
RIPEMD C/T A [C] \ Hash functions \ RIPEMD160
[T] \ Hash Functions \ RIPEMD160
[A] \ Message Digests \ RIPEMD128
[A] \ Message Digests \ RIPEMD160
[A] \ Message Digests \ RIPEMD256
[A] \ Message Digests \ RIPEMD320
3) Hash and MAC Algorithms
PBKDF-1 (PKCS#5 2.0) T [T] \ Hash Functions \ PBKDF-1 (PKCS#5 2.0) 3) Hash and MAC Algorithms
Password hash (SHA-1) T [T] \ Hash Functions \ Password store using salted SHA-1
[T] \ Hash Functions \ Password verification using salted SHA-1
3) Hash and MAC Algorithms
Virtual smartcard C/T [C] \ Protocols \ Smartcard
[C] \ Protocols \ Smartcard Interpreter
[T] \ Protocols \ Communication with a SmartCard
10) Learning Aids and Visualizations
Levenshtein distance T [T] \ Mathematics \ Levenshtein Distance 14) Tools
Tiger C/T A [C] \ Hash functions \ Tiger
[T] \ Hash Functions \ Tiger
[A] \ Message Digests \ Tiger 3) Hash and MAC Algorithms
Whirlpool C/T [C] \ Hash functions \ Whirlpool
[T] \ Hash Functions \ Whirlpool
3) Hash and MAC Algorithms
Crib [analysis] W [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Crib 6) Classic Cryptanalysis
Encoding W [W] \ Codes \ Encoding 9) Codings
Encryption with AES and password W [W] \ Tools \ Encrypt with password 13) Protocols
ElGamal A/D [A] \ Asymmetric Block Ciphers \ ElGamal
[D] \ Algorithms \ Asymmetric \ ElGamal
[D] \ Visuals \ ElGamal Cryptosystem
2) Modern Ciphers
McEliece signature A [A] \ Asymmetric Block Ciphers \ McEliecePKCS 2) Modern Ciphers
Niederreiter A [A] \ Asymmetric Block Ciphers \ Niederreiter
[A] \ Signatures \ NiederreiterCFS
2) Modern Ciphers
RC5 A [A] \ Block Ciphers \ RC5 2) Modern Ciphers
Shacal A [A] \ Block Ciphers \ Shacal
[A] \ Block Ciphers \ Shacal2
2) Modern Ciphers
SAFER++ A [A] \ Block Ciphers \ SAFER++
[A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER++
2) Modern Ciphers
SAFER+ A [A] \ Block Ciphers \ SAFER+
[A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER+
2) Modern Ciphers
Misty A [A] \ Block Ciphers \ Misty1 2) Modern Ciphers
ECIES A [A] \ Hybrid Ciphers \ ECIES 2) Modern Ciphers
McEliece A [A] \ Hybrid Ciphers \ McElieceFujisakiCipher
[A] \ Hybrid Ciphers \ McElieceKobaraImaiCipher
[A] \ Hybrid Ciphers \ McEliecePointchevalCipher
2) Modern Ciphers
AES MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacAES128
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES192
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES256
[A] \ Message Authentication Codes \ CMac \ CmacAES128
[A] \ Message Authentication Codes \ CMac \ CmacAES192
[A] \ Message Authentication Codes \ CMac \ CmacAES256
3) Hash and MAC Algorithms
DES MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacDESede
[A] \ Message Authentication Codes \ CMac \ CmacDESede
3) Hash and MAC Algorithms
Tiger MAC A [A] \ Message Authentication Codes \ HMac \ HmacTiger 3) Hash and MAC Algorithms
FORK MAC A [A] \ Message Authentication Codes \ HMac \ HmacFORK256 3) Hash and MAC Algorithms
SHA MAC A [A] \ Message Authentication Codes \ HMac \ HmacSHA224
[A] \ Message Authentication Codes \ HMac \ HmacSHA256
[A] \ Message Authentication Codes \ HMac \ HmacSHA384
[A] \ Message Authentication Codes \ HMac \ HmacSHA512
3) Hash and MAC Algorithms
RIPEMD MAC A [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD128
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD160
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD256
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD320
3) Hash and MAC Algorithms
MAC general A [A] \ Message Authentication Codes \ HMac \ Hmac 3) Hash and MAC Algorithms
DHA MAC A [A] \ Message Authentication Codes \ HMac \ HmacDHA256 3) Hash and MAC Algorithms
Serpent MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacSerpent 3) Hash and MAC Algorithms
RC5 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC5 3) Hash and MAC Algorithms
RC6 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC6 3) Hash and MAC Algorithms
RC2 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC2 3) Hash and MAC Algorithms
IDEA MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacIDEA 3) Hash and MAC Algorithms
Misty MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacMisty1 3) Hash and MAC Algorithms
MARS MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacMARS 3) Hash and MAC Algorithms
Camellia MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacCamellia 3) Hash and MAC Algorithms
Twofish MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacTwofish 3) Hash and MAC Algorithms
Shacal MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal
[A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal2
3) Hash and MAC Algorithms
TwoTrack MAC A [A] \ Message Authentication Codes \ TwoTrackMac \ TTmac128
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac160
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac32
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac64
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac96
3) Hash and MAC Algorithms
DHA A [A] \ Message Digests \ DHA256 3) Hash and MAC Algorithms
VSH A [A] \ Message Digests \ VSH 3) Hash and MAC Algorithms
MD A [A] \ Message Digests \ MD4
[A] \ Message Digests \ MD5
3) Hash and MAC Algorithms
FORK A [A] \ Message Digests \ FORK256 3) Hash and MAC Algorithms
PBES2 A [A] \ Password-Based Ciphers \ PBES2 2) Modern Ciphers
Blum Blum Shub (BBS) – PRNG A [A] \ Pseudo Random Number Generators \ BBSRandom 5) Random Number Generators
EC PRNG A [A] \ Pseudo Random Number Generators \ ECPRNG 5) Random Number Generators
RSA signature A [A] \ Signatures \ MeRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ MD5/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ MD5withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512withRSA
[A] \ Signatures \ RbRSA
[A] \ Signatures \ RprimeRSA
[A] \ Signatures \ SSL_MD5andSHA1withRSA
4) Digital Signatures, PKI
GQ signature A [A] \ Signatures \ IQGQSignature \ IQGQ
[A] \ Signatures \ IQGQSignature \ RIPEMD160withIQGQ
4) Digital Signatures, PKI
Winternitz signature A/D [A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_4
[D] \ Visuals \ WOTS/WOTS+
4) Digital Signatures, PKI
CMSS signature A [A] \ Signatures \ CMSSSignature \ CMSS 4) Digital Signatures, PKI
GMSS signature A [A] \ Signatures \ GMSSSignature \ GMSSwithSHA1
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA224
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA256
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA384
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA512
4) Digital Signatures, PKI
Merkle signature A/D [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA1
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA256
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA384
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA512
[D] \ Visuals \ Merkle Signature (XMSS^MT)
4) Digital Signatures, PKI
Bifid D [D] \ Algorithms \ Classic \ Bifid 1) Classic Ciphers
Double box D [D] \ Algorithms \ Classic \ Double Box 1) Classic Ciphers
Dragon D [D] \ Algorithms \ Symmetric \ Dragon 2) Modern Ciphers
Grille [analysis] D [D] \ Analysis \ Grille Analysis 6) Classic Cryptanalysis
Viterbi [analysis] D [D] \ Analysis \ Viterbi Analysis 6) Classic Cryptanalysis
Divider game D [D] \ Games \ Divider Game 11) Games
Sudoku solver D [D] \ Games \ Sudoku Solver 11) Games
Zudo-Ku D [D] \ Games \ Zudo-Ku 11) Games
Key exchange (multipartite) D [D] \ Visuals \ Multipartite Key Exchange 4) Digital Signatures, PKI
Ant Colony Optimization (ACO) D [D] \ Visuals \ Ant Colony Optimization (ACO) 10) Learning Aids and Visualizations
Android Unlock Pattern (AUP) D [D] \ Visuals \ Android Unlock Pattern (AUP) 10) Learning Aids and Visualizations
Shanks Babystep-Giantstep D [D] \ Visuals \ Shanks Babystep-Giantstep 10) Learning Aids and Visualizations
Certificate verification D [D] \ Visuals \ Certificate Verification 10) Learning Aids and Visualizations
EC calculations D [D] \ Visuals \ Elliptic Curve Calculations 10) Learning Aids and Visualizations
Reciprocal subtraction D [D] \ Visuals \ Extended Euclidean / Reciprocal Subtraction 10) Learning Aids and Visualizations
Grille D [D] \ Visuals \ Grille 10) Learning Aids and Visualizations
Homomorphic encryption (HE) (Gentry and Halevi, Paillier, DGK, RSA) D [D] \ Visuals \ Homomorphic Encryption (HE) 10) Learning Aids and Visualizations
Kleptography (4 methods generating a prime, SETUP attack) D [D] \ Visuals \ Kleptography 10) Learning Aids and Visualizations
Knapsack D [D] \ Visuals \ Merkle-Hellman Knapsack Cryptosystem 10) Learning Aids and Visualizations
Square and multiply D [D] \ Visuals \ Simple Power Analysis / Square and Multiply 10) Learning Aids and Visualizations
SPHINCS signature D [D] \ Visuals \ SPHINCS Signature 10) Learning Aids and Visualizations
SPHINCS+ signature D [D] \ Visuals \ SPHINCS+ Signature 4) Digital Signatures, PKI
TLS handshake D [D] \ Visuals \ SSL/TLS Handshake 10) Learning Aids and Visualizations
Verifiable secret sharing (VSS) D [D] \ Visuals \ Verifiable Secret Sharing 10) Learning Aids and Visualizations
Magic door [visual] D [D] \ Visuals \ Magic Door 10) Learning Aids and Visualizations
Fiat Shamir D [D] \ Visuals \ Feige Fiat Shamir
[D] \ Visuals \ Fiat Shamir
10) Learning Aids and Visualizations
Graph isomorphism D [D] \ Visuals \ Graph Isomorphism 10) Learning Aids and Visualizations

Explanation
Abbreviation Meaning
X CT1, CTO: Function is implemented within this program.
D JCT: Function is implemented in the Default Perspective (document-centric view).
A JCT: Function is implemented in the Algorithm Perspective (function-centric view).
C CT2: Function is available as a component on the left of a workspace in CT2.
T CT2: Function is demonstrated in a ready-to-run sample template.
N CT2: Function is available in the navigation bar.
W CT2: Function is part of the wizards.
[x] Path for navigation area x.
<PFAD>\<FUNKTION>* There are different variants for this <FEATURE> under <PATH>.
Postfixes

Function groups (leftmost column) often end with an indication w.r.t. in which way the preceding subject is used or demonstrated.

Postfix Meaning
[visual] Visualization of inner workings, e.g. via the presentation mode within a CT2 component
[PRNG] Pseudo random number generator
[attack or analysis] Templates for breaking a function or protocol
[MPC] Multi-party communication

Print