Cryptological functions from all CrypTool versions

Selection

Function CT1 CT2 JCT CTO CT1 Path CT2 Path JCT Path CTO Path Category CT-Version
Triple DES (3DES) X T A Encrypt/Decrypt \ Symmetric (modern) \ Triple DES...… [T] \ Cryptography \ Modern \ Symmetric \ Triple DES Cipher [A] \ Password-Based Ciphers \ PbeWithSHAAnd3_KeyTripleDES_CBC 2) Modern Ciphers
Triple DES (3DES) [analysis] X T Analysis \ Symmetric Encryption (modern) \ Triple DES… [T] \ Cryptanalysis \ Modern \ Triple DES Brute-Force Analysis 7) Modern Cryptanalysis
ADFGX / ADFGVX X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ ADFGVX… [C] \ Classic Ciphers \ ADFGVX
[T] \ Cryptography \ Classical \ ADFGVX Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ ADFGVX
[D] \ Algorithms \ Classic \ ADFGVX ADFG(V)X 1) Classic Ciphers
ADFGVX [analysis] X C/T Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ ADFGVX… [C] \ Cryptanalysis \ Specific \ ADFGVX Analyzer
[T] \ Cryptanalysis \ Classical \ ADFGVX Heuristic Analysis
[T] \ Cryptanalysis \ Classical \ ADFGVX Dictionary Attack
6) Classic Cryptanalysis
AES X C/T/W A/D Encrypt/Decrypt \ Symmetric (modern) \ AES (CBC)...
Encrypt/Decrypt \ Symmetric (modern) \ AES (self extracting)…
[C] \ Modern Ciphers \ Symmetric \ AES
[T] \ Cryptography \ Modern \ Symmetric \ AES Encryption with Implicit Conversion
[T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (File Input)
[T] \ Cryptography \ Modern \ Symmetric \ AES Cipher (Text Input)
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ AES
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_CBC
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_CBC
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_CFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES128_OFB
[A] \ Block Ciphers \ Rijndael \ AES \ AES256_ECB
[A] \ Block Ciphers \ Rijndael \ AES \ AES192_CBC
[D] \ Algorithms \ Symmetric \ AES
2) Modern Ciphers
AES [analysis] X T/W X Analysis \ Symmetric Encryption (modern) \ AES (CBC)… [T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (1)
[T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (1)
[T] \ Cryptanalysis \ Modern \ AES Analysis Using Entropy (2) – with Changeable Plaintext
[T] \ Cryptanalysis \ Modern \ AES Known-Plaintext Analysis (2)
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Ciphertext-only
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ AES \ Known plaintext
Distributed AES Analysis 7) Modern Cryptanalysis
AES [visual] X C/T X Indiv. Procedures \ Visualization of Algorithms \ AES \ [C] \ Modern Ciphers \ Symmetric \ AES Visualization
[T] \ Cryptography \ Modern \ Symmetric \ AES Visualization
AES Animation
AES (step-by-step)
10) Learning Aids and Visualizations
ASN.1 X Indiv. Procedures \ Tools \ Codes \ Decode ASN.1 Code of a Document 9) Codings
Atbash X Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… 1) Classic Ciphers
Authentication methods in networks [visual] X Indiv. Procedures \ Protocols \ Network Authentication… 10) Learning Aids and Visualizations
Autocorrelation X C X Analysis \ Tools for Analysis \ Autocorrelation [C] \ Cryptanalysis \ Generic \ Autocorrelation Autocorrelation 6) Classic Cryptanalysis
Base 64 encode/decode X Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Decode
Indiv. Procedures \ Tools \ Codes \ Base64 Encode/Decode \ Base64 Encode
9) Codings
Byte Addition X Encrypt/Decrypt \ Symmetric (classic) \ Byte Addition… 1) Classic Ciphers
Byte Addition [analysis] X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Byte Addition 6) Classic Cryptanalysis
Caesar / Rot-13 X C/T/W D Encrypt/Decrypt \ Symmetric (classic) \ Caesar / Rot-13… [C] \ Classic Ciphers \ Caesar
[T] \ Cryptography \ Classical \ Caesar Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Caesar
[D] \ Algorithms \ Classic \ Caesar 1) Classic Ciphers
Caesar / Rot-13 [analysis] X T/W/C X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Caesar [T] \ Cryptanalysis \ Classical \ Caesar Brute-Force Analysis
[T] \ Cryptanalysis \ Classical \ Caesar Analysis Using Character Frequencies
[W] \ Cryptanalysis \ Classic Encryption \ Caesar
[C] \ Cryptanalysis \ Specific \ Caesar Analyzer
Caesar / Rot13 6) Classic Cryptanalysis
Caesar / Rot-13 [visual] X Indiv. Procedures \ Visualization of Algorithms \ Caesar… 10) Learning Aids and Visualizations
Chinese remainder theorem (CRT) [visual] X D Indiv. Procedures \ Chinese Remainder Theorem Applications \ [D] \ Visuals \ Chinese Remainder Theorem (CRT) 10) Learning Aids and Visualizations
DES X T/C/W A/D Encrypt/Decrypt \ Symmetric (modern) \ DES… [T] \ Cryptography \ Modern \ Symmetric \ DES Complementation Property
[C] \ Modern Ciphers \ Symmetric \ DES
[T] \ Cryptography \ Modern \ Symmetric \ DES Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ DES
[A] \ Block Ciphers \ DESede \ DESede_CBC
[A] \ Password-Based Ciphers \ PbeWithSHA1AndDES_CBC
[A] \ Password-Based Ciphers \ PbeWithMD5AndDES_CBC
[D] \ Visuals \ Inner States of the Data Encryption Standard (DES)
2) Modern Ciphers
DES [analysis] X T/W Analysis \ Symmetric Encryption (modern) \ DES… [T] \ Cryptanalysis \ Modern \ DES Analysis Using Entropy
[T] \ Cryptanalysis \ Modern \ DES Known-Plaintext Analysis
[T] \ Cryptanalysis \ Modern \ DES Brute-Force Analysis
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ DES \ Known plaintext
7) Modern Cryptanalysis
DES [visual] X C/T Indiv. Procedures \ Visualization of Algorithms \ DES… [C] \ Modern Ciphers \ Symmetric \ DESVisualization
[T] \ Cryptography \ Modern \ Symmetric \ DES Visualization
10) Learning Aids and Visualizations
DESL X Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESL… 2) Modern Ciphers
DESL [analysis] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESL… 7) Modern Cryptanalysis
DESX X Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESX… 2) Modern Ciphers
DESX [analysis] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESX… 7) Modern Cryptanalysis
DESXL X Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ DESXL… 2) Modern Ciphers
DESXL [analysis] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ DESXL… 7) Modern Cryptanalysis
Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy) [visual] X Indiv. Procedures \ Protocols \ Diffie-Hellman Demonstration… 10) Learning Aids and Visualizations
Signature [visual] X D Digital Signatures, PKI \ Signature Demonstration (Signature Generation)…
Indiv. Procedures \ RSA Cryptosystem \ Signature Demonstration (Signature Generation)…
[D] \ Visuals \ Signature Demonstration 10) Learning Aids and Visualizations
Keys (display / export) X Digital Signatures, PKI \ Display/Export Keys… 4) Digital Signatures, PKI
DSA signature X A/D Digital Signatures, PKI \ Sign Document... \ DSA [A] \ Signatures \ DSASignature \ RAW/DSA
[A] \ Signatures \ DSASignature \ SHAwithDSA
[A] \ Signatures \ IQDSASignature \ IQDSA
[A] \ Signatures \ IQDSASignature \ RIPEMD160withIQDSA
[A] \ Signatures \ IQRDSASignature \ IQRDSA
[A] \ Signatures \ IQRDSASignature \ RIPEMD160withIQRDSA
[D] \ Algorithms \ Signature \ DSA
4) Digital Signatures, PKI
ECC-AES X Encrypt/Decrypt \ Hybrid \ ECC-AES… 2) Modern Ciphers
ECDSA signature X A Digital Signatures, PKI \ Sign Document... \ ECSP-DSA [A] \ Signatures \ ECDSASignature \ SHA1/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA512/ECDSA
[A] \ Signatures \ ECDSASignature \ RawECDSA
[A] \ Signatures \ ECDSASignature \ SHA224/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA256/ECDSA
[A] \ Signatures \ ECDSASignature \ SHA384/ECDSA
4) Digital Signatures, PKI
ECNR signature X A Digital Signatures, PKI \ Sign Document... \ ECSP-NR [A] \ Signatures \ SHA1/ECNR 4) Digital Signatures, PKI
EC calculations [visual] X Indiv. Procedures \ Number Theory - Interactive \ Point Addition on Elliptic Curves… 10) Learning Aids and Visualizations
Enigma [visual] X X Indiv. Procedures \ Visualization of Algorithms \ Enigma… Enigma (step-by-step) 10) Learning Aids and Visualizations
Entropy [analysis] X D Analysis \ Tools for Analysis \ Entropy [D] \ Analysis \ Entropy Analysis 6) Classic Cryptanalysis
Signature extraction X Digital Signatures, PKI \ Extract Signature… 4) Digital Signatures, PKI
Factorization of a number X C/T/N/W Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brute-force
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Brent
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Pollard
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Williams
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Lenstra
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number… \ Quadratic Sieve
[C] \ Cryptanalysis \ Generic \ Quadratic Sieve
[T] \ Mathematics \ Factorization with Quadratic Sieve (QS)
[C] \ Cryptanalysis \ Generic \ Factorizer
[T] \ Mathematics \ Factorization with Trial Division (Brute-Force)
[N] \ Crypto tutorials \ World of Primes \ Factorization \ Brute-force
[N] \ Crypto tutorials \ World of Primes \ Factorization \ Quadratic Sieve
[W] \ Mathematical Functions \ Prime Factorization
12) Prime numbers
FIPS PUB-140-1 (test PRNG) X Analysis \ Analyze Randomness \ FIPS PUB-140-1 Test Battery 7) Modern Cryptanalysis
Frequency test X C/T D X Analysis \ Analyze Randomness \ Frequency Test...
Analysis \ Tools for Analysis \ Floating Frequency
[C] \ Cryptanalysis \ Generic \ Frequency Test
[T] \ Cryptanalysis \ Classical \ Frequency Analysis
[D] \ Analysis \ Frequency Analysis Graphical Frequency Analysis 6) Classic Cryptanalysis
Keys (generate / import) X Digital Signatures, PKI \ Generate/Import Keys… 4) Digital Signatures, PKI
Primes (generators, tests, factorization, tutorials) X T/C/N/W Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Miller-Rabin Test
Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ Solovay-Strassen Test
Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers… \ FermatTest
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Miller-Rabin Test
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Fermat Test
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ Solovay-Strassen test
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test… \ AKS test (deterministic procedure)
Indiv. Procedures \ RSA Cryptosystem \ Prime Number Test…
Indiv. Procedures \ RSA Cryptosystem \ Generate Prime Numbers…
Indiv. Procedures \ RSA Cryptosystem \ Factorization of a Number…
[T] \ Mathematics \ Next Smaller Prime Number
[T] \ Mathematics \ Primes Test
[C] \ Tools \ Data input/output \ Prime Generator
[T] \ Mathematics \ Primes Generator
[N] \ Crypto tutorials \ World of Primes
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Eratosthenes
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Miller-Rabin test
[N] \ Crypto tutorials \ World of Primes \ Primality test \ Sieve of Atkin
[N] \ Crypto tutorials \ World of Primes \ Generation of primes \ Generation of primes
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number line
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number grid
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Number of primes
[N] \ Crypto tutorials \ World of Primes \ Distribution of primes \ Ulam's spiral
[C] \ Cryptanalysis \ Generic \ Prime Test
[W] \ Mathematical Functions \ Prime Operations \ Prime Number Generation
12) Prime numbers
Hash algorithms [visual] X D Indiv Procedures \ Hash \ Hash Demonstration… [D] \ Visuals \ Hash Sensitivity 10) Learning Aids and Visualizations
Hash attack (collisions) X Analysis \ Hash \ Attack on the Hash Value of the Digital Signature… 7) Modern Cryptanalysis
Hash value of a file X Indiv. Procedures \ Hash \ Hash Value of a File… 3) Hash and MAC Algorithms
Hill cipher X C/T X Encrypt/Decrypt \ Symmetric (classic) \ Hill… [C] \ Classic Ciphers \ Hill Cipher
[T] \ Cryptography \ Classical \ Hill Cipher
Hill 1) Classic Ciphers
Hill cipher [analysis] X Analysis \ Symmetric encryption (classic) \ Known Plaintext \ Hill… 6) Classic Cryptanalysis
Histogram X Analysis \ Tools for Analysis \ Histogram 6) Classic Cryptanalysis
HMAC X T/C Indiv. Procedures \ Hash \ Generation of HMACs… [T] \ Hash Functions \ HMAC
[C] \ Hash functions \ HMAC
3) Hash and MAC Algorithms
Homophonic substitution cipher X T Encrypt/Decrypt \ Symmetric (classic) \ Homophone… [T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Decryption
[T] \ Cryptography \ Classical \ Homophonic Substitution Cipher and Nomenclature – Encryption
1) Classic Ciphers
IDEA X A/D Encrypt/Decrypt \ Symmetric (modern) \ IDEA… [A] \ Block Ciphers \ IDEA \ IDEA_CFB
[A] \ Block Ciphers \ IDEA \ IDEA_ECB
[A] \ Block Ciphers \ IDEA \ IDEA_OFB
[A] \ Block Ciphers \ IDEA \ IDEA_CBC
[D] \ Algorithms \ Symmetric \ IDEA
2) Modern Ciphers
IDEA [attack] X Analysis \ Symmetric Encryption (modern) \ IDEA… 7) Modern Cryptanalysis
Inverse congruence generator (ICG) (PRNG) X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators
Key generation from password (PKCS#5) X Indiv. Procedures \ Hash \ Key Generation from Password (PKCS #5)… 3) Hash and MAC Algorithms
Length of a number X Indiv. Procedures \ Tools \ Length of a number… 10) Learning Aids and Visualizations
Linear congruence generator (LCG) (PRNG) X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators
MARS X A Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ MARS… [A] \ Block Ciphers \ MARS 2) Modern Ciphers
MARS [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ MARS… 7) Modern Cryptanalysis
MD2 X Indiv. Procedures \ Hash \ MD2 3) Hash and MAC Algorithms
MD4 X A Indiv. Procedures \ Hash \ MD4 [A] \ Message Authentication Codes \ HMac \ HmacMD4 3) Hash and MAC Algorithms
MD5 X T/C A/D Indiv. Procedures \ Hash \ MD5 [T] \ Hash Functions \ MD5 Collision Finder
[T] \ Hash Functions \ MD5 Salted Hash Comparison
[C] \ Hash functions \ MD5
[T] \ Hash Functions \ MD5
[C] \ Cryptanalysis \ Specific \ MD5 Collider
[A] \ Message Authentication Codes \ HMac \ HmacMD5
[D] \ Algorithms \ Hash \ MD5
[D] \ Algorithms \ MAC \ HMacMD5
3) Hash and MAC Algorithms
N-gram [analysis] X Analysis \ Tools for Analysis \ N-Gram… 6) Classic Cryptanalysis
Nihilist [visual] X Indiv. Procedures \ Visualization of Algorithms \ Nihilist… 10) Learning Aids and Visualizations
Number Shark (taxman) X D X Indiv. Procedures \ Educational Games \ Number Shark [D] \ Games \ Number Shark Taxman 11) Games
Number theory (also see Primes) X T/N X Indiv. Procedures \ Number Theory - Interactive \
Indiv. Procedures \ Number Theory - Interactive \ Generic t-adic-NAF Key Generator
[T] \ Mathematics \ Calculating with Big Numbers
[T] \ Mathematics \ Linear Congruential Generator
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Number-theoretic functions
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Primitive roots
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Goldbach's conjecture
Msieve Factorizer 10) Learning Aids and Visualizations
Password quality [visual] X C/T/W Indiv. Procedures \ Tools \ Password Quality Meter...
Indiv. Procedures \ Tools \ Password Entropy...
[C] \ Tools \ Misc \ PasswordStrength
[T] \ Tools \ Check Password Strength
[W] \ Tools \ Password Strength
10) Learning Aids and Visualizations
Periodicity [analysis] X Analysis \ Tools for Analysis \ Periodicity 6) Classic Cryptanalysis
Playfair cipher X C/T/W D Encrypt/Decrypt \ Symmetric (classic) \ Playfair… [C] \ Classic Ciphers \ Playfair
[T] \ Cryptography \ Classical \ Playfair Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Playfair
[D] \ Algorithms \ Classic \ Playfair 1) Classic Ciphers
Playfair [analysis] X T/C Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Playfair… [T] \ Cryptanalysis \ Classical \ Playfair Analysis
[C] \ Cryptanalysis \ Specific \ Playfair Analyzer
6) Classic Cryptanalysis
Poker-Test (test PRNG) X Analysis \ Analyze Randomness \ Poker Test… 7) Modern Cryptanalysis
Scytale / Rail fence X Encrypt/Decrypt \ Symmetric (classic) \ Scytale / Rail Fence… 1) Classic Ciphers
Randomness [visual] X Analysis \ Analyze Randomness \ 3D Visualization… 10) Learning Aids and Visualizations
RC2 X C/T/W A Encrypt/Decrypt \ Symmetric (modern) \ RC2… [C] \ Modern Ciphers \ Symmetric \ RC2
[T] \ Cryptography \ Modern \ Symmetric \ RC2 Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ RC2
[A] \ Block Ciphers \ RC2 \ RC2_CBC
[A] \ Password-Based Ciphers \ PbeWithSHAAnd40BitRC2_CBC
2) Modern Ciphers
RC2 [attack] X Analysis \ Symmetric Encryption (modern) \ RC2… 7) Modern Cryptanalysis
RC4 X C/T D Encrypt/Decrypt \ Symmetric (modern) \ RC4… [C] \ Modern Ciphers \ Symmetric \ RC4
[T] \ Cryptography \ Modern \ Symmetric \ RC4 Cipher
[D] \ Algorithms \ Symmetric \ ARC4/Spritz
[D] \ Visuals \ ARC4 / Spritz
2) Modern Ciphers
RC4 [attack] X Analysis \ Symmetric Encryption (modern) \ RC4… 7) Modern Cryptanalysis
RC6 X A/D Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ RC6… [A] \ Block Ciphers \ RC6
[D] \ Algorithms \ Symmetric \ RC6
2) Modern Ciphers
RC6 [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ RC6… 7) Modern Cryptanalysis
RIPEMD-160 X Indiv. Procedures \ Hash \ RIPEMD-160 3) Hash and MAC Algorithms
RSA X T/C/W A/D Encrypt/Decrypt \ Asymmetric \ RSA
Indiv. Procedures \ RSA Cryptosystem \
[T] \ Cryptography \ Modern \ Asymmetric \ RSA with Big Numbers
[C] \ Modern Ciphers \ Asymmetric \ RSA
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Cipher
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Decryption
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Encryption
[C] \ Modern Ciphers \ Asymmetric \ RSA Key Generator
[T] \ Cryptography \ Modern \ Asymmetric \ RSA Key Generator
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Encryption
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Asymmetric Encryption/Decryption \ RSA \ RSA Decryption
[A] \ Asymmetric Block Ciphers \ RprimeRSA
[A] \ Asymmetric Block Ciphers \ RSA
[A] \ Asymmetric Block Ciphers \ RbRSA
[D] \ Algorithms \ Asymmetric \ RSA
[D] \ Visuals \ Extended RSA Cryptosystem
2) Modern Ciphers
RSA [attack] X T/W Indiv. Procedures \ RSA Cryptosystem \ Lattice-Based Attacks on RSA...
Analysis \ Asymmetric Encryption \ Lattice-Based Attacks on RSA... \
Analysis \ Asymmetric Encryption \ Side-Channel Attack on "Textbook RSA"…
[T] \ Cryptanalysis \ Modern \ RSA Common Factor Attack
[W] \ Cryptanalysis \ Modern Encryption \ Asymmetric Encryption \ RSA
7) Moderne Kryptoanalyse
RSA [visual] X X Indiv. Procedures \ RSA Cryptosystem \ RSA (step-by-step)
RSA visual and more
10) Learning Aids and Visualizations
RSA-AES X Encrypt/Decrypt \ Hybrid \ RSA-AES… 2) Modern Ciphers
Runs-Test (test PRNG) X Analysis \ Analyze Randomness \ Runs Test… 6) Classic Cryptanalysis
Pseudo random number generator (PRNG) of the Secude library X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators
Secure email (S/MIME) [visual] X Indiv. Procedures \ Protocols \ Secure E-Mail with S/MIME… 10) Learning Aids and Visualizations
Serial-Test (test PRNG) X Analysis \ Analyze Randomness \ Serial Test… 7) Modern Cryptanalysis
Serpent X A Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Serpent… [A] \ Block Ciphers \ Serpent \ Serpent192_CBC
[A] \ Block Ciphers \ Serpent \ Serpent192_CFB
[A] \ Block Ciphers \ Serpent \ Serpent128_OFB
[A] \ Block Ciphers \ Serpent \ Serpent256_ECB
[A] \ Block Ciphers \ Serpent \ Serpent256_OFB
[A] \ Block Ciphers \ Serpent \ Serpent256_CFB
[A] \ Block Ciphers \ Serpent \ Serpent128_ECB
[A] \ Block Ciphers \ Serpent \ Serpent192_OFB
[A] \ Block Ciphers \ Serpent \ Serpent192_ECB
[A] \ Block Ciphers \ Serpent \ Serpent128_CBC
[A] \ Block Ciphers \ Serpent \ Serpent128_CFB
[A] \ Block Ciphers \ Serpent \ Serpent256_CBC
2) Modern Ciphers
Serpent [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Serpent… 7) Modern Cryptanalysis
SHA X C/T A/D X Indiv. Procedures \ Hash \ SHA-1
Indiv. Procedures \ Hash \ SHA-256
Indiv. Procedures \ Hash \ SHA-512
[C] \ Hash functions \ SHA
[T] \ Hash Functions \ SHA-1 Collision
[T] \ Hash Functions \ SHA-1
[T] \ Hash Functions \ SHA-256
[A] \ Message Digests \ SHA384
[A] \ Message Digests \ SHA224
[A] \ Message Digests \ SHA1
[A] \ Message Digests \ SHA256
[A] \ Message Digests \ SHA512
[A] \ Pseudo Random Number Generators \ SHA1PRNG
[D] \ Algorithms \ Hash \ SHA-256
[D] \ Algorithms \ Random Number Generator \ SHA-1
[D] \ Algorithms \ Hash \ SHA-3 Candidates
SHA256 3) Hash and MAC Algorithms
Shamir's secret sharing (MPC) [visual] X Indiv. Procedures \ Secret Sharing Demonstration (Shamir)… 10) Learning Aids and Visualizations
Solitaire X C/T Encrypt/Decrypt \ Symmetric (classic) \ Solitaire… [C] \ Classic Ciphers \ Solitaire
[T] \ Cryptography \ Classical \ Solitaire Cipher
1) Classic Ciphers
Solitaire [analysis] X T/C Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Solitaire...
Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Solitaire…
[T] \ Cryptanalysis \ Classical \ Solitaire Brute-Force Analysis
[C] \ Cryptanalysis \ Specific \ Solitaire Analyzer
6) Classic Cryptanalysis
Substitution X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ Substitution / Atbash… [C] \ Classic Ciphers \ Substitution
[T] \ Cryptography \ Classical \ Substitution Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Substitution
[D] \ Algorithms \ Classic \ Substitution Monoalphabetic Substitution 1) Classic Ciphers
Substitution [analysis] X C/T/W D Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Substitution...
Analysis \ Symmetric Encryption (classic) \ Manual Analysis \ Substitution…
[C] \ Cryptanalysis \ Specific \ Monoalphabetic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Monoalphabetic Substitution Analyzer with Arbitrary Ciphertext Alphabet
[W] \ Cryptanalysis \ Classic Encryption \ Monoalphabetic Substitution
[D] \ Analysis \ Substitution Analysis 6) Classic Cryptanalysis
Transposition (single column transposition) X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ Permutation / Transposition… [C] \ Classic Ciphers \ Transposition
[T] \ Cryptography \ Classical \ Transposition Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Transposition
[D] \ Algorithms \ Classic \ Transposition Transposition 1) Classic Ciphers
Transposition [analysis] X T/C/W D Analysis \ Symmetric Encryption (classic) \ Known Plaintext \ Single Column Transposition… [T] \ Cryptanalysis \ Classical \ Transposition Brute-Force Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Crib Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Genetic Analysis
[T] \ Cryptanalysis \ Classical \ Transposition Hill Climbing Analysis
[C] \ Cryptanalysis \ Specific \ Transposition Analyzer
[W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Brute-force
[W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Genetic
[D] \ Analysis \ Transposition Analysis 6) Classic Cryptanalysis
Twofish X T A Encrypt/Decrypt \ Symmetric (modern) \ Further Algorithms \ Twofish… [T] \ Cryptography \ Modern \ Symmetric \ Twofish Cipher [A] \ Block Ciphers \ Twofish 2) Modern Ciphers
Twofish [attack] X Analysis \ Symmetric Encryption (modern) \ Further Algorithms \ Twofish… 7) Modern Cryptanalysis
Zip/Unzip X Indiv. Procedures \ Tools \ Compress \ UnZip
Indiv. Procedures \ Tools \ Compress \ Zip
9) Codings
UU Decode/Encode X Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Decode
Indiv. Procedures \ Tools \ Codes \ UU Encode/Decode \ UU Encode
9) Codings
Signature verification X D Digital Signatures, PKI \ Verify Signature… [D] \ Visuals \ Signature Verification 4) Digital Signatures, PKI
Vernam X C/T X Encrypt/Decrypt \ Symmetric (classic) \ Vernam \ OTP… [C] \ Classic Ciphers \ Vernam
[T] \ Cryptography \ Classical \ Vernam Cipher
Vernam 1) Classic Ciphers
Vernam [analysis] X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ XOR / Vernam 6) Classic Cryptanalysis
Vigenère cipher X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ Vigenère… [C] \ Classic Ciphers \ Vigenère
[T] \ Cryptography \ Classical \ Vigenère Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Vigenère
[D] \ Algorithms \ Classic \ Autokey-Vigenère
[D] \ Algorithms \ Classic \ Vigenère
Autokey
Vigenère
1) Classic Ciphers
Vigenère [analysis] X T/W/C D X Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère
Analysis \ Symmetric Encryption (classic) \ Ciphertext-Only \ Vigenère (Analysis according to Schroedel)…
[T] \ Cryptanalysis \ Classical \ Vigenère Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Vigenère
[C] \ Cryptanalysis \ Specific \ Vigenère Analyzer
[D] \ Analysis \ Vigenère Breaker Vigenère Analysis 6) Classic Cryptanalysis
Vigenère [visual] X Indiv. Procedures \ Visualization of Algorithms \ Vigenère… 10) Learning Aids and Visualizations
Vitányi [analysis] X Analysis \ Analyze Randomness \ Vitányi 7) Modern Cryptanalysis
X^2 (mod N) (PRNG) X Indiv. Procedures \ Tools \ Generate Random Numbers… 5) Random Number Generators
XOR X C/T/W D X Encrypt/Decrypt \ Symmetric (classic) \ XOR… [C] \ Classic Ciphers \ XOR
[T] \ Cryptography \ Classical \ XOR Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ XOR
[D] \ Algorithms \ Classic \ XOR XOR 1) Classic Ciphers
ASCII X ASCII 9) Codings
ATBASH X Atbash 1) Classic Ciphers
Steganography C/T X [C] \ Steganography \ Image Steganography
[T] \ Steganography \ Image Steganography with BPCS
[T] \ Steganography \ Image Steganography with LSB
[C] \ Steganography \ Text Steganography
[T] \ Steganography \ Text Steganography with Capital Letters (Binary Mode)
[T] \ Steganography \ Text Steganography with Capital Letters
[T] \ Steganography \ Text Steganography with Letter Marking (Binary Mode)
[T] \ Steganography \ Text Steganography with Letter Marking
[T] \ Steganography \ Text Steganography with Zero Width Spaces
Bacon 8) Steganography
Barcode X Barcode 9) Codings
Base64 X Base64 9) Codings
Beaufort cipher X Beaufort 1) Classic Ciphers
Bit shift X Bit Shift 14) Tools
Corona / COVID X Corona Tracing 10) Learning Aids and Visualizations
Gronsfeld cipher X Gronsfeld 1) Classic Ciphers
Huffman C/T D X [C] \ Tools \ Codes \ Huffman
[T] \ Tools \ Huffman's Algorithm (ASCII)
[T] \ Tools \ Huffman's Algorithm (BMG, JPG)
[T] \ Tools \ Huffman's Algorithm (UTF-8)
[D] \ Visuals \ Huffman Coding Huffman 9) Codings
Kamasutra cipher X Kamasutra 1) Classic Ciphers
Morse code C/T/W X [C] \ Tools \ Codes \ Morse Code
[T] \ Codes \ Morse Code
[W] \ Codes \ Morse Code
Morse Code 9) Codings
Multiplicative cipher X Multiplicative 1) Classic Ciphers
N-gram analysis X Tabular N-gram Analysis 6) Classic Cryptanalysis
Cipher identifier X NCID 6) Classic Cryptanalysis
Tools C X [C] \ Tools \ Misc \ Byte Array Operations
[C] \ Cryptanalysis \ Generic \ Contains
[C] \ Tools \ Misc \ Number Operation
[C] \ Tools \ Misc \ Progress
Numberconverter
Password Check
Password Generator
Password Meter
14) Tools
OpenSSL X OpenSSL 10) Learning Aids and Visualizations
Porta X Porta 1) Classic Ciphers
Railfence X Railfence 1) Classic Ciphers
Redefence X Redefence 1) Classic Ciphers
Rotation cipher X Rotation 1) Classic Ciphers
Scytale C/T/W X [C] \ Classic Ciphers \ Scytale
[T] \ Cryptography \ Classical \ Scytale Cipher
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Scytale
Scytale 1) Classic Ciphers
Trithemius X Trithemius 1) Classic Ciphers
Web terminal X Wasm Webterm 14) Tools
Alphabet C [C] \ Tools \ Data flow \ Alphabet Permutator 6) Classic Cryptanalysis
Substitution cipher T [T] \ Cryptography \ Classical \ Substitution Cipher Using a Keyword 1) Classic Ciphers
Camellia C/T A [C] \ Modern Ciphers \ Symmetric \ Camellia
[T] \ Cryptography \ Modern \ Symmetric \ Camellia Cipher
[A] \ Block Ciphers \ Camellia \ Camellia256_CBC
[A] \ Block Ciphers \ Camellia \ Camellia192_CBC
[A] \ Block Ciphers \ Camellia \ Camellia128_CBC
2) Modern Ciphers
Data flow C/T [C] \ Tools \ Data flow \ Concatenate
[C] \ Tools \ Data flow \ Array Indexer
[C] \ Tools \ Boolean \ Boolean Binary Operator
[C] \ Tools \ Boolean \ Boolean Not Operator
[C] \ Tools \ Misc \ Comparators
[C] \ Tools \ Misc \ Converter
[C] \ Tools \ Codes \ String Decoder
[C] \ Tools \ Codes \ String Encoder
[C] \ Tools \ Misc \ Length
[C] \ Tools \ Data flow \ Variable Load
[C] \ Tools \ Data flow \ Variable Store
[C] \ Tools \ Misc \ Stream Comparator
[T] \ Tools \ Split a Text
[C] \ Tools \ Data input/output \ File Output
[C] \ Tools \ Data flow \ Gate
[T] \ Tools \ Loop
[C] \ Tools \ Misc \ Inc Dec
[C] \ Tools \ Data input/output \ Picture Output
[C] \ Tools \ Misc \ String Operations
[C] \ Tools \ Data input/output \ Text Output
14) Tools
Cyclic redundancy check (CRC) T/C [T] \ Hash Functions \ CRC Null Problems
[C] \ Hash functions \ CRC
[T] \ Hash Functions \ CRC
3) Hash and MAC Algorithms
Scytale [analysis] T/W [T] \ Cryptanalysis \ Classical \ Scytale Brute-Force Analysis
[W] \ Cryptanalysis \ Classic Encryption \ Scytale
6) Classic Cryptanalysis
Achterbahn C/T [C] \ Modern Ciphers \ Symmetric \ Achterbahn
[T] \ Cryptography \ Modern \ Symmetric \ Achterbahn Cipher
2) Modern Ciphers
Alphabets C [C] \ Tools \ Data input/output \ Alphabets 6) Classic Cryptanalysis
Bacon cipher C/T [C] \ Steganography \ Baconian Cipher
[T] \ Cryptography \ Classical \ Bacon Cipher
8) Steganography
Berlekamp-Massey algorithm C/T [C] \ Cryptanalysis \ Generic \ Berlekamp-Massey Algorithm
[T] \ Mathematics \ Berlekamp-Massey
7) Modern Cryptanalysis
Book cipher C/T [C] \ Classic Ciphers \ Book Cipher
[T] \ Cryptography \ Classical \ Book Cipher with Complete Word Encoding
[T] \ Cryptography \ Classical \ Book Cipher with Single Letter Encoding
1) Classic Ciphers
Chaocipher C/T [C] \ Classic Ciphers \ Chaocipher
[T] \ Cryptography \ Classical \ Chaocipher
1) Classic Ciphers
Data input/output C/T [C] \ Tools \ Data flow \ Clock
[C] \ Tools \ Data input/output \ IP Frame Generator
[C] \ Tools \ Data input/output \ Audio Input
[C] \ Tools \ Data input/output \ Audio Output
[C] \ Tools \ Boolean \ Boolean Input
[T] \ Tools \ Take a Picture Using the Webcam
[C] \ Tools \ Boolean \ Boolean Output
[T] \ Tools \ Random Decimal Number
[C] \ Tools \ Misc \ ImageProcessor
[C] \ Tools \ Data input/output \ Network Receiver
[C] \ Tools \ Data input/output \ Network Sender
[C] \ Tools \ Data input/output \ Number Input
[C] \ Tools \ Data input/output \ Camera
[C] \ Tools \ Data input/output \ Text Input
[C] \ Tools \ Data flow \ CSVReader
[C] \ Tools \ Data input/output \ Dictionary
[C] \ Tools \ Data input/output \ File Input
14) Tools
Cylinder cipher C [C] \ Classic Ciphers \ Cylinder Cipher 1) Classic Ciphers
M94 T [T] \ Cryptography \ Classical \ M94 Test Messages from Joseph O. Mauborgne 1) Classic Ciphers
Enigma C/T/W [C] \ Classic Ciphers \ Enigma
[T] \ Cryptography \ Classical \ Enigma Cipher Machine
[W] \ Encryption/Decryption \ Classic Encryption/Decryption \ Enigma
1) Classic Ciphers
Enigma [attack] T/W/C [T] \ Cryptanalysis \ Classical \ Enigma Gillogly Attack
[T] \ Cryptanalysis \ Classical \ Enigma Hillclimbing Attack
[T] \ Cryptanalysis \ Classical \ Enigma Simulated Annealing Attack
[T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack
[T] \ Cryptanalysis \ Classical \ Enigma Turing Bombe Attack (with Turnover)
[W] \ Cryptanalysis \ Classic Encryption \ Enigma
[C] \ Cryptanalysis \ Specific \ Enigma Analyzer
6) Classic Cryptanalysis
Fialka C/T [C] \ Classic Ciphers \ Fialka
[T] \ Cryptography \ Classical \ Fialka ED Check
[T] \ Cryptography \ Classical \ Fialka ED Mixed Mode Check
[T] \ Cryptography \ Classical \ Fialka ED NumLock10 Check
[T] \ Cryptography \ Classical \ Fialka Key Output
[T] \ Cryptography \ Classical \ Fialka M-125-3 PROTON II
[T] \ Cryptography \ Classical \ Fialka M-125 PROTON I
6) Classic Cryptanalysis
Friedman test T/C D [T] \ Cryptanalysis \ Classical \ Friedman Test for Classical Ciphers
[C] \ Cryptanalysis \ Generic \ Friedman Test
[D] \ Analysis \ Friedman Test 6) Classic Cryptanalysis
WEP [attack] T/C [T] \ Protocols \ WEP Attack
[C] \ Protocols \ Attacks on the WEP Protocol
7) Modern Cryptanalysis
Josse cipher C/T [C] \ Classic Ciphers \ Josse Cipher
[T] \ Cryptography \ Classical \ Josse Cipher
1) Classic Ciphers
Kasiski test C/T [C] \ Cryptanalysis \ Generic \ Kasiski's Test
[T] \ Cryptanalysis \ Classical \ Kasiski's Test and Autocorrelation
6) Classic Cryptanalysis
Pseudo random number generator (PRNG) C/T/W [C] \ Tools \ Random Number \ LFSR
[C] \ Tools \ Random Number \ NLFSR
[C] \ Tools \ Random Number \ Random Number Generator
[T] \ Tools \ Random Number Generators
[W] \ Tools \ Random numbers
5) Random Number Generators
LFSR T D [T] \ Mathematics \ Linear Feedback Shift Register (LFSR) [D] \ Algorithms \ Symmetric \ LFSR 1) Klassische Chiffren
M-138 C/T [C] \ Classic Ciphers \ M-138
[T] \ Cryptography \ Classical \ M-138
1) Classic Ciphers
M-138 [attack] C/T [C] \ Cryptanalysis \ Specific \ M-138 Analyzer
[T] \ Cryptanalysis \ Classical \ M-138 Ciphertext-Only Attack
[T] \ Cryptanalysis \ Classical \ M-138 Known-Plaintext Attack
[T] \ Cryptanalysis \ Classical \ M-138 Partially-Known Plaintext Attack
6) Classic Cryptanalysis
Visual codes (QR, EAN8, WAN13, Code39, Code128, PDF417) T/C/W [T] \ Codes \ RSA Signed QR Code
[T] \ Codes \ QR Code Encryption
[C] \ Tools \ Codes \ Visual Decoder
[T] \ Codes \ QR Code File Decoding
[T] \ Codes \ Detection of Optical Codes
[C] \ Tools \ Codes \ Visual Encoder
[T] \ Codes \ QR Code Creation
[W] \ Codes \ Create visual code
[W] \ Codes \ Decode visual code
3) Hash and MAC Algorithms
PKCS#5 AES T [T] \ Cryptography \ Modern \ Symmetric \ AES with PKCS#5
[T] \ Cryptography \ Modern \ Symmetric \ AES (CBC) with PKCS#5 and IV
[T] \ Cryptography \ Modern \ Symmetric \ AES (ECB) with PKCS#5
2) Modern Ciphers
MD5 [analysis] W [W] \ Cryptanalysis \ Modern Encryption \ Hash Functions \ MD5 3) Hash and MAC Algorithms
Mexican Army cipher C/T [C] \ Classic Ciphers \ Mexican Army Cipher Disk
[T] \ Cryptography \ Classical \ Mexican Army Cipher Disk
1) Classic Ciphers
Mexican Army cipher [analysis] C/T [C] \ Cryptanalysis \ Specific \ Mexican Army Cipher Disk Analyzer
[T] \ Cryptanalysis \ Classical \ Brute-Force Attack on the Mexican Army Cipher Disk
6) Classic Cryptanalysis
Nihilist cipher C/T [C] \ Classic Ciphers \ Nihilist Cipher
[T] \ Cryptography \ Classical \ Nihilist Cipher
1) Classic Ciphers
NLFSR T [T] \ Mathematics \ Non-Linear Feedback Shift Register (NLFSR) 2) Modern Ciphers
Password-based key derivation functions C/T [C] \ Hash functions \ PBKDF
[T] \ Hash Functions \ Password-Based Key Derivation Functions
3) Hash and MAC Algorithms
Dictionary [attack] T [T] \ Hash Functions \ Dictionary Attack on a Password Hash Value 7) Modern Cryptanalysis
Avalanche effect C/T [C] \ Tools \ Misc \ Avalanche Visualization
[T] \ Cryptanalysis \ Modern \ Avalanche (AES)
[T] \ Cryptanalysis \ Modern \ Avalanche (Classic Ciphers)
[T] \ Cryptanalysis \ Modern \ Avalanche (Compare Classic Ciphers)
[T] \ Cryptanalysis \ Modern \ Avalanche (DES)
[T] \ Cryptanalysis \ Modern \ Avalanche (Hash Functions)
[T] \ Cryptanalysis \ Modern \ Avalanche (Modern Ciphers)
10) Learning Aids and Visualizations
BB84 C [C] \ Protocols \ BB84 Error Detector
[C] \ Protocols \ BB84 Key Generator
[C] \ Protocols \ BB84 Photonbase Generator
[C] \ Protocols \ BB84 Photon Decoder
[C] \ Protocols \ BB84 Photon Encoder
13) Protocols
Key exchange (BB84) T [T] \ Protocols \ BB84 Key Exchange with Eavesdropping Attack
[T] \ Protocols \ BB84 Key Exchange
13) Protocols
BB84 [attack] C [C] \ Protocols \ BB84 Man in the Middle 13) Protocols
Bifid cipher C/T [C] \ Classic Ciphers \ Bifid Cipher
[T] \ Cryptography \ Classical \ Bifid Cipher
1) Classic Ciphers
BLAKE C/T [C] \ Hash functions \ BLAKE
[T] \ Hash Functions \ BLAKE
[T] \ Hash Functions \ Password Storage Using Salted BLAKE-256
[T] \ Hash Functions \ Password Verification Using Salted BLAKE-256
3) Hash and MAC Algorithms
Blind signature C [C] \ Modern Ciphers \ Asymmetric \ Blind Signature Generator
[C] \ Modern Ciphers \ Asymmetric \ Blind Signature Verifier
2) Modern Ciphers
Paillier T/C [T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with Paillier
[T] \ Cryptography \ Modern \ Asymmetric \ Blind Signature with RSA
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Voting)
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Blinding
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Key Generator
[C] \ Modern Ciphers \ Asymmetric \ Paillier Key Generator
4) Digital Signatures, PKI
Blockchain C/T [C] \ Protocols \ Blockchain
[T] \ Protocols \ Blockchain Simulation
[C] \ Protocols \ Blockchain Signature Creator
13) Protocols
Blowfish C/T [C] \ Modern Ciphers \ Symmetric \ Blowfish
[T] \ Cryptography \ Modern \ Symmetric \ Blowfish Cipher
2) Modern Ciphers
Threefish T [T] \ Cryptography \ Modern \ Symmetric \ Threefish Cipher 2) Modern Ciphers
Boolean functions T [T] \ Mathematics \ Booleans 14) Tools
ISAP bit commitment scheme T/C [T] \ Mathematics \ ISAP Bit Commitment Scheme
[C] \ Protocols \ ISAP Bit Commitment Scheme
7) Modern Cryptanalysis
ISBN T [T] \ Codes \ ISBN-10 Check
[T] \ Codes \ ISBN-13 Check
9) Codings
Paillier (homomorphic encryption) T/C [T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Number Input)
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher with Addition
[C] \ Modern Ciphers \ Asymmetric \ Paillier
[T] \ Cryptography \ Modern \ Asymmetric \ Paillier Cipher (Text Input)
2) Modern Ciphers
Coin flipping protocol T/C [T] \ Protocols \ Coin Flipping Protocol
[C] \ Protocols \ Coin Flipping
13) Protocols
Key exchange (Diffie-Hellman DH) T D [T] \ Protocols \ Diffie-Hellman Key-Exchange
[T] \ Protocols \ Diffie-Hellman Key-Exchange over Network
[D] \ Visuals \ Diffie-Hellman Key Exchange (EC) 13) Protocols
Dining cryptographers protocol T [T] \ Protocols \ Dining Cryptographers Protocol 10) Learning Aids and Visualizations
Yao's millionaire problem (protocol) (MPC) T/C [T] \ Protocols \ Yao's Millionaire Problem Protocol
[C] \ Protocols \ Yao 1
[C] \ Protocols \ Yao 2
[C] \ Protocols \ Yao 3
13) Protocols
Zero knowledge protocol T/C D [T] \ Protocols \ Zero Knowledge Protocol
[C] \ Protocols \ Zero Knowledge Prover
[C] \ Protocols \ Zero Knowledge Verifier
[D] \ Visuals \ Zero-Knowledge: Magic Door
[D] \ Visuals \ Zero-Knowledge: Fiat Shamir
[D] \ Visuals \ Zero-Knowledge: Feige Fiat Shamir
[D] \ Visuals \ Zero-Knowledge: Graph Isomorphism
10) Learning Aids and Visualizations
ChaCha C/T [C] \ Modern Ciphers \ Symmetric \ ChaCha
[T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher
[T] \ Cryptography \ Modern \ Symmetric \ ChaCha Cipher (Presentation)
2) Modern Ciphers
Encoding T/W [T] \ Tools \ Text Encoding (e.g. Base64)
[W] \ Codes \ Encoding
14) Tools
Cost function C/T [C] \ Cryptanalysis \ Generic \ Cost Function
[T] \ Cryptanalysis \ Classical \ Cost Functions
7) Modern Cryptanalysis
SDES [analysis] T/W [T] \ Cryptanalysis \ Modern \ SDES Brute-Force Analysis
[T] \ Cryptanalysis \ Modern \ SDES Analysis Using Entropy
[T] \ Cryptanalysis \ Modern \ SDES Known-Plaintext Analysis
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Ciphertext-only
[W] \ Cryptanalysis \ Modern Encryption \ Symmetric Encryption \ SDES \ Known plaintext
7) Modern Cryptanalysis
Cramer-Shoup C/T [C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup
[T] \ Cryptography \ Modern \ Asymmetric \ Cramer-Shoup with AES
[C] \ Modern Ciphers \ Asymmetric \ Cramer-Shoup Key Generator
2) Modern Ciphers
CBC [attack] T [T] \ Cryptanalysis \ Modern \ CBC Attack 2) Modern Ciphers
Padding oracle attack (POA) T/C [T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on AES
[T] \ Cryptanalysis \ Modern \ Padding Oracle Attack on DES
[C] \ Cryptanalysis \ Specific \ Padding Oracle
[C] \ Cryptanalysis \ Specific \ Padding Oracle Attack
2) Modern Ciphers
Secure Chat – Applied Cryptography T [T] \ Tools \ Simple Video and Audio Chat Using AES Encryption
[T] \ Tools \ Diffie-Hellman AES Video Audio Chat
[T] \ Tools \ Simple AES Chat
3) Hash and MAC Algorithms
Block mode T [T] \ Cryptography \ Modern \ Symmetric \ Block Modes of Symmetric Ciphers 2) Modern Ciphers
SDES C/T/W [C] \ Modern Ciphers \ Symmetric \ SDES
[T] \ Cryptography \ Modern \ Symmetric \ SDES Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ SDES
2) Modern Ciphers
Differential cryptanalysis (DCA) C/T [C] \ Cryptanalysis \ Specific \ DCA KeyRecovery
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Automatic Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Automatic Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Automatic Mode)
[C] \ Cryptanalysis \ Specific \ DCA Oracle
[C] \ Cryptanalysis \ Specific \ DCA PathFinder
[C] \ Cryptanalysis \ Specific \ DCA PathVisualizer
[C] \ Cryptanalysis \ Specific \ DCA ToyCipher
7) Modern Cryptanalysis
Differential cryptanalysis (DCA) [visual] T [T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 1 (Tutorial Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 2 (Tutorial Mode)
[T] \ Cryptanalysis \ Modern \ Differential Cryptanalysis Tutorial 3 (Tutorial Mode)
10) Learning Aids and Visualizations
Decimalization C/T [C] \ Tools \ Misc \ Decimalization
[T] \ Mathematics \ Decimalization
10) Learning Aids and Visualizations
DGK (homomorphic encryption) C/T [C] \ Modern Ciphers \ Asymmetric \ DGK
[T] \ Cryptography \ Modern \ Asymmetric \ DGK Cipher (Text Input)
[C] \ Modern Ciphers \ Asymmetric \ DGK Key Generator
2) Modern Ciphers
FEAL C/T [C] \ Modern Ciphers \ Symmetric \ FEAL
[T] \ Cryptography \ Modern \ Symmetric \ FEAL Cipher
2) Modern Ciphers
Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF) C/T [C] \ Modern Ciphers \ Symmetric \ Format Preserving Encryption (FPE)
[T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption (XML)
[T] \ Cryptography \ Modern \ Symmetric \ Format Preserving Encryption
2) Modern Ciphers
Grain C/T [C] \ Modern Ciphers \ Symmetric \ Grain v1
[T] \ Cryptography \ Modern \ Symmetric \ Grain v1 Cipher
2) Modern Ciphers
Grøstl C/T [C] \ Hash functions \ Grøstl
[T] \ Hash Functions \ Grøstl
[T] \ Hash Functions \ Password Storage Using Salted Grøstl-256
[T] \ Hash Functions \ Password Verification Using Salted Grøstl-256
3) Hash and MAC Algorithms
Hagelin Machine C/T [C] \ Classic Ciphers \ Hagelin Machine
[T] \ Cryptography \ Classical \ Hagelin Machine
1) Classic Ciphers
HC128 C/T [C] \ Modern Ciphers \ Symmetric \ HC128
[T] \ Cryptography \ Modern \ Symmetric \ HC128 Cipher
2) Modern Ciphers
HIGHT C [C] \ Modern Ciphers \ Symmetric \ HIGHT 2) Modern Ciphers
HIGHT cipher T [T] \ Cryptography \ Modern \ Symmetric \ HIGHT Cipher 2) Modern Ciphers
Key derivation function (KDF) C/T [C] \ Hash functions \ HKDF SHA-256
[T] \ Hash Functions \ KDF Performance Comparison (without Presentation)
[T] \ Hash Functions \ KDF Performance Comparison (with Presentation)
[C] \ Hash functions \ KKDF SHA-256
[C] \ Hash functions \ KKDF SHAKE256
3) Hash and MAC Algorithms
Homophonic substitution [analysis] C/T [C] \ Cryptanalysis \ Specific \ Homophonic Substitution Analyzer
[T] \ Cryptanalysis \ Classical \ Homophonic Substitution Analysis
6) Classic Cryptanalysis
Zodiac-408 [analysis] T [T] \ Cryptanalysis \ Classical \ Zodiac-408 Analysis 6) Classic Cryptanalysis
ImageHash C/T [C] \ Hash functions \ ImageHash
[T] \ Hash Functions \ ImageHash
[T] \ Hash Functions \ ImageHash – Smooth Comparison
3) Hash and MAC Algorithms
Keccak (hash, cipher, PRNG) C/T [C] \ Hash functions \ Keccak
[T] \ Cryptography \ Modern \ Symmetric \ Keccak Cipher
[T] \ Hash Functions \ Keccak Hash (SHA-3)
[T] \ Tools \ Keccak Pseudorandom Number Generator (PRNG)
5) Random Number Generators
LAMBDA1 C/T [C] \ Classic Ciphers \ LAMBDA1
[T] \ Cryptography \ Modern \ Symmetric \ LAMBDA1 Block Cipher
1) Classic Ciphers
M209 C/T [C] \ Classic Ciphers \ M-209
[T] \ Cryptography \ Classical \ M209 Cipher Machine
[T] \ Cryptography \ Classical \ M209 Key Setup
1) Classic Ciphers
GOST Magma cipher C/T [C] \ Modern Ciphers \ Symmetric \ GOST Magma
[T] \ Cryptography \ Modern \ Symmetric \ GOST Magma Cipher
2) Modern Ciphers
Mickey 2 C/T [C] \ Modern Ciphers \ Symmetric \ Mickey 2
[T] \ Cryptography \ Modern \ Symmetric \ Mickey 2 Cipher
2) Modern Ciphers
Heartbleed [analysis] T/W [T] \ Protocols \ Heartbleed Test
[W] \ Tools \ Heartbleed analysis
13) Protocols
HTTP protocol T [T] \ Protocols \ HTTP Request 13) Protocols
Simple webserver T [T] \ Protocols \ Simple Webserver 13) Protocols
Simple multi-client communication – Applied Cryptography T [T] \ Protocols \ Simple Multi Client Communication 13) Protocols
Discrete logarithm T [T] \ Mathematics \ Discrete Logarithm 7) Modern Cryptanalysis
Oblivious transfer protocol (MPC) C/T [C] \ Protocols \ Oblivious Transfer 1
[T] \ Protocols \ Oblivious Transfer Protocol (1 out of n)
[C] \ Protocols \ Oblivious Transfer 2
10) Learning Aids and Visualizations
Purple C/T [C] \ Classic Ciphers \ Purple
[T] \ Cryptography \ Classical \ PURPLE Cipher Machine
1) Classic Ciphers
Rabbit C/T [C] \ Modern Ciphers \ Symmetric \ Rabbit
[T] \ Cryptography \ Modern \ Symmetric \ Rabbit Cipher
2) Modern Ciphers
PRESENT T/C [T] \ Cryptography \ Modern \ Symmetric \ PRESENT Cipher
[C] \ Modern Ciphers \ Symmetric \ PRESENT
2) Modern Ciphers
RAPPOR C/T [C] \ Protocols \ RAPPOR
[T] \ Protocols \ RAPPOR
13) Protocols
Salsa20 C/T [C] \ Modern Ciphers \ Symmetric \ Salsa20
[T] \ Cryptography \ Modern \ Symmetric \ Salsa20 Cipher
2) Modern Ciphers
SAT solver C/T [C] \ Cryptanalysis \ Generic \ SAT Solver
[T] \ Mathematics \ SAT Solver (File Input)
[T] \ Mathematics \ SAT Solver (Text Input)
14) Tools
SIGABA cipher C/T [C] \ Classic Ciphers \ SIGABA
[T] \ Cryptography \ Classical \ SIGABA Cipher Machine
1) Classic Ciphers
Sosemanuk C/T [C] \ Modern Ciphers \ Symmetric \ Sosemanuk
[T] \ Cryptography \ Modern \ Symmetric \ Sosemanuk Cipher
2) Modern Ciphers
Spanish strip cipher (SSC) C/T [C] \ Classic Ciphers \ Spanish Strip Cipher
[T] \ Cryptography \ Classical \ Spanish Strip Cipher
1) Classic Ciphers
Speck cipher C/T [C] \ Modern Ciphers \ Symmetric \ Speck
[T] \ Cryptography \ Modern \ Symmetric \ Speck Cipher
2) Modern Ciphers
T-310 C/T [C] \ Classic Ciphers \ T-310
[T] \ Cryptography \ Classical \ T-310/50 Cipher Machine
[T] \ Cryptography \ Classical \ T-310/51 Cipher Machine
1) Classic Ciphers
Transcriptor [analysis] C/T [C] \ Cryptanalysis \ Generic \ Transcriptor
[T] \ Cryptanalysis \ Classical \ Transcriptor – Manual Mode
[T] \ Cryptanalysis \ Classical \ Transcriptor – Semi-Automatic Mode
6) Classic Cryptanalysis
Trifid cipher C/T [C] \ Classic Ciphers \ Trifid Cipher
[T] \ Cryptography \ Classical \ Trifid cipher
1) Classic Ciphers
VIC cipher C/T [C] \ Classic Ciphers \ VIC Cipher
[T] \ Cryptography \ Classical \ VIC Cipher
1) Classic Ciphers
Visual cryptography C/T [C] \ Modern Ciphers \ Symmetric \ Visual Cryptography
[T] \ Cryptography \ Modern \ Symmetric \ Visual Cryptography
2) Modern Ciphers
VCard T [T] \ Codes \ vCard 9) Codings
Watermark creator C/T [C] \ Steganography \ Watermark Creator
[T] \ Steganography \ Watermark Creator – Invisible Watermark
[T] \ Steganography \ Watermark Creator – Robustness
[T] \ Steganography \ Watermark Creator – Visible Watermark
8) Steganography
Straddling checkerboard cipher C/T [C] \ Classic Ciphers \ Straddling Checkerboard
[T] \ Cryptography \ Classical \ Straddling Checkerboard
1) Classic Ciphers
Chè Guevara cipher T [T] \ Cryptography \ Classical \ Ché Guevara Cipher 1) Classic Ciphers
Gematria T [T] \ Codes \ Gematria 9) Codings
Navajo code T [T] \ Cryptography \ Classical \ Navajo Code 1) Classic Ciphers
Syllabary cipher C/T [C] \ Classic Ciphers \ Syllabary Cipher
[T] \ Cryptography \ Classical \ Syllabary Cipher
1) Classic Ciphers
T9 code C/T [C] \ Tools \ Codes \ T9-Code
[T] \ Codes \ T9 Code
9) Codings
TEA C/T/W [C] \ Modern Ciphers \ Symmetric \ TEA
[T] \ Cryptography \ Modern \ Symmetric \ TEA Cipher
[W] \ Encryption/Decryption \ Modern Encryption/Decryption \ Symmetric Encryption/Decryption \ TEA
2) Modern Ciphers
Trivium C [C] \ Modern Ciphers \ Symmetric \ Trivium 2) Modern Ciphers
Trivium cipher T [T] \ Cryptography \ Modern \ Symmetric \ Trivium Cipher 2) Modern Ciphers
Kryptos K1 [analysis] T [T] \ Cryptanalysis \ Classical \ Kryptos K1 Analysis 6) Classic Cryptanalysis
Kryptos K2 [analysis] T [T] \ Cryptanalysis \ Classical \ Kryptos K2 Analysis 6) Classic Cryptanalysis
WEP C [C] \ Protocols \ WEP Protocol 2) Modern Ciphers
One-time pad (OTP) T [T] \ Cryptography \ Classical \ One-Time Pad Demo
[T] \ Cryptography \ Classical \ One-Time Pad Misusage
1) Classic Ciphers
Word pattern [analysis] T/C [T] \ Cryptanalysis \ Classical \ Wordpattern Analysis
[T] \ Cryptanalysis \ Classical \ Wordpattern Analysis with Self-Defined Dictionary
[C] \ Cryptanalysis \ Generic \ Word Patterns
6) Classic Cryptanalysis
Hamming distance C/T [C] \ Tools \ Misc \ HammingDistance
[T] \ Mathematics \ Hamming Distance
9) Codings
IDP [analysis] C [C] \ Cryptanalysis \ Specific \ IDP Analyzer 7) Modern Cryptanalysis
Transposition (double column transposition) [attack] T [T] \ Cryptanalysis \ Classical \ Dictionary Attack on the Double Columnar Transposition Cipher 7) Modern Cryptanalysis
Key searcher C [C] \ Cryptanalysis \ Specific \ KeySearcher 7) Modern Cryptanalysis
Lattice [visual] N [N] \ Crypto tutorials \ Lattice-based Cryptography
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ GGH
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptography \ LWE
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ Gauss algorithm
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Shortest Vector Problem (SVP) \ LLL algorithm
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Closest Vector Problem (CVP) \ Find closest vector
15) Post-quantum cryptography (PQC)
Lattice [attack] N [N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ Merkle-Hellman Knapsack
[N] \ Crypto tutorials \ Lattice-based Cryptography \ Lattice-based cryptanalysis \ RSA (Coppersmith's attack)
15) Post-quantum cryptography (PQC)
PKCS#1 [attack] N [N] \ Crypto tutorials \ Attacks on PKCS#1
[N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Bleichenbacher attack
[N] \ Crypto tutorials \ Attacks on PKCS#1 \ Attacks on PKCS#1 \ Attack with shorter keys (Kuehn)
10) Learning Aids and Visualizations
PKCS#5 C [C] \ Hash functions \ PKCS#5 3) Hash and MAC Algorithms
Powering [visual] N [N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating exponent)
[N] \ Crypto tutorials \ World of Primes \ Number theory \ Powering (iterating base)(RSA)
12) Prime numbers
RIPEMD C/T A [C] \ Hash functions \ RIPEMD160
[T] \ Hash Functions \ RIPEMD160
[A] \ Message Digests \ RIPEMD320
[A] \ Message Digests \ RIPEMD128
[A] \ Message Digests \ RIPEMD160
[A] \ Message Digests \ RIPEMD256
3) Hash and MAC Algorithms
Password hash (SHA-1) T [T] \ Hash Functions \ Password Store Using Salted SHA-1
[T] \ Hash Functions \ Password Verification Using Salted SHA-1
3) Hash and MAC Algorithms
PBKDF-1 (PKCS#5 2.0) T [T] \ Hash Functions \ PBKDF-1 (PKCS#5 2.0) 3) Hash and MAC Algorithms
Levenshtein distance T [T] \ Mathematics \ Levenshtein Distance 14) Tools
Tiger C/T A [C] \ Hash functions \ Tiger
[T] \ Hash Functions \ Tiger
[A] \ Message Digests \ Tiger 3) Hash and MAC Algorithms
Transposition (double column transposition) T [T] \ Cryptography \ Classical \ Double Columnar Transposition Cipher 1) Classic Ciphers
Whirlpool C/T [C] \ Hash functions \ Whirlpool
[T] \ Hash Functions \ Whirlpool
3) Hash and MAC Algorithms
Crib [analysis] W [W] \ Cryptanalysis \ Classic Encryption \ Transposition \ Crib 6) Classic Cryptanalysis
Encryption with AES and password W [W] \ Tools \ Encrypt with password 13) Protocols
ElGamal A/D [A] \ Asymmetric Block Ciphers \ ElGamal
[D] \ Algorithms \ Asymmetric \ ElGamal
2) Modern Ciphers
McEliece signature A [A] \ Asymmetric Block Ciphers \ McEliecePKCS 15) Post-quantum cryptography (PQC)
Niederreiter A [A] \ Asymmetric Block Ciphers \ Niederreiter
[A] \ Signatures \ NiederreiterCFS
15) Post-quantum cryptography (PQC)
RC5 A [A] \ Block Ciphers \ RC5 2) Modern Ciphers
Shacal A [A] \ Block Ciphers \ Shacal
[A] \ Block Ciphers \ Shacal2
2) Modern Ciphers
SAFER++ A [A] \ Block Ciphers \ SAFER++
[A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER++
2) Modern Ciphers
SAFER+ A [A] \ Block Ciphers \ SAFER+
[A] \ Message Authentication Codes \ CBCMac \ CBCmacSAFER+
2) Modern Ciphers
Misty A [A] \ Block Ciphers \ Misty1 2) Modern Ciphers
ECIES A [A] \ Hybrid Ciphers \ ECIES 2) Modern Ciphers
McEliece A/D [A] \ Hybrid Ciphers \ McElieceFujisakiCipher
[A] \ Hybrid Ciphers \ McElieceKobaraImaiCipher
[D] \ Visuals \ McEliece Cryptosystem
15) Post-quantum cryptography (PQC)
AES MAC A [A] \ Message Authentication Codes \ CMac \ CmacAES128
[A] \ Message Authentication Codes \ CMac \ CmacAES192
[A] \ Message Authentication Codes \ CMac \ CmacAES256
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES256
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES192
[A] \ Message Authentication Codes \ CBCMac \ CBCmacAES128
3) Hash and MAC Algorithms
DES MAC A [A] \ Message Authentication Codes \ CMac \ CmacDESede
[A] \ Message Authentication Codes \ CBCMac \ CBCmacDESede
3) Hash and MAC Algorithms
Tiger MAC A [A] \ Message Authentication Codes \ HMac \ HmacTiger 3) Hash and MAC Algorithms
FORK MAC A [A] \ Message Authentication Codes \ HMac \ HmacFORK256 3) Hash and MAC Algorithms
SHA MAC A [A] \ Message Authentication Codes \ HMac \ HmacSHA512
[A] \ Message Authentication Codes \ HMac \ HmacSHA1
[A] \ Message Authentication Codes \ HMac \ HmacSHA224
[A] \ Message Authentication Codes \ HMac \ HmacSHA256
[A] \ Message Authentication Codes \ HMac \ HmacSHA384
3) Hash and MAC Algorithms
RIPEMD MAC A [A] \ Message Authentication Codes \ HMac \ HmacRIPEMD256
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD128
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD160
[A] \ Message Authentication Codes \ HMac \ HmacRIPEMD320
3) Hash and MAC Algorithms
DHA MAC A [A] \ Message Authentication Codes \ HMac \ HmacDHA256 3) Hash and MAC Algorithms
Serpent MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacSerpent 3) Hash and MAC Algorithms
RC5 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC5 3) Hash and MAC Algorithms
RC6 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC6 3) Hash and MAC Algorithms
RC2 MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacRC2 3) Hash and MAC Algorithms
IDEA MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacIDEA 3) Hash and MAC Algorithms
Misty MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacMisty1 3) Hash and MAC Algorithms
MARS MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacMARS 3) Hash and MAC Algorithms
Camellia MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacCamellia 3) Hash and MAC Algorithms
Twofish MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacTwofish 3) Hash and MAC Algorithms
Shacal MAC A [A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal
[A] \ Message Authentication Codes \ CBCMac \ CBCmacShacal2
3) Hash and MAC Algorithms
TwoTrack MAC A [A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac160
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac64
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac32
[A] \ Message Authentication Codes \ TwoTrackMac \ TwoTrackMac96
[A] \ Message Authentication Codes \ TwoTrackMac \ TTmac128
3) Hash and MAC Algorithms
DHA A [A] \ Message Digests \ DHA256 3) Hash and MAC Algorithms
VSH A [A] \ Message Digests \ VSH 3) Hash and MAC Algorithms
MD A [A] \ Message Digests \ MD5
[A] \ Message Digests \ MD4
3) Hash and MAC Algorithms
FORK A [A] \ Message Digests \ FORK256 3) Hash and MAC Algorithms
PBES2 A [A] \ Password-Based Ciphers \ PBES2 2) Modern Ciphers
Blum Blum Shub (BBS) – PRNG A [A] \ Pseudo Random Number Generators \ BBSRandom 5) Random Number Generators
EC PRNG A [A] \ Pseudo Random Number Generators \ ECPRNG 5) Random Number Generators
RSA signature A [A] \ Signatures \ RprimeRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA384/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ MD5withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256withRSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA1/RSA
[A] \ Signatures \ RSASignaturePKCS1v15 \ MD5/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA512/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA224/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ RIPEMD160/RSA/RAW
[A] \ Signatures \ RSASignaturePKCS1v15 \ SHA256/RSA/RAW
[A] \ Signatures \ RbRSA
[A] \ Signatures \ SSL_MD5andSHA1withRSA
4) Digital Signatures, PKI
GQ signature A [A] \ Signatures \ IQGQSignature \ IQGQ
[A] \ Signatures \ IQGQSignature \ RIPEMD160withIQGQ
4) Digital Signatures, PKI
Winternitz signature A/D [A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_3
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA384andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA256andWinternitzOTS_1
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_2
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA512andWinternitzOTS_4
[A] \ Signatures \ CMSSSignature \ CMSSwithSHA1andWinternitzOTS_3
[D] \ Visuals \ Winternitz OT-Signature (WOTS / WOTS+)
4) Digital Signatures, PKI
CMSS signature A [A] \ Signatures \ CMSSSignature \ CMSS 4) Digital Signatures, PKI
GMSS signature A [A] \ Signatures \ GMSSSignature \ GMSSwithSHA512
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA1
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA224
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA256
[A] \ Signatures \ GMSSSignature \ GMSSwithSHA384
4) Digital Signatures, PKI
Merkle signature A/D [A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA512
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA384
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA1
[A] \ Signatures \ MerkleOTSSignature \ MerkleOTSwithSHA256
[D] \ Visuals \ Merkle Signatures (XMSS^MT)
15) Post-quantum cryptography (PQC)
Bifid D [D] \ Algorithms \ Classic \ Bifid 1) Classic Ciphers
Double box D [D] \ Algorithms \ Classic \ Double Box 1) Classic Ciphers
Dragon D [D] \ Algorithms \ Symmetric \ Dragon 2) Modern Ciphers
Fleissner Grille [analysis] D [D] \ Analysis \ Fleissner-Grille Analysis 6) Classic Cryptanalysis
Viterbi [analysis] D [D] \ Analysis \ Viterbi Analysis 6) Classic Cryptanalysis
Divider game D [D] \ Games \ Divider Game 11) Games
Zudo-Ku D [D] \ Games \ Zudo-Ku 11) Games
Key exchange (multipartite) D [D] \ Visuals \ Multipartite Key Exchange (BD II) 10) Learning Aids and Visualizations
Ant Colony Optimization (ACO) D [D] \ Visuals \ Ant Colony Optimization (ACO) 10) Learning Aids and Visualizations
Android Unlock Pattern (AUP) D [D] \ Visuals \ Android Unlock Pattern (AUP) 10) Learning Aids and Visualizations
Shanks Babystep-Giantstep D [D] \ Visuals \ Shanks Babystep-Giantstep 10) Learning Aids and Visualizations
Certificate verification D [D] \ Visuals \ Certificate Verification 10) Learning Aids and Visualizations
EC calculations D [D] \ Visuals \ Elliptic Curve Calculations 10) Learning Aids and Visualizations
Reciprocal subtraction D [D] \ Visuals \ Extended Euclidean / Reciprocal Subtraction 10) Learning Aids and Visualizations
Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi) D [D] \ Visuals \ Homomorphic Encryption (HE) 10) Learning Aids and Visualizations
Public-Key Infrastructure D [D] \ Visuals \ Public-Key Infrastructure 4) Digital Signatures, PKI
Kleptography (4 methods generating a prime, SETUP attack) D [D] \ Visuals \ Kleptography 10) Learning Aids and Visualizations
Knapsack D [D] \ Visuals \ Merkle-Hellman Knapsack Cryptosystem 10) Learning Aids and Visualizations
Rabin cryptosystem D [D] \ Visuals \ Rabin Cryptosystem 2) Modern Ciphers
Multivariate cryptography D [D] \ Visuals \ Multivariate Cryptography 15) Post-quantum cryptography (PQC)
Redactable signature schemes (RSS) D [D] \ Visuals \ Redactable Signature Schemes (RSS) 10) Learning Aids and Visualizations
Shamir's secret sharing (MPC) D [D] \ Visuals \ Shamir's Secret Sharing 13) Protocols
Square and multiply D [D] \ Visuals \ Simple Power Analysis / Square and Multiply 10) Learning Aids and Visualizations
SPHINCS signature D [D] \ Visuals \ SPHINCS Signature 15) Post-quantum cryptography (PQC)
SPHINCS+ signature D [D] \ Visuals \ SPHINCS+ Signature 15) Post-quantum cryptography (PQC)
TLS handshake D [D] \ Visuals \ SSL/TLS Handshake 10) Learning Aids and Visualizations
Verifiable secret sharing (VSS) D [D] \ Visuals \ Verifiable Secret Sharing 10) Learning Aids and Visualizations

Explanation
Abbreviation Meaning
X CT1, CTO: Function is implemented within this program.
D JCT: Function is implemented in the Default Perspective (document-centric view).
A JCT: Function is implemented in the Algorithm Perspective (function-centric view).
C CT2: Function is available as a component on the left of a workspace in CT2.
T CT2: Function is demonstrated in a ready-to-run sample template.
N CT2: Function is available in the navigation bar.
W CT2: Function is part of the wizards.
[x] Path for navigation area x.
<PFAD>\<FUNKTION>* There are different variants for this <FEATURE> under <PATH>.
Postfixes

Function groups (leftmost column) often end with an indication w.r.t. in which way the preceding subject is used or demonstrated.

Postfix Meaning
[visual] Visualization of inner workings, e.g. via the presentation mode within a CT2 component
[PRNG] Pseudo random number generator
[attack or analysis] Templates for breaking a function or protocol
[MPC] Multi-party communication