DE
ctp
cto
ct2
ctts
ct1
jct
scr
ctb
HomepageContributorsLinks / Books

Function Volume

#344

Overview of all functions in all CrypTool programs.

FunctionCT1CT2JCTCTO
Achterbahn
ADFGVX
ADFGX / ADFGVX
Open
AES
AES
Open
AES
Open
AES MAC
Alphabet
Alphabets
Android Unlock Pattern (AUP)
Ant Colony Optimization (ACO)
ASCII
Open
ASN.1
Atbash
ATBASH
Open
Authentication methods in networks
Autocorrelation
Open
Avalanche effect
Bacon cipher
Barcode
Open
Base 64 encode/decode
Base64
Open
BB84
BB84
Beaufort cipher
Open
Berlekamp-Massey algorithm
Bifid
Bifid cipher
Bit shift
Open
BLAKE
Blind signature
Block mode
Blockchain
Blowfish
Blum Blum Shub (BBS) –
Book cipher
Boolean functions
Byte Addition
Byte Addition
Caesar / Rot-13
Caesar / Rot-13
Open
Caesar / Rot-13
Camellia
Camellia MAC
CBC
Certificate verification
ChaCha
Chaocipher
Chè Guevara cipher
Chinese remainder theorem (CRT)
Cipher identifier
Open
CMSS signature
Coin flipping protocol
Corona / COVID
Open
Cost function
Cramer-Shoup
Crib
Cyclic redundancy check (CRC)
Cylinder cipher
Data flow
Data input/output
Decimalization
DES
DES
DES
DES MAC
DESL
DESL
DESX
DESX
DESXL
DESXL
DGK (homomorphic encryption)
DHA
DHA MAC
Dictionary
Differential cryptanalysis (DCA)
Differential cryptanalysis (DCA)
Dining cryptographers protocol
Discrete logarithm
Divider game
Double box
Dragon
DSA signature
EC calculations
EC calculations
EC
ECC-AES
ECDSA signature
ECIES
ECNR signature
ElGamal
Encoding
Encryption with AES and password
Enigma
Enigma
Enigma
Open
Entropy
Factorization of a number
FEAL
Fialka
FIPS PUB-140-1 (test
)
Fleissner Grille
FORK
FORK MAC
Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF)
Frequency test
Open
Friedman test
Gematria
GMSS signature
GOST Magma cipher
GQ signature
Grain
Gronsfeld cipher
Open
Grøstl
Hagelin Machine
Hamming distance
Hash algorithms
Hash
(collisions)
Hash value of a file
HC128
Heartbleed
HIGHT
HIGHT cipher
Hill cipher
Open
Hill cipher
Histogram
HMAC
Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi)
Homophonic substitution
Homophonic substitution cipher
HTTP protocol
Huffman
Open
IDEA
IDEA
IDEA MAC
IDP
ImageHash
Inverse congruence generator (ICG) (
)
ISAP bit commitment scheme
ISBN
Josse cipher
Kamasutra cipher
Open
Kasiski test
Keccak (hash, cipher,
)
Key derivation function (KDF)
Key exchange (BB84)
Key exchange (Diffie-Hellman DH)
Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy)
Key exchange (multipartite)
Key generation from password (PKCS#5)
Key searcher
Keys (display / export)
Keys (generate / import)
Kleptography (4 methods generating a prime, SETUP
)
Knapsack
Kryptos K1
Kryptos K2
LAMBDA1
Lattice
Lattice
Length of a number
Levenshtein distance
LFSR
Linear congruence generator (LCG) (
)
M-138
M-138
M209
M94
MARS
MARS
MARS MAC
McEliece
McEliece signature
MD
MD2
MD4
MD5
MD5
Merkle signature
Mexican Army cipher
Mexican Army cipher
Mickey 2
Misty
Misty MAC
Morse code
Open
Multiplicative cipher
Open
Multivariate cryptography
N-gram
N-gram
Open
Navajo code
Niederreiter
Nihilist
Nihilist cipher
NLFSR
Number Shark (taxman)
Open
Number theory (also see Primes)
Open
Oblivious transfer protocol (
)
One-time pad (OTP)
OpenSSL
Open
Padding oracle
(POA)
Paillier
Paillier (homomorphic encryption)
Password hash (SHA-1)
Password quality
Password-based key derivation functions
PBES2
PBKDF-1 (PKCS#5 2.0)
Periodicity
PKCS#1
PKCS#5
PKCS#5 AES
Playfair
Playfair cipher
Poker-Test (test
)
Porta
Open
Powering
PRESENT
Primes (generators, tests, factorization, tutorials)
Pseudo random number generator (
)
Pseudo random number generator (
) of the Secude library
Public-Key Infrastructure
Purple
Rabbit
Rabin cryptosystem
Railfence
Open
Randomness
RAPPOR
RC2
RC2
RC2 MAC
RC4
RC4
RC5
RC5 MAC
RC6
RC6
RC6 MAC
Reciprocal subtraction
Redactable signature schemes (RSS)
Redefence
Open
RIPEMD
RIPEMD MAC
RIPEMD-160
Rotation cipher
Open
RSA
RSA
RSA
Open
RSA signature
RSA-AES
Runs-Test (test
)
SAFER+
SAFER++
Salsa20
SAT solver
Scytale
Open
Scytale
Scytale / Rail fence
SDES
SDES
Secure Chat – Applied Cryptography
Secure email (S/MIME)
Serial-Test (test
)
Serpent
Serpent
Serpent MAC
SHA
Open
SHA MAC
Shacal
Shacal MAC
Shamir's secret sharing (
)
Shamir's secret sharing (
)
Shanks Babystep-Giantstep
SIGABA cipher
Signature
Signature extraction
Signature verification
Simple multi-client communication – Applied Cryptography
Simple webserver
Solitaire
Solitaire
Sosemanuk
Spanish strip cipher (SSC)
Speck cipher
SPHINCS signature
SPHINCS+ signature
Square and multiply
Steganography
Open
Straddling checkerboard cipher
Substitution
Open
Substitution
Substitution cipher
Syllabary cipher
T-310
T9 code
TEA
Threefish
Tiger
Tiger MAC
TLS handshake
Tools
Open
Transcriptor
Transposition (double column transposition)
Transposition (double column transposition)
Transposition (single column transposition)
Open
Transposition
Trifid cipher
Triple-DES (3DES)
Triple-DES (3DES)
Trithemius
Open
Trivium
Trivium cipher
Twofish
Twofish
Twofish MAC
TwoTrack MAC
UU Decode/Encode
VCard
Verifiable secret sharing (VSS)
Vernam
Open
Vernam
VIC cipher
Vigenère
Open
Vigenère
Vigenère cipher
Open
Visual
codes (QR, EAN8, WAN13, Code39, Code128, PDF417)
Visual
cryptography
Vitányi
Viterbi
VSH
Watermark creator
Web terminal
Open
WEP
WEP
Whirlpool
Winternitz signature
Word pattern
X^2 (mod N) (
)
XOR
Open
Yao's millionaire problem (protocol) (
)
Zero knowledge protocol
Zip/Unzip
Zodiac-408
Zudo-Ku

Crypto function in CTTS: Cryptanalysis with Simulated Annealing