Function Volume

#344

Overview of all functions in all CrypTool programs.

FunktionCT1CT2JCTCTO

Achterbahn

ADFGVX

ADFGX / ADFGVX

Open

AES

AES

Open

AES

Open

AES MAC

Alphabet

Alphabets

Android Unlock Pattern (AUP)

Ant Colony Optimization (ACO)

ASCII

Open

ASN.1

Atbash

ATBASH

Open

Authentication methods in networks

Autocorrelation

Open

Avalanche effect

Bacon cipher

Barcode

Open

Base 64 encode/decode

Base64

Open

BB84

BB84

Beaufort cipher

Open

Berlekamp-Massey algorithm

Bifid

Bifid cipher

Bit shift

Open

BLAKE

Blind signature

Block mode

Blockchain

Blowfish

Blum Blum Shub (BBS) –

Book cipher

Boolean functions

Byte Addition

Byte Addition

Caesar / Rot-13

Caesar / Rot-13

Open

Caesar / Rot-13

Camellia

Camellia MAC

CBC

Certificate verification

ChaCha

Chaocipher

Chè Guevara cipher

Chinese remainder theorem (CRT)

Cipher identifier

Open

CMSS signature

Coin flipping protocol

Corona / COVID

Open

Cost function

Cramer-Shoup

Crib

Cyclic redundancy check (CRC)

Cylinder cipher

Data flow

Data input/output

Decimalization

DES

DES

DES

DES MAC

DESL

DESL

DESX

DESX

DESXL

DESXL

DGK (homomorphic encryption)

DHA

DHA MAC

Dictionary

Differential cryptanalysis (DCA)

Differential cryptanalysis (DCA)

Dining cryptographers protocol

Discrete logarithm

Divider game

Double box

Dragon

DSA signature

EC calculations

EC calculations

EC

ECC-AES

ECDSA signature

ECIES

ECNR signature

ElGamal

Encoding

Encryption with AES and password

Enigma

Enigma

Enigma

Open

Entropy

Factorization of a number

FEAL

Fialka

FIPS PUB-140-1 (test

)

Fleissner Grille

FORK

FORK MAC

Format preserving encryption (FPE) (FF1, FF2, FF3 and DFF)

Frequency test

Open

Friedman test

Gematria

GMSS signature

GOST Magma cipher

GQ signature

Grain

Gronsfeld cipher

Open

Grøstl

Hagelin Machine

Hamming distance

Hash algorithms

Hash

(collisions)

Hash value of a file

HC128

Heartbleed

HIGHT

HIGHT cipher

Hill cipher

Open

Hill cipher

Histogram

HMAC

Homomorphic Encryption (HE) (with RSA, Paillier, Gentry & Hallevi)

Homophonic substitution

Homophonic substitution cipher

HTTP protocol

Huffman

Open

IDEA

IDEA

IDEA MAC

IDP

ImageHash

Inverse congruence generator (ICG) (

)

ISAP bit commitment scheme

ISBN

Josse cipher

Kamasutra cipher

Open

Kasiski test

Keccak (hash, cipher,

)

Key derivation function (KDF)

Key exchange (BB84)

Key exchange (Diffie-Hellman DH)

Key exchange (Diffie-Hellman DH) (Perfect Forward Secrecy)

Key exchange (multipartite)

Key generation from password (PKCS#5)

Key searcher

Keys (display / export)

Keys (generate / import)

Kleptography (4 methods generating a prime, SETUP

)

Knapsack

Kryptos K1

Kryptos K2

LAMBDA1

Lattice

Lattice

Length of a number

Levenshtein distance

LFSR

Linear congruence generator (LCG) (

)

M-138

M-138

M209

M94

MARS

MARS

MARS MAC

McEliece

McEliece signature

MD

MD2

MD4

MD5

MD5

Merkle signature

Mexican Army cipher

Mexican Army cipher

Mickey 2

Misty

Misty MAC

Morse code

Open

Multiplicative cipher

Open

Multivariate cryptography

N-gram

N-gram

Open

Navajo code

Niederreiter

Nihilist

Nihilist cipher

NLFSR

Number Shark (taxman)

Open

Number theory (also see Primes)

Open

Oblivious transfer protocol (

)