What is CrypTool 1

CrypTool 1 (CT1) is an open-source Windows program for cryptography and cryptanalysis. It’s the most wide-spreaded e-learning software of its kind.

What is CrypTool 2?

CrypTool 2 (CT2) is an open-source program offering an innovative visual programming GUI to experiment with cryptographic procedures and to animate their cascades.

What is JCrypTool?

JCrypTool (JCT) is an open-source e-learning platform, allowing to experiment comprehensively with cryptography on Linux, MAC OS X, and Windows.

What is CrypTool-Online?

CrypTool-Online (CTO) runs in a browser and provides a huge variety of encryption methods and analysis tools including many illustrated examples.

What is MysteryTwister C3?

MysteryTwister C3 (MTC3) is an international Crypto Cipher Contest offering a broad variety of challenges, a moderated forum and an ongoing hall-of-fame.

Selection
Cryptographic category:
Additional search phrase:
CrypTool 1 (CT1)    CrypTool 2 (CT2)    JCrypTool (JCT)   CrypTool Online (CTO) 

Function CT1 CT2 JCT CTO CT 1 Path CT 2 Path JCT Path CTO Path Category CT-Version
ADFGVX X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ ADFGVX… [C] Classic Ciphers\ ADFGVX
[T] Cryptanalysis\ Classical\ ADFGVX Cipher dictionary attack
[T] Cryptography\ Classical\ ADFGVX Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ ADFGVX
[D] Algorithms\ Classic\ ADFGVX Ciphers\ ADFGVX 1) Classic Ciphers
Affine Cipher X Ciphers\ Multiplicative 1) Classic Ciphers
Alberti X Ciphers\ Alberti 1) Classic Ciphers
AMSCO X Ciphers\ AMSCO 1) Classic Ciphers
Atbash X Encrypt/Decrypt\ Symmetric (classic)\ Substitution / Atbash… 1) Classic Ciphers
Autokey Vigenère D X [D] Algorithms\ Classic\ Autokey Vigenère Ciphers\ Autokey 1) Classic Ciphers
Beaufort X Ciphers\ Beaufort 1) Classic Ciphers
Bifid D X [D] Algorithms\ Classic\ Bifid Ciphers\ Bifid 1) Classic Ciphers
Byte Addition X Encrypt/Decrypt\ Symmetric (classic)\ Byte Addition… 1) Classic Ciphers
Caesar X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Caesar / Rot-13… [C] Classic Ciphers\ Caesar
[T] Cryptography\ Classical\ Caesar Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Caesar
[D] Algorithms\ Classic\ Caesar Ciphers\ Caesar / Rot-13 1) Classic Ciphers
Double Box D [D] Algorithms\ Classic\ Double Box 1) Classic Ciphers
Enigma C\T\W X [C] Classic Ciphers\ Enigma
[T] Cryptanalysis\ Classical\ Enigma Analysis
[T] Cryptography\ Classical\ Enigma Cipher Machine
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Enigma
[W] Cryptanalysis\ Classic Encryption\ Enigma
Ciphers\ Enigma 1) Classic Ciphers
Four Square X Ciphers\ Four-Square 1) Classic Ciphers
Freemason X Ciphers\ Freemason 1) Classic Ciphers
Gronsfeld X Ciphers\ Gronsfeld 1) Classic Ciphers
Hill X C\T X Encrypt/Decrypt\ Symmetric (classic)\ Hill… [C] Classic Ciphers\ Hill Cipher
[T] Cryptography\ Classical\ Hill Cipher
Ciphers\ Hill 1) Classic Ciphers
Homophone X X Encrypt/Decrypt\ Symmetric (classic)\ Homophone… Ciphers\ Homophonic 1) Classic Ciphers
Kamasutra X Ciphers\ Kamasutra 1) Classic Ciphers
Larrabee X Ciphers\ Larrabee 1) Classic Ciphers
Lorenz SZ42 C [C] Classic Ciphers\ Lorenz SZ42 1) Classic Ciphers
M-138 C\T [C] Classic Ciphers\ M-138
[T] Cryptography\ Classical\ M-138
1) Classic Ciphers
M209 C\T [C] Classic Ciphers\ M209
[T] Cryptography\ Classical\ M209 Cipher Machine
[T] Cryptography\ Classical\ M209 Key Setup
1) Classic Ciphers
Navajo T X [T] Cryptography\ Classical\ Navajo Code Ciphers\ Navajo 1) Classic Ciphers
Nihilist C\T X [C] Classic Ciphers\ Nihilist
[T] Cryptography\ Classical\ Nihilist Cipher
Ciphers\ Nihilist 1) Classic Ciphers
Playfair X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Playfair… [C] Classic Ciphers\ Playfair
[T] Cryptography\ Classical\ Playfair Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Playfair
[D] Algorithms\ Classic\ Playfair Ciphers\ Playfair 1) Classic Ciphers
Pollux X Ciphers\ Pollux 1) Classic Ciphers
Polybius X Ciphers\ Polybius 1) Classic Ciphers
Porta X Ciphers\ Porta 1) Classic Ciphers
Purple C\T [C] Classic Ciphers\ Purple
[T] Cryptography\ Classical\ PURPLE Cipher Machine
1) Classic Ciphers
Rail Fence X X Encrypt/Decrypt\ Symmetric (classic)\ Scytale / Rail Fence… Ciphers\ Zigzag (Rail Fence) 1) Classic Ciphers
Rot-13 X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Caesar / Rot-13… [C] Classic Ciphers\ Caesar
[T] Cryptography\ Classical\ CaesarCipher
[W] Start\ Encryption/Decryption\ Classic Encryption/Decryption\ Caesar
[D] Algorithms\ Classic\ Caesar Ciphers\ Caesar / Rot-13 1) Classic Ciphers
Rotation X Ciphers\ Rotation 1) Classic Ciphers
Scytale X C\T\W X Encrypt/Decrypt\ Symmetric (classic)\ Scytale / Rail Fence… [C] Classic Ciphers\ Scytale
[T] Cryptanalysis\ Classical\ Scytale Brute-force Analysis
[T] Cryptography\ Classical\ Scytale Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Scytale
[W] Cryptanalysis\ Classic Encryption\ Scytale
Ciphers\ Scytale 1) Classic Ciphers
Solitaire X C\T Encrypt/Decrypt\ Symmetric (classic)\ Solitaire… [C] Classic Ciphers\ Solitaire
[T] Cryptography\ Classical\ Solitaire Cipher
1) Classic Ciphers
Spanish Strip Cipher C\T [C] Classic Ciphers\ Spanish Strip Cipher
[T] Cryptography\ Classical\ Spanish Strip Cipher
1) Classic Ciphers
Substitution X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Substitution / Atbash… [C] Classic Ciphers\ Substitution
[T] Cryptography\ Classical\ Navajo Code
[T] Cryptography\ Classical\ Substitution Cipher
[T] Cryptography\ Classical\ Substitution Cipher using a password
[T] Tools\ Split a text
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Substitution
[D] Algorithms\ Classic\ Substitution Ciphers\ Monoalphabetic Substitution 1) Classic Ciphers
T-310\50 C\T [C] Classic Ciphers\ T-310\50
[T] Cryptography\ Classical\ T310/50 Cipher Machine
1) Classic Ciphers
Templar X Ciphers\ Templar 1) Classic Ciphers
Transposition (Double Column) X C D Encrypt/Decrypt\ Symmetric (classic)\ Permutation / Transposition… [C] Classic Ciphers\ Transposition [D] Algorithms\ Classic\ Transposition 1) Classic Ciphers
Transposition (Single Column) X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Permutation / Transposition… [C] Classic Ciphers\ Transposition
[T] Cryptography\ Classical\ Transposition Cipher
[D] Algorithms\ Classic\ Transposition Ciphers\ Transposition 1) Classic Ciphers
Trithemius X Ciphers\ Trithemius 1) Classic Ciphers
Vernam X C Encrypt/Decrypt\ Symmetric (classic)\ Vernam\ OTP… [C] Classic Ciphers\ Vernam 1) Classic Ciphers
Vigenère X C\T\W D X Encrypt/Decrypt\ Symmetric (classic)\ Vigenère… [C] Classic Ciphers\ Vigenère
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[T] Cryptanalysis\ Classical\ Vigenère Analysis
[T] Cryptography\ Classical\ Vigenère Cipher
[W] Encryption/Decryption\ Classic Encryption/Decryption\ Vigenère
[W] Cryptanalysis\ Classic Encryption\ Vigenère
[D] Algorithms\ Classic\ Vigenère Ciphers\ Vigenère 1) Classic Ciphers
XOR X C\T\W D Encrypt/Decrypt\ Symmetric (classic)\ XOR… [C] Classic Ciphers\ XOR
[T] Cryptography\ Classical\ One Time Pad Demo
[T] Cryptography\ Classical\ One Time Pad Misusage
[T] Cryptography\ Classical\ XOR Cipher
[T] Cryptography\ Modern\ Symmetric\ DES Complementation Property
[T] Cryptography\ Modern\ Symmetric\ Keccak Cipher
[T] Hash Functions\ HMAC
[W] Encryption/Decryption\ Classic Encryption/Decryption\ XOR
[D] Algorithms\ Classic\ XOR 1) Classic Ciphers
3DES X C A Encrypt/Decrypt\ Symmetric (modern)\ Triple DES… [C] Modern Ciphers\ Symmetric\ DES [A] Block Ciphers\ Block Ciphers\ DESede_CBC (OID: 1.2.840.113549.3.7) 2) Modern Ciphers
Achterbahn C\T [C] Modern Ciphers\ Symmetric\ Achterbahn
[T] Cryptography\ Modern\ Symmetric\ Achterbahn Cipher
2) Modern Ciphers
AES X C\T\W D X Encrypt/Decrypt\ Symmetric (modern)\ AES (CBC)...
Encrypt/Decrypt\ Symmetric (modern)\ AES (self extracting)…
[C] Modern Ciphers\ Symmetric\ AES
[T] Codes\ AES (CBC) with PKCS#5 and IV, output as QR Code
[T] Codes\ QR Code Encryption
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (1)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (1)
[T] Cryptanalysis\ Modern\ CBC-Attack
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (2)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (2)
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on AES
[T] Cryptography\ Modern\ Asymmetric\ Cramer-Shoup with AES
[T] Cryptography\ Modern\ Symmetric\ AES Cipher with SHA hashes
[T] Cryptography\ Modern\ Symmetric\ AES encryption with implicit conversion
[T] Cryptography\ Modern\ Symmetric\ AES Cipher (File Input)
[T] Cryptography\ Modern\ Symmetric\ AES with PKCS#5
[T] Cryptography\ Modern\ Symmetric\ AES (CBC) with PKCS#5 and IV
[T] Cryptography\ Modern\ Symmetric\ AES (ECB) with PKCS#5
[T] Cryptography\ Modern\ Symmetric\ AES Cipher (Text Input)
[
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_CBC (OID: 2.16.840.1.101.3.4.1.2)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_CFB (OID: 2.16.840.1.101.3.4.1.4)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_ECB (OID: 2.16.840.1.101.3.4.1.1)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES128_OFB (OID: 2.16.840.1.101.3.4.1.3)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_CBC (OID: 2.16.840.1.101.3.4.1.22)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_CFB (OID: 2.16.840.1.101.3.4.1.24)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_ECB (OID: 2.16.840.1.101.3.4.1.21)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES192_OFB (OID: 2.16.840.1.101.3.4.1.23)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES256_CBC (OID: 2.16.840.1.101.3.4.1.42)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES256_ECB (OID: 2.16.840.1.101.3.4.1.41)
[A] Block Ciphers\ Block Ciphers\ Rijndael\ AES256_CFB (OID: 2.16.840.1.101.3.4.1.44)
[A] Block Ciphers\ Block Ciphers\ Rijn
Highlights\ AES 2) Modern Ciphers
Camellia C\T A [C] Modern Ciphers\ Symmetric\ Camellia
[T] Cryptography\ Modern\ Symmetric\ Camellia Cipher
[A] Block Ciphers\ Block Ciphers\ Camellia128_CBC (OID: 1.2.392.200011.61.1.1.1.2)
[A] Block Ciphers\ Block Ciphers\ Camellia192_CBC (OID: 1.2.392.200011.61.1.1.1.3)
[A] Block Ciphers\ Block Ciphers\ Camellia256_CBC (OID: 1.2.392.200011.61.1.1.1.4)
2) Modern Ciphers
Cramer-Shoup C\T [C] Modern Ciphers\ Asymmetric\ Cramer-Shoup
[T] Cryptography\ Modern\ Asymmetric\ Cramer-Shoup with AES
[C] Modern Ciphers\ Asymmetric\ Cramer-Shoup Key Generator
[T] Cryptography\ Modern\ Asymmetric\ Cramer-Shoup with AES
2) Modern Ciphers
DES X C\T\W Encrypt/Decrypt\ Symmetric (modern)\ DES… [C] Modern Ciphers\ Symmetric\ DES
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptanalysis\ Modern\ DES Known-Plaintext Analysis
[T] Cryptanalysis\ Modern\ DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on DES
[T] Cryptography\ Modern\ Symmetric\ Block Modes of Symmetric Ciphers
[T] Cryptography\ Modern\ Symmetric\ DES Cipher
[T] Cryptography\ Modern\ Symmetric\ DES Complementation Property
[T] Cryptography\ Modern\ Symmetric\ Triple DES Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ DES
[W] Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ DES\ Ciphertext-only
2) Modern Ciphers
DESL X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESL… 2) Modern Ciphers
DESX X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESX… 2) Modern Ciphers
DESXL X Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ DESXL… 2) Modern Ciphers
Dragon D [D] Algorithms\ Symmetric\ Dragon 2) Modern Ciphers
Dynamic Group Keying (DGK) C [C] Modern Ciphers\ Asymmetric\ DGK
[C] Modern Ciphers\ Asymmetric\ DGK Key Generator
2) Modern Ciphers
ECC-AES X Encrypt/Decrypt\ Hybrid\ ECC-AES… 2) Modern Ciphers
ECIES A [A] Hybrid Ciphers\ ECIES 2) Modern Ciphers
ElGamal A [A] Asymmetric Block Ciphers\ ElGamal (OID: 1.3.14.7.2.1.1) 2) Modern Ciphers
Enhanced RSA Crypto System (identities‚ multi-prime) D [D] Visualizations\ RSA Cryptosystem
[D] Visualizations\ Extended RSA Cryptosystem
2) Modern Ciphers
Grain v1 C\T [C] Modern Ciphers\ Symmetric\ Grain v1
[T] Cryptography\ Modern\ Symmetric\ Grain v1 Cipher
2) Modern Ciphers
HC128 C\T [C] Modern Ciphers\ Symmetric\ HC128
[T] Cryptography\ Modern\ Symmetric\ HC128 Cipher
2) Modern Ciphers
HIGHT C [C] Modern Ciphers\ Symmetric\ HIGHT 2) Modern Ciphers
IDEA X D Encrypt/Decrypt\ Symmetric (modern)\ IDEA… [A] Block Ciphers\ Block Ciphers\ IDEA_ECB (OID: 1.3.6.1.4.1.188.7.1.1.1)
[A] Block Ciphers\ Block Ciphers\ IDEA_CBC (OID: 1.3.6.1.4.1.188.7.1.1.2)
[A] Block Ciphers\ Block Ciphers\ IDEA_CFB (OID: 1.3.6.1.4.1.188.7.1.1.3)
[A] Block Ciphers\ Block Ciphers\ IDEA_OFB (OID: 1.3.6.1.4.1.188.7.1.1.4)
2) Modern Ciphers
LFSR C\T D [C] Protocols\ LFSR
[T] Mathematics\ Linear Feedback Shift Register (LFSR)
[D] Algorithms\ Symmetric\ LFSR 2) Modern Ciphers
MARS X A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ MARS… [A] Block Ciphers\ MARS 2) Modern Ciphers
McEliece Fujisaki A [A] Hybrid Ciphers\ McElieceFujisakiCipher (OID: 1.3.6.1.4.1.8301.3.1.3.4.2.1) 2) Modern Ciphers
McEliece Kobara Imai A [A] Hybrid Ciphers\ McElieceKobaraImaiCipher (OID: 1.3.6.1.4.1.8301.3.1.3.4.2.3) 2) Modern Ciphers
McEliece PKCS A [A] Asymmetric Block Ciphers\ McEliecePKCS (OID: 1.3.6.1.4.1.8301.3.1.3.4.1) 2) Modern Ciphers
McEliece Pointcheval A [A] Hybrid Ciphers\ McEliecePointchevalCipher (OID: 1.3.6.1.4.1.8301.3.1.3.4.2.2) 2) Modern Ciphers
MeRSA A [A] Asymmetric Block Ciphers\ MeRSA
[A] Signatures\ MeRSA
2) Modern Ciphers
Mickey 2 C\T [C] Modern Ciphers\ Symmetric\ Mickey 2
[T] Cryptography\ Modern\ Symmetric\ Mickey2 Cipher
2) Modern Ciphers
Misty-1 (Kasumi) A [A] Block Ciphers\ Misty1 2) Modern Ciphers
MpRSA D [D] Visualizations\ RSA Cryptosystem
[D] Visualizations\ Extended RSA Cryptosystem
2) Modern Ciphers
Niederreiter A [A] Asymmetric Block Ciphers\ Niederreiter 2) Modern Ciphers
NLFSR C\T [C] Protocols\ NLFSR
[T] Mathematics\ Non-Linear Feedback Shift Register (NLFSR)
2) Modern Ciphers
Paillier Cryptosystem C\T [C] Modern Ciphers\ Asymmetric\ Paillier
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher (Number Input)
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher with Addition
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher with Blinding
[T] Cryptography\ Modern\ Asymmetric\ Paillier Key Generator
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher (Text Input)
[T] Cryptography\ Modern\ Asymmetric\ Paillier Cipher (Voting)
2) Modern Ciphers
PRESENT C\T [C] Modern Ciphers\ Symmetric\ PRESENT
[T] Cryptography\ Modern\ Symmetric\ PRESENT Cipher
[T] Tools\ Keccak PRNG
2) Modern Ciphers
Rabbit C\T [C] Modern Ciphers\ Symmetric\ Rabbit
[T] Cryptography\ Modern\ Symmetric\ Rabbit Cipher
2) Modern Ciphers
RC2 X C\T\W A Encrypt/Decrypt\ Symmetric (modern)\ RC2… [C] Modern Ciphers\ Symmetric\ RC2
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptography\ Modern\ Symmetric\ RC2 Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ RC2
[A] Block Ciphers\ Block Ciphers\ RC2_CBC (OID: 1.2.840.113549.3.2) 2) Modern Ciphers
RC4 X C\T D Encrypt/Decrypt\ Symmetric (modern)\ RC4… [C] Modern Ciphers\ Symmetric\ RC4
[T] Cryptography\ Modern\ Symmetric\ RC4 Cipher
[D] Algorithms\ Symmetric\ ARC4/Spritz 2) Modern Ciphers
RC5 A [A] Block Ciphers\ RC5 2) Modern Ciphers
RC6 X D\A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ RC6… [A] Block Ciphers\ RC6 2) Modern Ciphers
Rijndael C\T [C] Modern Ciphers\ Symmetric\ AES
[T] Cryptography\ Modern\ Symmetric\ AES*
2) Modern Ciphers
RSA X C\T\W A Encrypt/Decrypt\ Asymmetric\ RSA
Indiv. Procedures\ RSA Cryptosystem\
[C] Modern Ciphers\ Asymmetric\ RSA
[T] Codes\ RSA signed QR code
[T] Cryptography\ Modern\ Asymmetric\ RSA Cipher
[T] Cryptography\ Modern\ Asymmetric\ RSA Decryption
[T] Cryptography\ Modern\ Asymmetric\ RSA Encryption
[T] Protocols\ Yao's Millionaire Problem
[W] Cryptanalysis\ Modern Encryption\ Asymmetric Encryption\ RSA
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Asymmetric Encryption/Decryption\ RSA\ RSA Decryption
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Asymmetric Encryption/Decryption\ RSA\ RSA Encryption
[C] Modern Ciphers\ Asymmetric\ RSA Key Generator
[T] Codes\ RSA signed QR code
[T] Cryptography\ Modern\ Asymmetric\ RSA Cipher
[T] Cryptography\ Modern\ Asymmetric\ RSA Key Generator
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
[T] Protocols\ Yao's Millionaire Problem
[A] Asymmetric Block Ciphers\ RSA (OID: 1.2.840.113549.1.1.1)
[A] Asymmetric Block Ciphers\ RbRSA (OID: 1.2.840.113549.1.1.7)
[A] Asymmetric Block Ciphers\ RprimeRSA
2) Modern Ciphers
RSA-AES X Encrypt/Decrypt\ Hybrid\ RSA-AES… 2) Modern Ciphers
SAFER+ A [A] Block Ciphers\ SAFER+ 2) Modern Ciphers
SAFER++ A [A] Block Ciphers\ SAFER++ 2) Modern Ciphers
Salsa20 C\T [C] Modern Ciphers\ Symmetric\ Salsa20
[T] Cryptography\ Modern\ Symmetric\ Salsa20 Cipher
2) Modern Ciphers
Serpent X A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ Serpent… [A] Block Ciphers\ Block Ciphers\ Serpent128_CBC (OID: 1.3.6.1.4.1.11591.13.2.2)
[A] Block Ciphers\ Block Ciphers\ Serpent128_CFB (OID: 1.3.6.1.4.1.11591.13.2.4)
[A] Block Ciphers\ Block Ciphers\ Serpent128_ECB (OID: 1.3.6.1.4.1.11591.13.2.1)
[A] Block Ciphers\ Block Ciphers\ Serpent128_OFB (OID: 1.3.6.1.4.1.11591.13.2.3)
[A] Block Ciphers\ Block Ciphers\ Serpent192_CBC (OID: 1.3.6.1.4.1.11591.13.2.22)
[A] Block Ciphers\ Block Ciphers\ Serpent192_CFB (OID: 1.3.6.1.4.1.11591.13.2.24)
[A] Block Ciphers\ Block Ciphers\ Serpent192_ECB (OID: 1.3.6.1.4.1.11591.13.2.21)
[A] Block Ciphers\ Block Ciphers\ Serpent192_OFB (OID: 1.3.6.1.4.1.11591.13.2.23)
[A] Block Ciphers\ Block Ciphers\ Serpent256_CBC (OID: 1.3.6.1.4.1.11591.13.2.42)
[A] Block Ciphers\ Block Ciphers\ Serpent256_CFB (OID: 1.3.6.1.4.1.11591.13.2.44)
[A] Block Ciphers\ Block Ciphers\ Serpent256_ECB (OID: 1.3.6.1.4.1.11591.13.2.41)
[A] Block Ciphers\ Block Ciphers\ Serpent256_OFB (OID: 1.3.6.1.4.1.11591.13.2.43)
2) Modern Ciphers
SHA-3 (Keccak) Streamcipher T [T] Cryptography\ Modern Ciphers\ Symmetric\ Keccak Streamcipher 2) Modern Ciphers
Shacal A [A] Block Ciphers\ Shacal 2) Modern Ciphers
Shacal2 A [A] Block Ciphers\ Shacal2 2) Modern Ciphers
Simplified DES C\T\W [C] Modern Ciphers\ Symmetric\ SDES
[T] Cryptanalysis\ Modern\ SDES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Analysis using Entropy
[T] Cryptanalysis\ Modern\ SDES Known-Plaintext Analysis
[T] Cryptography\ Modern\ Symmetric\ SDES Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ SDES
[W] Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ SDES\ Ciphertext-only
2) Modern Ciphers
Sosemanuk C\T [C] Modern Ciphers\ Symmetric\ Sosemanuk
[T] Cryptography\ Modern\ Symmetric\ Sosemanuk Cipher
2) Modern Ciphers
TEA C\T\W [C] Modern Ciphers\ Symmetric\ TEA
[T] Cryptography\ Modern\ Symmetric\ TEA Cipher
[W] Start\ Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ TEA
2) Modern Ciphers
Trivium C [C] Modern Ciphers\ Symmetric\ Trivium 2) Modern Ciphers
Twofish X C\T\W A Encrypt/Decrypt\ Symmetric (modern)\ Further Algorithms\ Twofish… [C] Modern Ciphers\ Symmetric\ Twofish
[T] Cryptography\ Modern\ Symmetric\ Twofish Cipher
[W] Encryption/Decryption\ Modern Encryption/Decryption\ Symmetric Encryption/Decryption\ Twofish
[A] Block Ciphers\ Twofish 2) Modern Ciphers
Wired Equivalent Privacy (WEP) C\T [C] Protocols\ WEP Protocol
[T] Protocols\ WEP Attack
2) Modern Ciphers
XML Security D [D] Algorithms\ XML Security\ 2) Modern Ciphers
BLAKE C\T [C] Hash functions\ BLAKE
[T] Hash Functions\ BLAKE
[T] Hash Functions\ Password storage using salted BLAKE-256
[T] Hash Functions\ Password verification using salted BLAKE-256
3) Hash and MAC Algorithms
CBC MACs A [A] Message Authentication Codes\ Message Authentication Codes\ CBCmacAES128
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacAES192
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacAES256
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacCamellia
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacDESede
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacIDEA
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacMARS
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacMisty1
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacRC2
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacRC5
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacRC6
[A] Message Authentication Codes\ Message Authentication Codes\ CBCmacSAFER+
[A] Message Authentication Codes\ Message Authentication Codes\
3) Hash and MAC Algorithms
Cipher-Based MACs (CMAC) A [A] Message Authentication Codes\ Message Authentication Codes\ CmacAES128
[A] Message Authentication Codes\ Message Authentication Codes\ CmacAES192
[A] Message Authentication Codes\ Message Authentication Codes\ CmacAES256
[A] Message Authentication Codes\ Message Authentication Codes\ CmacDESede
3) Hash and MAC Algorithms
CRC-1/Partiy C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-10 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-11 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-12/3GPP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-12/DECT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-14/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-15 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-15/MPT1327 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/AUG-CCITT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/BUYPASS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/CCITT-FALSE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DDS-110 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DECT-R C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DECT-X C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/DNP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/EN-13757 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/GENIBUS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/IBM-SDLC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/MAXIM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/MCRF4XX C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/RIELLO C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/T10-DIF C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/TELEDISK C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/TMS37157 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-16/USB C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/FLEXRAY-A C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/FLEXRAY-B C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-24/OPENPGP C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-3/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-31/PHILIPS C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/BZIP2 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/MPEG-2 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32/POSIX C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32C C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32D C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-32Q C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-4/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-40/GSM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/EPC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-5/USB C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-6/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-6/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/1B C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/Jones C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-64/WE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-7 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-7/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/CCITT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/DARC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/EBU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/I-CODE C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/ITU C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/J1850 C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/MAXIM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/ROHC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-8/WCDMA C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CRC-A C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
DHA256 A [A] Message Digests\ DHA256 3) Hash and MAC Algorithms
FORK-256 A [A] Message Digests\ FORK256 3) Hash and MAC Algorithms
Grøstl C\T [C] Hash functions\ Grøstl
[T] Hash Functions\ Grøstl
[T] Hash Functions\ Password storage using salted Grøstl-256
[T] Hash Functions\ Password verification using salted Grøstl-256
3) Hash and MAC Algorithms
Hash Value of a File X D\A Indiv. Procedures\ Hash\ Hash Value of a File… [D] Hash\MD5
[D] Hash\SHA
[D] Hash\SHA3-Candidates
[A] Messages Digests\
3) Hash and MAC Algorithms
HMACs X C\T A Indiv. Procedures\ Hash\ Generation of HMACs… [C] Protocols\ HMAC
[T] Hash Functions\ HMAC
[A] Message Authentication Codes\ Message Authentication Codes\ Hmac (OID: 1.3.6.1.5.5.8.1.2)
[A] Message Authentication Codes\ Message Authentication Codes\ HmacDHA256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacFORK256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacMD4
[A] Message Authentication Codes\ Message Authentication Codes\ HmacMD5 (OID: 1.3.6.1.5.5.8.1.1)
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD128
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD160 (OID: 1.3.6.1.5.5.8.1.4)
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacRIPEMD320
[A] Message Authentication Codes\ Message Authentication Codes\ HmacSHA224
[A] Message Authentication Codes\ Message Authentication Codes\ HmacSHA256
[A] Message Authentication Codes\ Message Authentication Codes\ HmacSHA384
3) Hash and MAC Algorithms
ImageHash C\T [C] Hash functions\ ImageHash
[T] Hash Functions\ ImageHash
[T] Hash Functions\ ImageHash -- smooth comparison
3) Hash and MAC Algorithms
JAMCRC C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
KERMIT C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
Key Generation from Password (PKCS#5) X Indiv. Procedures\ Hash\ Key Generation from Password (PKCS #5)… 3) Hash and MAC Algorithms
MD2 X Indiv. Procedures\ Hash\ MD2 3) Hash and MAC Algorithms
MD4 X A Indiv. Procedures\ Hash\ MD4 [A] Message Digests\ MD4 (OID: 1.2.840.113549.2.4) 3) Hash and MAC Algorithms
MD5 X C\T\W D Indiv. Procedures\ Hash\ MD5 [C] Hash functions\ MD5
[T] Codes\ RSA signed QR code
[T] Cryptography\ Modern\ Symmetric\ AES with PKCS#5
[T] Hash Functions\ HMAC
[T] Hash Functions\ MD5
[T] Hash Functions\ MD5 Collision Finder
[T] Hash Functions\ MD5 Salted Hash Comparison
[W] Cryptanalysis\ Modern Encryption\ Hash Functions\ MD5
[A] Message Digests\ MD5 (OID: 1.2.840.113549.2.5) 3) Hash and MAC Algorithms
MODBUS C [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
Password Store Using Salted SHA-1 T [T] Hash Functions\ Password store using salted SHA-1 3) Hash and MAC Algorithms
Password Verification Using Salted SHA-1 T [T] Hash Functions\ Password verification using salted SHA-1 3) Hash and MAC Algorithms
PKCS#5 C A [C] Hash functions\ PKCS#5
[T] Codes\ AES (CBC) with PKCS#5 and IV, output as QR Code
[T] Codes\ QR Code Encryption
[T] Cryptography\ Modern\ Symmetric\ AES with PKCS#5
[T] Cryptography\ Modern\ Symmetric\ AES (CBC) with PKCS#5 and IV
[T] Cryptography\ Modern\ Symmetric\ AES (ECB) with PKCS#5
[T] Tools\ Simple Video and Audio Chat using AES encryption
[T] Tools\ Diffie-Hellman AES Video Audio Chat
[A] Password-Based Ciphers\ PBES2 (OID: 1.2.840.113549.1.5.13)
[A] Password-Based Ciphers\ PbeWithMD5AndDES_CBC (OID: 1.2.840.113549.1.5.3)
[A] Password-Based Ciphers\ PbeWithSHA1AndDES_CBC (OID: 1.2.840.113549.1.5.10)
[A] Password-Based Ciphers\ PbeWithSHAAnd3_KeyTripleDES_CBC (OID: 1.2.840.113549.1.12.1.3)
[A] Password-Based Ciphers\ PbeWithSHAAnd40BitRC2_CBC (OID: 1.2.840.113549.1.12.1.6)
3) Hash and MAC Algorithms
RIPEMD-160 X C\T\W A Indiv. Procedures\ Hash\ RIPEMD-160 [C] Hash functions\ RIPEMD160
[T] Hash Functions\ RIPEMD160
[A] Message Digests\ RIPEMD128 (OID: 1.3.36.3.2.2)
[A] Message Digests\ RIPEMD160 (OID: 1.3.36.3.2.1)
[A] Message Digests\ RIPEMD256 (OID: 1.3.36.3.2.3)
[A] Message Digests\ RIPEMD320
3) Hash and MAC Algorithms
SHA C\T\W D [C] Hash functions\ SHA
[T] Hash Functions\ SHA-1 Collision
[T] Hash Functions\ SHA-1
[T] Cryptography\ Modern\ Symmetric\ AES Cipher with SHA hashes
[T] Hash Functions\ Dictionary Attack
[T] Hash Functions\ PBKDF-1 (PKCS#5 2.0)
[T] Protocols\ Coin Flipping Protocol
[T] Hash Functions\ SHA-256
[T] Tools\ Password Generator
[T] Tools\ Simple AES Chat
[D] Algorithms\ Hash\ SHA 3) Hash and MAC Algorithms
SHA-1 X C D Indiv. Procedures\ Hash\ SHA-1 [C] Hash functions\ SHA [A] Message Digests\ SHA1 (OID: 1.3.14.3.2.26) 3) Hash and MAC Algorithms
SHA-256 X C D\A Indiv. Procedures\ Hash\ SHA-256 [C] Hash functions\ SHA [A] Message Digests\ SHA256 (OID: 2.16.840.1.101.3.4.2.1) 3) Hash and MAC Algorithms
SHA-3 Candidates C D [C] Hash functions\ SHA [D] Algorithms\ Hash\ SHA3-Candidates 3) Hash and MAC Algorithms
SHA-3 (Keccak) C [C] Hash functions\ SHA 3) Hash and MAC Algorithms
SHA-384 C A [C] Hash functions\ SHA [A] Message Digests\ SHA384 (OID: 2.16.840.1.101.3.4.2.2) 3) Hash and MAC Algorithms
SHA-512 X C A Indiv. Procedures\ Hash\ SHA-512 [C] Hash functions\ SHA [A] Message Digests\ SHA512 (OID: 2.16.840.1.101.3.4.2.3) 3) Hash and MAC Algorithms
Tiger C\T\W A [C] Hash Functions\ Tiger
[T] Hash Functions\ Tiger
[A] Message Digests\ Tiger (OID: 1.3.6.1.4.1.11591.12.2) 3) Hash and MAC Algorithms
Two-Track MAC A [A] Message Authentication Codes\ Message Authentication Codes\ TTmac128
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac160
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac32
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac64
[A] Message Authentication Codes\ Message Authentication Codes\ TwoTrackMac96
3) Hash and MAC Algorithms
VSH A [A] Message Digests\ VSH 3) Hash and MAC Algorithms
Whirlpool C\T\W [C] Hash Functions\ Whirlpool
[T] Hash Functions\ Whirlpool
3) Hash and MAC Algorithms
XFER C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
XMODEM C\T [C] Hash Functions\ CRC
[T] Hash Functions\ CRC
3) Hash and MAC Algorithms
CMSS A [A] Signatures\ Signatures\ CMSS (OID: 1.3.6.1.4.1.8301.3.1.3.2.6)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_1 (OID: 1.3.6.1.4.1.8301.3.1.3.2.1)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_2 (OID: 1.3.6.1.4.1.8301.3.1.3.2.2)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_3 (OID: 1.3.6.1.4.1.8301.3.1.3.2.3)
[A] Signatures\ Signatures\ CMSSwithSHA1andWinternitzOTS_4 (OID: 1.3.6.1.4.1.8301.3.1.3.2.4)
[A] Signatures\ Signatures\ CMSSwithSHA256andWinternitzOTS_1 (OID: 1.3.6.1.4.1.8301.3.1.3.2.5)
[A] Signatures\ Signatures\ CMSSwithSHA256andWinternitzOTS_3 (OID: 1.3.6.1.4.1.8301.3.1.3.2.7)
[A] Signatures\ Signatures\ CMSSwithSHA256andWinternitzOTS_4 (OID: 1.3.6.1.4.1.8301.3.1.3.2.8)
[A] Signatures\ Signatures\ CMSSwithSHA384andWinternitzOTS_1 (OID: 1.3.6.1.4.1.8301.3.1.3.2.9)
[A] Signatures\ Signatures\ CMSSwithSHA384andWinternitzOTS_2 (OID: 1.3.6.1.4.1.8301.3.1.3.2.10)
[A] Signatures\ Signatures\ CMSSwithSHA384andWinternitzOTS_3 (OID: 1.
4) Digital Signatures/PKI
Display/Export Keys X Digital Signatures/PKI\ Display/Export Keys… 4) Digital Signatures/PKI
DSA X A Digital Signatures/PKI\ Sign Document...\ DSA [A] Signatures\ Signatures\ RAW/DSA 4) Digital Signatures/PKI
ECDSA X A Digital Signatures/PKI\ Sign Document...\ ECSP-DSA [A] Signatures\ Signatures\ RawECDSA
[A] Signatures\ Signatures\ SHA1/ECDSA (OID: 1.2.840.10045.4.1)
[A] Signatures\ Signatures\ SHA224/ECDSA (OID: 1.2.840.10045.4.3.1)
[A] Signatures\ Signatures\ SHA256/ECDSA (OID: 1.2.840.10045.4.3.2)
[A] Signatures\ Signatures\ SHA384/ECDSA (OID: 1.2.840.10045.4.3.3)
[A] Signatures\ Signatures\ SHA512/ECDSA (OID: 1.2.840.10045.4.3.4)
4) Digital Signatures/PKI
ECNR X A Digital Signatures/PKI\ Sign Document...\ ECSP-NR [A] Signatures\ SHA1/ECNR 4) Digital Signatures/PKI
Extract Signature X Digital Signatures/PKI\ Extract Signature… 4) Digital Signatures/PKI
Generate/Import Keys X Digital Signatures/PKI\ Generate/Import Keys… 4) Digital Signatures/PKI
GMSS A [A] Signatures\ Signatures\ GMSSwithSHA1 (OID: 1.3.6.1.4.1.8301.3.1.3.3.1)
[A] Signatures\ Signatures\ GMSSwithSHA224 (OID: 1.3.6.1.4.1.8301.3.1.3.3.2)
[A] Signatures\ Signatures\ GMSSwithSHA256 (OID: 1.3.6.1.4.1.8301.3.1.3.3.3)
[A] Signatures\ Signatures\ GMSSwithSHA384 (OID: 1.3.6.1.4.1.8301.3.1.3.3.4)
[A] Signatures\ Signatures\ GMSSwithSHA512 (OID: 1.3.6.1.4.1.8301.3.1.3.3.5)
4) Digital Signatures/PKI
IQDSA A [A] Signatures\ Signatures\ IQDSA (OID: 1.3.6.1.4.1.8301.3.1.1.2)
[A] Signatures\ Signatures\ RIPEMD160withIQDSA (OID: 1.3.6.1.4.1.8301.3.1.1.3)
4) Digital Signatures/PKI
IQGQ A [A] Signatures\ Signatures\ IQGQ (OID: 1.3.6.1.4.1.8301.3.1.1.5)
[A] Signatures\ Signatures\ RIPEMD160withIQDSA (OID: 1.3.6.1.4.1.8301.3.1.1.3)
4) Digital Signatures/PKI
IQRDSA A [A] Signatures\ Signatures\ IQRDSA (OID: 1.3.6.1.4.1.8301.3.1.1.8)
[A] Signatures\ Signatures\ RIPEMD160withIQRDSA (OID: 1.3.6.1.4.1.8301.3.1.1.9)
4) Digital Signatures/PKI
Merkle OTS A [A] Signatures\ Signatures\ MerkleOTSwithSHA1 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.1)
[A] Signatures\ Signatures\ MerkleOTSwithSHA256 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.2)
[A] Signatures\ Signatures\ MerkleOTSwithSHA384 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.3)
[A] Signatures\ Signatures\ MerkleOTSwithSHA512 (OID: 1.3.6.1.4.1.8301.3.1.3.1.1.4)
4) Digital Signatures/PKI
Niederreiter CFS A [A] Signatures\ NiederreiterCFS (OID: 1.3.6.1.4.1.8301.3.1.3.4.3.2) 4) Digital Signatures/PKI
RSA A [A] Signatures\ Signatures\ MD5/RSA/RAW
[A] Signatures\ Signatures\ MD5withRSA (OID: 1.2.840.113549.1.1.4)
[A] Signatures\ Signatures\ RIPEMD160/RSA (OID: 1.3.36.3.3.1.2)
[A] Signatures\ Signatures\ RIPEMD160/RSA/RAW
[A] Signatures\ Signatures\ SHA1/RSA (OID: 1.2.840.113549.1.1.5)
[A] Signatures\ Signatures\ SHA1/RSA/RAW
[A] Signatures\ Signatures\ SHA224/RSA (OID: 1.2.840.113549.1.1.14)
[A] Signatures\ Signatures\ SHA224/RSA/RAW
[A] Signatures\ Signatures\ SHA256/RSA/RAW
[A] Signatures\ Signatures\ SHA256withRSA (OID: 1.2.840.113549.1.1.11)
[A] Signatures\ Signatures\ SHA384/RSA/RAW
[A] Signatures\ Signatures\ SHA384withRSA (OID: 1.2.840.113549.1.1.12)
[A] Signatures\ Signatures\ SHA512/RSA/RAW
[A] Signatures\ Signatures\ SHA512withRSA (OID: 1.2.840.113549.1.1.13)
[A] Signatures\ RbRSA (OID: 1.2.840.113549.1.1.10)
[A] Signatures\ RprimeRSA
4) Digital Signatures/PKI
RSASSA-PSS A [A] Algorithms\ Signatures\ RSASSA-PSS 4) Digital Signatures/PKI
SHA with DSA A [A] Signatures\ Signatures\ SHAwithDSA (OID: 1.3.14.3.2.13) 4) Digital Signatures/PKI
SSL (MD5 and SHA1 with RSA) A [A] Signatures\ SSL_MD5andSHA1withRSA 4) Digital Signatures/PKI
Verify Signature X Digital Signatures/PKI\ Verify Signature… 4) Digital Signatures/PKI
Blum Blum Shub (B.B.S.) (PRNG) A [A] Pseudo Random Number Generators\ BBSRandom 5) Random Number Generators
Elliptic Curve (PRNG) A [A] Pseudo Random Number Generators\ ECPRNG 5) Random Number Generators
Inverse Congruence Generator (ICG) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
Linear Congruence Generator (LCG) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
Secude Library Random Number Generator X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
SHA-1 (PRNG) A [A] Pseudo Random Number Generators\ SHA1PRNG 5) Random Number Generators
SHA-3 (Keccak) (PRNG) T [C] Hash functions\ Keccak
[T] Cryptography\ Modern\ Symmetric\ Keccak Cipher
[T] Hash Functions\ Keccak Hash (SHA-3)
[T] Tools\ Keccak PRNG
5) Random Number Generators
X^2 (mod N) (PRNG) X Indiv. Procedures\ Tools\ Generate Random Numbers… 5) Random Number Generators
ADFGVX Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ ADFGVX… 6) Classic Cryptanalysis
Alphabets C [C] Tools\ Data input/output\ Alphabets 6) Classic Cryptanalysis
Alphabet Permutator C\T [C] Tools\ Data flow\ Alphabet Permutator
[T] Cryptography\ Classical\ Substitution Cipher using a password
6) Classic Cryptanalysis
Autocorrelation X C X Analysis\ Tools for Analysis\ Autocorrelation [C] Cryptanalysis\ Generic\ Autocorrelation Cryptanalysis\ Autocorrelation 6) Classic Cryptanalysis
Autokey Analysis X Cryptanalysis\ Break Autokey 6) Classic Cryptanalysis
Byte Addition Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Byte Addition 6) Classic Cryptanalysis
Caesar Analysis X C\T\W Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Caesar [C] Cryptanalysis\ Specific\ Caesar Analyzer
[T] Cryptanalysis\ Classical\ Caesar Analysis using character frequencies
[T] Cryptanalysis\ Classical\ Caesar Brute-force Analysis
[W] Cryptanalysis\ Classic Encryption\ Caesar
6) Classic Cryptanalysis
Cyphermatrix (Experimental Cipher) C\T NOT in official release version (but on additional plugin's site) 6) Classic Cryptanalysis
Dictionary Search C\T [C] Tools\ Data input/output\ Dictionary
[T] Cryptanalysis\ Classical\ Caesar Brute-force Analysis
[T] Cryptanalysis\ Classical\ Scytale Brute-force Analysis
[T] Cryptanalysis\ Classical\ Solitaire Brute-force Analysis
[T] Cryptanalysis\ Classical\ Wordpattern Analysis
[T] Hash Functions\ Dictionary Attack
6) Classic Cryptanalysis
Enigma Attacker C\T\W [C] Cryptanalysis\ Specific\ Enigma
[T] Cryptanalysis\ Classical\ Enigma Analysis
[W] Start\ Cryptanalysis\ Classic Encryption\ Enigma
6) Classic Cryptanalysis
Entropy X C D Analysis\ Tools for Analysis\ Entropy [C] Cryptanalysis\ Generic\ Cost Function [D] Analysis\ Entropy Analysis 6) Classic Cryptanalysis
Fialka C\T [C] Classic Ciphers\ Fialka
[T] Cryptography\ Classical\ Fialka ED Check
[T] Cryptography\ Classical\ Fialka ED Mixed Mode Check
[T] Cryptography\ Classical\ Fialka ED NumLock10 Check
[T] Cryptography\ Classical\ Fialka Key Output
[T] Cryptography\ Classical\ Fialka M-125-3 PROTON II
[T] Cryptography\ Classical\ Fialka M-125 PROTON I
6) Classic Cryptanalysis
Frequency Test X C\T D X Analysis\ Analyze Randomness\ Frequency Test...
Analysis\ Tools for Analysis\ Floating Frequency
[C] Cryptanalysis\ Generic\ Frequency Test
[T] Cryptanalysis\ Classical\ Caesar Analysis using character frequencies
[T] Cryptanalysis\ Classical\ Enigma Analysis
[T] Cryptanalysis\ Classical\ Frequency Analysis
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[D] Analysis\ Frequency Analysis Cryptanalysis\ Frequency Analysis 6) Classic Cryptanalysis
Friedman Test C D [C] Cryptanalysis\ Generic\ Friedman Test
[T] Cryptanalysis\ Classical\ Enigma Analysis
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[D] Analysis\ Friedman Test 6) Classic Cryptanalysis
Hill Analysis X Analysis\ Symmetric encryption (classic)\ Known Plaintext\ Hill… 6) Classic Cryptanalysis
Histogram X Analysis\ Tools for Analysis\ Histogram 6) Classic Cryptanalysis
Kasiski Test C [C] Cryptanalysis\ Generic\ Kasiski Test 6) Classic Cryptanalysis
M-138 Analyzer C\T [C] Cryptanalysis\ Specific\ M-138 Analyzer
[T] Cryptanalysis\ Classical\ M-138 Ciphertext only Attack
[T] Cryptanalysis\ Classical\ M-138 Known-Plaintext Attack
[T] Cryptanalysis\ Classical\ M-138 Partially Known-Plaintext Attack
6) Classic Cryptanalysis
Monoalphabetic Substitution W [C] Cryptanalysis\ Specific\ Monoalphabetic Substitution Analyzer
[T] Cryptanalysis\ Classical\ Monoalphabetic Substitution Analyzer
6) Classic Cryptanalysis
N-Gram Analysis X X Analysis\ Tools for Analysis\ N-Gram… Cryptanalysis\ N-Gram Analysis 6) Classic Cryptanalysis
Periodicity Analysis X Analysis\ Tools for Analysis\ Periodicity 6) Classic Cryptanalysis
Playfair Analysis X Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Playfair… 6) Classic Cryptanalysis
Runs Test X Analysis\ Analyze Randomness\ Runs Test… 6) Classic Cryptanalysis
Scytale Analysis T\W [T] Cryptanalysis\ Scytale Brute-force Analysis
[W] Start\ Cryptanalysis\ Classic Encryption\ Scytale
6) Classic Cryptanalysis
Solitaire Analysis X C\T Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Solitaire...
Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Solitaire…
[C] Cryptanalysis\ Specific\ SolitaireAnalyser
[T] Cryptanalysis\ Classical\ Solitaire Brute-force Analysis
6) Classic Cryptanalysis
Stream Comparison C [C] Tools\ Misc\ Stream Comparator 6) Classic Cryptanalysis
Substitution Analysis X D Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Substitution...
Analysis\ Symmetric Encryption (classic)\ Manual Analysis\ Substitution…
[D] Analysis\ Substitution Analysis 6) Classic Cryptanalysis
Transcriptor Analysis C\T [C] Cryptanalysis\ Generic\ Transcriptor
[T] Cryptanalysis\ Classical\ Transcriptor -- manual mode
[T] Cryptanalysis\ Classical\ Transcriptor -- semi-automatic mode
6) Classic Cryptanalysis
Transposition Analysis X C\T\W D Analysis\ Symmetric Encryption (classic)\ Known Plaintext\ Single Column Transposition… [C] Cryptanalysis\ Specific\ Transposition Analyzer
[T] Cryptanalysis\ Classical\ Dictionary attack on the Double Columnar Transposition Cipher
[T] Cryptanalysis\ Classical\ Transposition Brute-force Analysis
[T] Cryptanalysis\ Classical\ Transposition Crib Analysis
[T] Cryptanalysis\ Classical\ Transposition Genetic Analysis
[T] Cryptanalysis\ Classical\ Transposition Hill Climbing Analysis
[W] Cryptanalysis\ Classic Encryption\ Transposition\ Brute-force
[W] Cryptanalysis\ Classic Encryption\ Transposition\ Crib
[W] Cryptanalysis\ Classic Encryption\ Transposition\ Genetic
[D] Analysis\ Transposition Analysis 6) Classic Cryptanalysis
Vernam Analysis X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ XOR / Vernam 6) Classic Cryptanalysis
Vigenère Analysis X C\T\W D X Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Vigenère
Analysis\ Symmetric Encryption (classic)\ Ciphertext-Only\ Vigenère (Analysis according to Schroedel)…
[C] Cryptanalysis\ Specific\ Vigenère Analyzer
[T] Cryptanalysis\ Classical\ Kryptos K1 Analysis
[T] Cryptanalysis\ Classical\ Kryptos K2 Analysis
[W] Cryptanalysis\ Classic Encryption\ Vigenère
[T] Cryptanalysis\ Classical\ Statistic Tests for Classical Ciphers
[T] Cryptanalysis\ Classical\ Vigenère Analysis
[D] Analysis\ Vigenère Breaker Cryptanalysis\ Break Vigenère 6) Classic Cryptanalysis
Viterbi Analysis D [D] Analysis\ Viterbi Analysis 6) Classic Cryptanalysis
Word Pattern Analysis C\T [C] Cryptanalysis\ Generic\ Word Patterns
[T] Cryptanalysis\ Classical\ Wordpattern Analysis
[T] Cryptanalysis\ Classical\ Wordpattern Analysis with self-defined dictionary
6) Classic Cryptanalysis
3DES Brute-Force Attack X C\T Analysis\ Symmetric Encryption (modern)\ Triple DES… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
7) Modern Cryptanalysis
AES Brute-Force Attack X C\T\W Analysis\ Symmetric Encryption (modern)\ AES (CBC)… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ AES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ AES*
7) Modern Cryptanalysis
Berlekamp-Massey Algorithm C\T [C] Cryptanalysis\ Generic\ Berlekamp-Massey Algorithm
[T] Mathematics\ Berlekamp-Massey
7) Modern Cryptanalysis
Bit Commitment Scheme C\T [C] Protocols\ Bit Commitment Scheme
[T] Mathematics\ ISAP Bit Commitment Scheme
7) Modern Cryptanalysis
Cost Function C\T [C] Cryptanalysis\ Generic\ Cost Function
[T] Cryptanalysis\ Classical\ Transposition Brute-force Analysis
[T] Cryptanalysis\ Classical\ Transposition Crib Analysis
[T] Cryptanalysis\ Classical\ Transposition Genetic Analysis
[T] Cryptanalysis\ Classical\ Transposition Hill Climbing Analysis
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (1)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (1)
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptanalysis\ Modern\ DES Known-Plaintext Analysis
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (2)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (2)
[T] Cryptanalysis\ Modern\ DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Analysis using Entropy
[T] Cryptanalysis\ Modern\ SDES Known-Plaintext Analysis
7) Modern Cryptanalysis
Cube Attack C\T [C] Cryptanalysis\ Specific\ Cube Attack
[T] Cryptanalysis\ Modern\ Cube Attack on Trivium
7) Modern Cryptanalysis
DES Brute-Force Attack X C\T\W Analysis\ Symmetric Encryption (modern)\ DES… [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ DES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ DES*
7) Modern Cryptanalysis
DESL Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESL… 7) Modern Cryptanalysis
DESX Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESX… 7) Modern Cryptanalysis
DESXL Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ DESXL… 7) Modern Cryptanalysis
Discrete Logarithm C\T [C] Cryptanalysis\ Generic\ Discrete Logarithm
[T] Mathematics\ Discrete Logarithm
7) Modern Cryptanalysis
Distributed AES Analysis X Cryptanalysis\ Distributed AES Analysis 7) Modern Cryptanalysis
FIPS PUB-140-1 X Analysis\ Analyze Randomness\ FIPS PUB-140-1 Test Battery 7) Modern Cryptanalysis
General Number Field Sieve (GNFS) C\T [C] Cryptanalysis\ Generic\ General Number Field Sieve
[T] Mathematics\ Factorization with General Number Field Sieve (GNFS)
7) Modern Cryptanalysis
Hash Collisions X Analysis\ Hash\ Attack on the Hash Value of the Digital Signature… 7) Modern Cryptanalysis
Heartbleed analysis W [W] Tools\ Heartbleed analysis 7) Modern Cryptanalysis
IDEA Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ IDEA… 7) Modern Cryptanalysis
IDP Analyzer C\T [C] Cryptanalysis\ Specific\ IDP Analyzer
[T] Cryptanalysis\ Classical\ Dictionary attack on the Double Columnar Transposition Cipher
7) Modern Cryptanalysis
Key Searcher C\T [C] Cryptanalysis\ Specific\ Key Searcher
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (1)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (1)
[T] Cryptanalysis\ Modern\ DES Analysis using Entropy
[T] Cryptanalysis\ Modern\ DES Known-Plaintext Analysis
[T] Cryptanalysis\ Modern\ AES Analysis using Entropy (2)
[T] Cryptanalysis\ Modern\ AES Known-Plaintext Analysis (2)
[T] Cryptanalysis\ Modern\ DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Brute-force Analysis
[T] Cryptanalysis\ Modern\ Triple DES Brute-force Analysis
[T] Cryptanalysis\ Modern\ SDES Analysis using Entropy
[T] Cryptanalysis\ Modern\ SDES Known-Plaintext Analysis
7) Modern Cryptanalysis
MARS Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ MARS… 7) Modern Cryptanalysis
MD5 Collisions C\T\W [C] Hash functions\ MD5 Collider
[T] Hash Functions\ MD5 Collision Finder
7) Modern Cryptanalysis
Padding Oracle C\T [C] Tools\ Misc\ Padding Oracle
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on AES
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on DES
7) Modern Cryptanalysis
Padding Oracle Attack against AES C\T [C] Tools\ Misc\ Padding Oracle Attack
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on AES
7) Modern Cryptanalysis
Padding Oracle Attack against DES C\T [C] Tools\ Misc\ Padding Oracle Attack
[T] Cryptanalysis\ Modern\ Padding Oracle Attack on DES
7) Modern Cryptanalysis
Poker Test X Analysis\ Analyze Randomness\ Poker Test… 7) Modern Cryptanalysis
Quadratic Sieve (QS) C\T [C] Cryptanalysis\ Generic\ Quadratic Sieve (QS)
[T] Mathematics\ Factorization with Quadratic Sieve
7) Modern Cryptanalysis
RC2 Brute-Force Attack X C Analysis\ Symmetric Encryption (modern)\ RC2… [C] Cryptanalysis\ Specific\ KeySearcher 7) Modern Cryptanalysis
RC4 Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ RC4… 7) Modern Cryptanalysis
RC6 Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ RC6… 7) Modern Cryptanalysis
RSA Attacks X W Analysis\ Asymmetric Encryption\ Lattice-Based Attacks on RSA...\
Analysis\ Asymmetric Encryption\ Side-Channel Attack on "Textbook RSA"…
[W] Start\ Cryptanalysis\ Modern Encryption\ Asymmetric Encryption\ RSA 7) Modern Cryptanalysis
Serial Test X Analysis\ Analyze Randomness\ Serial Test… 7) Modern Cryptanalysis
SDES Brute-Force Attack C\T\W [C] Cryptanalysis\ Specific\ KeySearcher
[T] Cryptanalysis\ Modern\ SDES*
[W] Start\ Cryptanalysis\ Modern Encryption\ Symmetric Encryption\ SDES*
7) Modern Cryptanalysis
Serpent Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ Serpent… 7) Modern Cryptanalysis
Twofish Brute-Force Attack X Analysis\ Symmetric Encryption (modern)\ Further Algorithms\ Twofish… 7) Modern Cryptanalysis
Vitányi Analysis X Analysis\ Analyze Randomness\ Vitányi 7) Modern Cryptanalysis
WEP Attack C\T [C] Protocols\ Attacks on the WEP protocol
[T] Protocols\ WEP Attack
7) Modern Cryptanalysis
Insertion Steganography C\T [C] Steganography\ Insertion Steganography
[T] Steganography\ Steganography Insertion Decryption
[T] Steganography\ Steganography Insertion Encryption
[T] Steganography\ Steganography Permutation Encryption
8) Steganography
Least Significant Bit (LSB) C\T [C] Steganography\ LSB Steganography
[T] Steganography\ Steganography Least Significant Bit Decryption
[T] Steganography\ Steganography Least Significant Bit Encryption
[T] Steganography\ Steganography Least Significant Bit Data Transfer
8) Steganography
Permutation Steganography C\T [C] Steganography\ Permutation Steganography
[T] Steganography\ Steganography Permutation Decryption
[T] Steganography\ Steganography Permutation Image Transfer
8) Steganography
Watermark Creator C\T [C] Steganography\ Watermark Creator
[T] Steganography\ Watermark Creator -- invisible watermark
[T] Steganography\ Watermark Creator -- Robustness
[T] Steganography\ Watermark Creator -- visible watermark
8) Steganography
ASCII W X [W] Codes\ Encoding Codings\ ASCII 9) Codings
ASN.1 X Indiv. Procedures\ Tools\ Codes\ Decode ASN.1 Code of a Document 9) Codings
Bacon X Codings\ Bacon 9) Codings
Barcode Generator X Codings\ Barcode Generator 9) Codings
Base 64 Decode X W X Indiv. Procedures\ Tools\ Codes\ Base64 Encode/Decode\ Base64 Decode [W] Codes\ Encoding Codings\ Base64 9) Codings
Base 64 Encode X W X Indiv. Procedures\ Tools\ Codes\ Base64 Encode/Decode\ Base64 Encode [W] Codes\ Encoding Codings\ Base64 9) Codings
Code 39 X Codings\ Code39 9) Codings
Hamming Distance C\T [C] Tools\ Misc\ HammingDistance
[T] Hash Functions\ ImageHash
[T] Hash Functions\ ImageHash -- smooth comparison
[T] Mathematics\ Hamming Distance
9) Codings
Huffman C\T D X [C] Tools\ Misc\ Huffman
[T] Tools\ Huffman's algorithm (ASCII)
[T] Tools\ Huffman's algorithm (BMG, JPG)
[T] Tools\ Huffman's algorithm (UTF-8)
[D] Visualizations\ Huffman Coding Codings\ Huffman 9) Codings
Morse Code C\T\W X [C] Tools\ Misc\ Morse Code
[T] Codes\ Morse code
[W] Codes\ Morse code
Codings\ Morse code 9) Codings
Unzip X Indiv. Procedures\ Tools\ Compress\ UnZip 9) Codings
UU Decode X Indiv. Procedures\ Tools\ Codes\ UU Encode/Decode\ UU Decode 9) Codings
UU Encode X Indiv. Procedures\ Tools\ Codes\ UU Encode/Decode\ UU Encode 9) Codings
Visual Code C\T\W [C] Tools\ Misc\ Visual Decoder
[C] Tools\ Misc\ Visual Encoder
[T] Codes\ AES (CBC) with PKCS#5 and IV, output as QR Code
[T] Codes\ Create QR Code
[T] Codes\ QR Code Encryption
[T] Codes\ RSA signed QR code
[T] Codes\ VCard
[T] Codes\ Decode QR code file
[T] Codes\ QR Code Encryption
[T] Codes\ RSA signed QR code
[T] Codes\ Simple detection of optical codes
[W] Codes\ Create visual code
[W] Codes\ Decode visual code
9) Codings
Visual Decoder C [C] Tools\ Misc\ Visual Decoder 9) Codings
Visual Encoder C [C] Tools\ Misc\ Visual Encoder 9) Codings
Zip X Indiv. Procedures\ Tools\ Compress\ Zip 9) Codings
AES Visualization X C\T Indiv. Procedures\ Visualization of Algorithms\ AES\ [C] Modern Ciphers\ Symmetric\ AES Visualization
[T] Cryptography\ Modern\ Symmetric\ AES Visualization
10) Learning Aids and Visualizations
Android Unlock Pattern (AUP) Visualization D [D] Visualizations\ Android Unlock Pattern (AUP) 10) Learning Aids and Visualizations
Ant Colony Optimization Visualization D [D] Visualizations\ Ant Colony Optimization 10) Learning Aids and Visualizations
Authentication Methods in Networks Visualization X Indiv. Procedures\ Protocols\ Network Authentication… 10) Learning Aids and Visualizations
Avalanche Visualization C\T [C] Tools\ Misc\ Avalanche Visualization
[T] Cryptanalysis\ Modern\ Avalanche (AES)
[T] Cryptanalysis\ Modern\ Avalanche (classic ciphers)
[T] Cryptanalysis\ Modern\ Avalanche (compare classic ciphers)
[T] Cryptanalysis\ Modern\ Avalanche (DES)
[T] Cryptanalysis\ Modern\ Avalanche (hash functions)
[T] Cryptanalysis\ Modern\ Avalanche (modern ciphers)
10) Learning Aids and Visualizations
BB84 Key Exchange T [T] Protocols\ BB84 Key Exchange 10) Learning Aids and Visualizations
BB84 Key Exchange with Eavesdropping Attack T [T] Protocols\ BB84 Key Exchange with eavesdropping attack 10) Learning Aids and Visualizations
Caesar Visualization X Indiv. Procedures\ Visualization of Algorithms\ Caesar… 10) Learning Aids and Visualizations
Certificate Verification D [D] Visualizations\ Certificate Verification 10) Learning Aids and Visualizations
Chinese Remainder Theorem Visualization X D Indiv. Procedures\ Chinese Remainder Theorem Applications\ [D] Visualizations\ Chinese Remainder Theorem 10) Learning Aids and Visualizations
Coin Flipping Protocol C\T [C] Protocols\ Coin Flipping
[T] Protocols\ Coin Flipping Protocol
10) Learning Aids and Visualizations
Decimalization C\T [C] Tools\ Misc\ Decimalization
[T] Mathematics\ Decimalization
[T] Tools\ Random Decimal Number
10) Learning Aids and Visualizations
DES Visualization X C\T Indiv. Procedures\ Visualization of Algorithms\ DES… [C] Modern Ciphers\ Symmetric\ DESVisualization
[T] Cryptography\ Modern\ Symmetric\ DES Visualization
10) Learning Aids and Visualizations
Differential Power Analysis Visualization D [D] Visualizations\ Differential Power Analysis / Double and Add 10) Learning Aids and Visualizations
Diffie-Hellman Key Exchange (Perfect Forward Secrecy) Visualization X D Indiv. Procedures\ Protocols\ Diffie-Hellman Demonstration… [D] Visualizations\ Diffie-Hellman Key Exchange (EC) 10) Learning Aids and Visualizations
Digital Signatures Visualization X D Digital Signatures\PKI\ Signature Demonstration (Signature Generation)…
Indiv. Procedures\ RSA Cryptosystem\ Signature Demonstration (Signature Generation)…
[D] Visualizations\ Signature Demonstration 10) Learning Aids and Visualizations
Dining Cryptographers Protocol T [T] Protocols\ Dining Cryptographers Protocol 10) Learning Aids and Visualizations
ElGamal Visualization D [D] Visualizations\ ElGamal Cryptosystem 10) Learning Aids and Visualizations
Elliptic Curve Calculations Visualization X D Indiv. Procedures\ Number Theory - Interactive\ Point Addition on Elliptic Curves… [D] Visualizations\ Elliptic Curve Calculations 10) Learning Aids and Visualizations
Enigma Visualization X C Indiv. Procedures\ Visualization of Algorithms\ Enigma… [C] Classic Ciphers\ Enigma 10) Learning Aids and Visualizations
Extended Euclidian plus the method of mutual "exhaustion" (anthyphairesis = continually subtract the smaller from the larger) Visualization D [D] Visualizations\ Extended Euclidean / Reciprocal Subtraction 10) Learning Aids and Visualizations
Feige Fiat Shamir Visualization D [D] Visualizations\ Feige Fiat Shamir 10) Learning Aids and Visualizations
Fiat Shamir Visualization D [D] Visualizations\ Fiat Shamir 10) Learning Aids and Visualizations
Graph Isomorphism Visualization D [D] Visualizations\ Graph Isomorphism 10) Learning Aids and Visualizations
Grille Visualization D [D] Visualizations\ Grille 10) Learning Aids and Visualizations
Hash Algorithms Visualization X D Indiv Procedures\ Hash\ Hash Demonstration… [D] Visualizations\ Hash Sensitivity 10) Learning Aids and Visualizations
Homomorphic Encryption Visualization C\T D [C] Modern Ciphers\ Asymmetric\ Paillier
[T] Cryptography\ Modern\ Asymmetric\ Pailier*
[D] Visualizations\ Homomorphic Encryption 10) Learning Aids and Visualizations
Inner States of the DES Visualization D [D] Visualizations\ Inner States of the Data Encryption Standard (DES) 10) Learning Aids and Visualizations
Kleptography Visualization D [D] Visualizations\ Kleptography 10) Learning Aids and Visualizations
Lattice-Based Cryptosystems - GGH N [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptography\ GGH 10) Learning Aids and Visualizations
Lattice-Based Cryptosystems - LWE N [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptography\ LWE 10) Learning Aids and Visualizations
Lattice-Based Attacks - Merkle-Hellman N D [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptanalysis\ Merkle-Hellman Knapsack [D] Visualizations\ Merkle-Hellman Knapsack Cryptosystem 10) Learning Aids and Visualizations
Lattice-Based Attacks - RSA N [N] Crypto tutorials\ Lattice-based cryptography\ Lattice-based cryptanalysis\ RSA (Coppersmith's attack) 10) Learning Aids and Visualizations
Lattice-Based Problems - Shortest Vector Problem (SVP) - Gauss N [N] Crypto tutorials\ Lattice-based cryptography\ Shortest Vector Problem (SVP)\ Gauss algorithm 10) Learning Aids and Visualizations
Lattice-Based Problems - Shortest Vector Problem (SVP) - LLL N [N] Crypto tutorials\ Lattice-based cryptography\ Shortest Vector Problem (SVP)\ LLL algorithm 10) Learning Aids and Visualizations
Lattice-Based Problems - Closest Vector Problem (CVP) N [N] Crypto tutorials\ Lattice-based cryptography\ Closest Vector Problem (CVP)\ Find closest vector 10) Learning Aids and Visualizations
Length of a number X Indiv. Procedures\ Tools\ Length of a number… 10) Learning Aids and Visualizations
Magic Door Visualization D [D] Visualizations\ Magic Door 10) Learning Aids and Visualizations
Merkle Signature Scheme (MSS, XMSS, XMSS_XT) D [D] Visualizations\ Merkle Signature Scheme (MerkleTree) 10) Learning Aids and Visualizations
Multipartite Key Exchange Visualization D [D] Visualizations\ Multipartite Key Exchange 10) Learning Aids and Visualizations
Network Receiver C [C] Tools\ Data input/output\ Network Receiver 10) Learning Aids and Visualizations
Network Sender C [C] Tools\ Data input/output\ Network Sender 10) Learning Aids and Visualizations
Nihilist Visualization X Indiv. Procedures\ Visualization of Algorithms\ Nihilist… 10) Learning Aids and Visualizations
Number Theory X N Indiv. Procedures\ Number Theory - Interactive\
Indiv. Procedures\ Number Theory - Interactive\ Generic t-adic-NAF Key Generator
[N] Crypto tutorials\ World of Primes\ Number theory\ Goldbach's conjecture
[N] Crypto tutorials\ World of Primes\ Number theory\ Powering
[N] Crypto tutorials\ World of Primes\ Number theory\ Number-theoretic functions
[N] Crypto tutorials\ World of Primes\ Number theory\ Primitive roots
10) Learning Aids and Visualizations
Oblivious Transfer Protocol C\T [C] Protocols\ Oblivious Transfer 1
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
[C] Protocols\ Oblivious Transfer 2
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
10) Learning Aids and Visualizations
Password Quality Visualization X T\W X Indiv. Procedures\ Tools\ Password Quality Meter...
Indiv. Procedures\ Tools\ Password Entropy...
[C] Tools\ Misc\ PasswordStrength
[T] Tools\ Password Generator
[T] Tools\ Check Password Strength
[W] Tools\ Password Strength
Highlights\ Password Check 10) Learning Aids and Visualizations
PKCS#1 Attack (Bleichenbacher) Visualization N [N] Crypto Tutorials\ Attack on PKCS#1\ Attacks on PKCS#1\ Bleichenbacher attack 10) Learning Aids and Visualizations
PKCS#1 Attack (Kuehn) Visualization N [N] Crypto Tutorials\ Attack on PKCS#1\ Attacks on PKCS#1\ Attack with shorter keys (Kuehn) 10) Learning Aids and Visualizations
PRESENT Visualization C [C] Modern Ciphers\ Symmetric\ PRESENT 10) Learning Aids and Visualizations
Public-Key Infrastructure D [D] Visualizations\ Public-Key Infrastructure 10) Learning Aids and Visualizations
Randomness Visualization X Analysis\ Analyze Randomness\ 3D Visualization… 10) Learning Aids and Visualizations
RC4 / Spritz D [D] Visualizations\ ARC4 / Spritz 10) Learning Aids and Visualizations
RSA Visualization X D Indiv. Procedures\ RSA Cryptosystem\ [D] Visualizations\ RSA Cryptosystem
[D] Visualizations\ Extended RSA Cryptosystem
10) Learning Aids and Visualizations
SAT Solver C\T [C] Tools\ Misc\ SAT Solver
[T] Mathematics\ SAT Solver (File Input)
[T] Mathematics\ SAT Solver (Text Input)
10) Learning Aids and Visualizations
Secure Email (S/MIME) Visualization X Indiv. Procedures\ Protocols\ Secure E-Mail with S/MIME… 10) Learning Aids and Visualizations
Shamir's Secret Sharing Visualization X D Indiv. Procedures\ Secret Sharing Demonstration (Shamir)… [D] Visualizations\ Shamir's Secret Sharing 10) Learning Aids and Visualizations
Signatur Verification D [D] Visualizations\ Signature Verification 10) Learning Aids and Visualizations
Simple Power Analysis Visualization D [D] Visualizations\ Simple Power Analysis / Square and Multiply 10) Learning Aids and Visualizations
Solving Discrete Logarithm with Babystep-Giantstep D [D] Visualizations\ Shanks Babystep-Giantstep 10) Learning Aids and Visualizations
SSL/TLS Handshake D [D] Visualizations\ SSL/TLS Handshake 10) Learning Aids and Visualizations
Verifiable Secret Sharing (VSS) Visualization D [D] Visualizations\ Verifiable Secret Sharing 10) Learning Aids and Visualizations
Vigenère Visualization X Indiv. Procedures\ Visualization of Algorithms\ Vigenère… 10) Learning Aids and Visualizations
Virtual Smartcard C\T [C] Protocols\ Smartcard
[T] Protocols\ Communication with a SmartCard
10) Learning Aids and Visualizations
Viterbi Visualization D [D] Visuals\ Viterbi 10) Learning Aids and Visualizations
WOTS/WOTS+ D [D] Visualizations\ WOTS/WOTS+ 10) Learning Aids and Visualizations
Yao's Millionaire Problem T [C] Protocols\ Yao 1
[C] Protocols\ Yao 2
[C] Protocols\ Yao 3
[T] Protocols\ Yao's Millionaire Problem
10) Learning Aids and Visualizations
Zero Knowledge Protocol C\T [C] Protocols\ Zero Knowledge Prover
[C] Protocols\ Zero Knowledge Verifier
[T] Protocols\ Zero Knowledge Protocol
10) Learning Aids and Visualizations
Divider Game D [D] Games\ Divider Game 11) Games
Number Shark X D X Indiv. Procedures\ Educational Games\ Number Shark [D] Games\ Number Shark Highlights\ Taxman 11) Games
Sudoku Solver D [D] Games\ Sudoku-Solver 11) Games
Zudo-Ku (Zero-Knowledge Proof) D [D] Games\ Zudo-Ku 11) Games
Prime Number Test X C\T\W\N Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ Miller-Rabin Test
Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ Solovay-Strassen test
Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…\ AKS test (deterministic procedure)
[C] Cryptanalysis\ Generic\ Prime Test
[T] Mathematics\ Primes Test
[W] Start\ Mathematical Functions\ Prime Operations\ Prime Number Test
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Sieve of Erastosthenes
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Miller-Rabin test
[N] Crypto Tutorials\ World of Primes\ Primality Test\ Sieve of Atkin
[W] Mathematical Functions\ Prime Factorization
12) Prime numbers
Prime Number Tutorial X N Indiv. Procedures\ RSA Cryptosystem\ Prime Number Test…
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…
[N] Crypto Tutorials\ World of Primes 12) Prime numbers
Prime Distribution N [N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number line
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number grid
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Number of primes
[N] Crypto Tutorials\ World of Primes\ Distribution of Primes\ Ulam's spiral
12) Prime numbers
Factorization of a Number X N Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Brute-force
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Brent
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Pollard
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Williams
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Lenstra
Indiv. Procedures\ RSA Cryptosystem\ Factorization of a Number…\ Quadratic Sieve
[N] Crypto tutorials\ World of Primes\ Factorization\ Quadratic Sieve
[N] Crypto tutorials\ World of Primes\ Factorization\ Brute-force
[C] Cryptanalysis\ Generic\ Factorizer
[T] Mathematics\ Factorization with Trial Division (brute-force)
12) Prime numbers
Generation of Prime Numbers X C\T\W\N Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ Miller-Rabin Test
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ Solovay-Strassen Test
Indiv. Procedures\ RSA Cryptosystem\ Generate Prime Numbers…\ FermatTest
[C] Tools\ Data input/output\ Prime Generator
[T] Codes\ QR Code Encryption
[T] Mathematics\ Primes Generator
[T] Protocols\ Diffie-Hellman Key-Exchange over network
[T] Tools\ Diffie-Hellman AES Video Audio Chat
[W] Mathematical Functions\ Prime Operations\ Prime Number Generation
[N] Crypto tutorials\ World of Primes\ Generation of primes\ Generation of primes
12) Prime numbers
Authentication Methods in Networks Visualization X Indiv. Procedures\ Protocols\ Network Authentication… 13) Protocols
BB84 Key Exchange C\T [C] Protocols\ BB84 Error Detector
[C] Protocols\ BB84 Key Generator
[C] Protocols\ BB84 Man in the Middle
[C] Protocols\ BB84 Photon Decoder
[C] Protocols\ BB84 Photon Encoder
[C] Protocols\ BB84 Photonbase Generator
[T] Protocols\ BB84 Key Exchange
[T] Protocols\ BB84 Key Exchange with eavesdropping attack
13) Protocols
BB84 Key Exchange with Eavesdropping Attack T [T] Protocols\ BB84 Key Exchange with eavesdropping attack 13) Protocols
Bit Commitment Scheme C\T [C] Protocols\ BitCommitmentScheme
[T] Mathematics\ ISAP Bit Commitment Scheme
13) Protocols
Coin Flipping Protocol T [T] Protocols\ Coin Flipping Protocol 13) Protocols
Diffie-Hellman Key Exchange (Perfect Forward Secrecy) Visualization X D Indiv. Procedures\ Protocols\ Diffie-Hellman Demonstration… [D] Visuals\ Diffie-Hellman Key Exchange (EC) 13) Protocols
Dining Cryptographers Protocol T [T] Protocols\ Dining Cryptographers Protocol 13) Protocols
Oblivious Transfer Protocol C\T [C] Protocols\ Oblivious Transfer 1
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
[C] Protocols\ Oblivious Transfer 2
[T] Protocols\ Oblivious Transfer Protocol (1 out of n)
13) Protocols
Secure Email (S/MIME) Visualization X Indiv. Procedures\ Protocols\ Secure E-Mail with S/MIME… 13) Protocols
Shamir's Secret Sharing Visualization X D Indiv. Procedures\ Secret Sharing Demonstration (Shamir)… [D] Visuals\ Shamir's Secret Sharing 13) Protocols
Virtual Smartcard C\T [C] Protocols\ Smartcard
[T] Protocols\ Communication with a SmartCard
[C] Protocols\ Smartcard Interpreter
13) Protocols
Wired Equivalent Privacy (WEP) C [C] Protocols\ WEP Protocol 13) Protocols
Yao's Millionaire Problem T [C] Protocols\ Yao 1
[C] Protocols\ Yao 2
[C] Protocols\ Yao 3
[T] Protocols\ Yao's Millionaire Problem
13) Protocols
Zero Knowledge Protocol C\T [C] Protocols\ Zero Knowledge Prover
[C] Protocols\ Zero Knowledge Verifier
[T] Protocols\ Zero Knowledge Protocol
13) Protocols
Boolean Function Parser C [C] Tools\ Boolean\ Boolean Function Parser 14) Tools
Boolean Operator C\T [C] Tools\ Boolean\ Boolean Binary Operator
[T] Mathematics\ Booleans
[C] Tools\ Boolean\ Boolean If-Else Operator
[C] Tools\ Boolean\ Boolean Not Operator
14) Tools
Clock C [C] Tools\ Data flow\ Clock 14) Tools
Password Generator X Highlights\ Password Generator 14) Tools
String Operations C\T [C] Tools\ Misc\ String Operations
[T] Mathematics\ Levenshtein Distance
14) Tools
Explanation
XCT1, CTO: Function is implemented within this program.
DJCT: Function is implemented in the Default Perspective (document-centric view).
AJCT: Function is implemented in the Algorithm Perspective (function-centric view).
CCT2: Function is available as component.
TCT2: Function is demonstrated in a ready-to-tun sample template.
NCT2: Function is available in the navigation bar.
WCT2: Function is part of the wizards.
[x]Path for navigation area x.
<PATH>\<FEATURE>*There are different variants for this <FEATURE> under <PATH>.

     
Go To Top