Search Results for "caesar cipher encrypt/decrypt"

Showing 59 open source projects for "caesar cipher encrypt/decrypt"

View related business solutions
  • The only CRM built for B2C Icon
    The only CRM built for B2C

    Stop chasing transactions. Klaviyo turns customers into diehard fans—obsessed with your products, devoted to your brand, fueling your growth.

    Klaviyo unifies your customer profiles by capturing every event, and then lets you orchestrate your email marketing, SMS marketing, push notifications, WhatsApp, and RCS campaigns in one place. Klaviyo AI helps you build audiences, write copy, and optimize — so you can always send the right message at the right time, automatically. With real-time attribution and insights, you'll be able to make smarter, faster decisions that drive ROI.
    Learn More
  • World class QA, 100% done-for-you Icon
    World class QA, 100% done-for-you

    For engineering teams in search of a solution to design, manage and maintain E2E tests for their apps

    MuukTest is a test automation service that combines our own proprietary, AI-powered software with expert QA services to help you achieve world class test automation at a fraction of the in-house costs.
    Learn More
  • 1
    BIP39-XOR

    BIP39-XOR

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array ("seed")

    Encrypt or decrypt 12, 15, 18, 21 or 24 BIP39 codewords array (so-called "seed phrase") using exclusive OR (XOR)/Vernam cipher (a.k.a. One Time Pad). If not input by a user, an encryption key is automatically generated at random. Encryption with such a key preserves integrity of BIP-39 checksums of all keys (that's distinct while also compatible with SeedXOR implementation).
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2

    enervige

    A statistical tool to break the Vigenere cipher

    Enervige is a Python-based project for encryption, decryption, and cryptanalysis of text using the Caesar and Vigenère ciphers in French and English. The project includes advanced statistical techniques to break the Vigenère cipher using methods like frequency analysis, mutual index of coincidence (ICM), and Pearson's coefficient of correlation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Crypto Messenger and notepad

    crypto messenger and notepad and file encryptor windows and android

    I have written a windows app that is like an enigma machine, it's called Crypto Messenger & Crypto Notepad & file encryptor. You can send and receive encrypted messages for people by clicking the 'encrypt' button and then the 'copy to clipboard' button and then pasting the encrypted text into your messaging app. you can use it to write notes that you can store on your computer in encrypted form so no one can read it without knowing the password and having this app. It can also...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    transcrypt git

    transcrypt git

    transparently encrypt files within a git repository

    A script to configure transparent encryption of sensitive files stored in a Git repository. Files that you choose will be automatically encrypted when you commit them, and automatically decrypted when you check them out. The process will degrade gracefully, so even people without your encryption password can safely commit changes to the repository's non-encrypted files. transcrypt protects your data when it's pushed to remotes that you may not directly control (e.g., GitHub, Dropbox clones,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Create stunning, professional email signatures in minutes Icon
    Create stunning, professional email signatures in minutes

    For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.

    Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
    Learn More
  • 5
    Multron File Guardian

    Multron File Guardian

    A File Encrypter/Decrypter With Many/Hybrid Encryption Algorithms

    Multron File Guardian provides you a strong file encryption. Supported algorithms AES Serpent Twofish ThreeFish Camellia ChaCha20 SM4 HC RSA Hybrided With Symmetric Algorithms License = AAL You can set RSA Key Length (from 2048 to 16384) You can set Password-Iteration Rate. You can also set Symmetric Algorithm Key Size If you're about to share a file securely, then you may want to use one of Hybrid algorithms. You can compress your files before...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    AES_plus_Serpent_in_CBC_mode

    AES_plus_Serpent_in_CBC_mode

    Open-source code that enables you to use AES + Serpent in CBC mode

    The AES_plus_Serpent_in_CBC_mode_for_microcontrollers repository contains code that enables you to encrypt your data using a combination of AES and Serpent encryption algorithms in CBC mode. In addition to that, the code in this repository enables you to verify the data integrity, thanks to the HMAC-SHA256. Attention! I didn't develop the libraries utilized by these sketches. I took them from the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AES_plus_Blowfish_in_CBC_mode

    AES_plus_Blowfish_in_CBC_mode

    Open-source code that enables you to use AES + Blowfish in CBC mode

    The AES_plus_Blowfish_in_CBC_mode repository contains two sketches that enable you to encrypt your data using a combination of AES and Blowfish encryption algorithms in CBC mode. The only difference between them, from the functional point of view, is that one verifies the integrity of the decrypted data (plaintext) while the other doesn't. Copyright/Ownership/Licenses Attention! I didn't develop the libraries utilized by these sketches. I took them from the following...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Grain128AEAD

    Grain128AEAD

    A lightweight AEAD stream cipher submitted to the CAESAR competition

    Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio for Profile 2 by the eSTREAM project. Grain is designed primarily for restricted hardware environments. It accepts an 80-bit key and a 64-bit IV. The specifications do not recommended a maximum length of output per (key, iv) pair. A number of potential weaknesses in the cipher have been identified and corrected in Grain 128a which is now...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    bitcrypt

    bitcrypt

    BitCrypt is a free ultra-strong encryption that hides text in bitmaps.

    BitCrypt is an elegant encryption that allows for the storage and transmission of information in an undetectable manner. The program processes a user-supplied text encrypting it with the Rijndael cipher and storing it in a user-selected bitmap image. This later step is called steganography, which means "to hide invisibly". If you intend to store sensitive information invisibly, you may encrypt it with BitCrypt and keep it in a picture image. Alternatively, if you intend to pass information to another party, you may encrypt it using BitCrypt and publish it as a part of a website. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Point of Sale. Powerful and Simple. Icon
    Point of Sale. Powerful and Simple.

    For retail store owners and multi-location retail operations needing a tool to manage sales, inventory, staff and channels in one place

    Vibe Retail is an all-in-one retail point-of-sale and operations platform built for single-store and multi-location retailers seeking to unify inventory, sales, staff and customer data from one mobile-friendly interface. The system lets you track inventory across locations and warehouses, handle item variations (size, color, material), manage purchase orders and supplier deliveries, print custom barcodes, and transfer stock between stores in real time. On the sales side, Vibe supports multiple payment types (cards, cash, checks, gift cards, EBT), layaway workflows, serial number tracking, delivery management, loyalty programs and branded receipts. Retailers can integrate with online platforms (such as Shopify and WooCommerce), sync in-store and online sales, access 40+ real-time reports on sales, inventory and performance, set up promotions and discounts, and print receipts from mobile devices.
    Learn More
  • 10

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Ciphey

    Ciphey

    Decrypt encryptions without knowing the key or cipher

    Fully automated decryption/decoding/cracking tool using natural language processing & artificial intelligence, along with some common sense. You don't know, you just know it's possibly encrypted. Ciphey will figure it out for you. Ciphey can solve most things in 3 seconds or less. Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes or more advanced cryptography. If you don't know much about cryptography, or you want...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 12
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    DECODE CAESAR CIPHER DECRYPT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    Jack LIRE (Linked Record)

    Jack LIRE (Linked Record)

    Quantum universal object system with referencing and genetics

    Jack LIRE (Linked Record) is a quantum database-backed life-long text record diary with referencing (linking) between records, and a data library for life-long keeping of files such as documents, photographs, music and more. The diary records are fully searchable. Files can be mentioned in diary records to preserve memories, document knowledge and ideas, and more. Massive numbers of diary records and files can be permanently kept. A database located on one computer can be accessed from...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Cryptonik

    Cryptonik

    Text encryption tool using Vigenère cipher

    Cryptonik-Text is a useful, simple to use tool for encrypt/decrypt text docs, messages, notes etc. Application uses a charset that can be typed from any keyboard (on-screen or hardware). Some national symbols are converted to 26 standard latin letters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    approach to encryption and decryption involves two strings. The first is an encryption / decryption string which we will allow to be up to 128 lower case alphabetical characters in length. The second string is a line of text from a file that is to be encrypted or decrypted. the basic strategy for encrypting data is based on mapping alphabetical characters to specific values, then doing some simple mathematical operations to create a new value.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Caesar Cipher v1

    Encrypt your messages with Caesar Cipher algorithm.

    Encrypt your messages with Caesar Cipher algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    CryptoDoctor

    Easy encryption and decryption of Texts

    CryptoDoctor is a simple but powerful tool to encrypt and decrypt texts. It is currently available in german language. Moved to GitHub.com: http://saladan.github.io/CryptoDoctor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47 ----- Text to Number ----- Binary Hexadecimal ----- Text Encoding ----- Base 64 HTML Entities ----- Text Hashing ----- AES MD5 SHA1 (160 bit) SHA256 SHA384 SHA512 Word Cipher is a free-distributed software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Caesar cipher on JS

    Caesar cipher on JavaScript, simple

    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    d-crypt

    Tweakable 256-bit symmetrical block cipher.

    D-crypt is an symmetrical block cipher operating on 256bit blocks with an key of the same length. The cipher takes 3 inputs: the data to encrypt, the symmetric key and a tweak consisting in a array of 16 integers representing each one of eleven possible keyaddition algorithms. Features a similar structure as AES (uses simpler versions of ShiftRows, MixColumns) and uses AES SBOX.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Khoorio

    Khoorio

    FTP client to encrypt/decrypt and upload/download files

    Khoorio is a FTP client that allows you to safely encrypt your files with the AES Rijndael cipher before uploading them to a FTP server. The key used to encrypt the files is derived by a key derivation function (HMAC-SHA1) as follows: encryptionKey = HMAC-SHA1(hash_plaintext_file,user chosen master password). With this key the user allows someone to decrypt a specific file, without the need to share his master password to that person.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    SATURN cipher

    RNG for use in a stream cipher

    SATURN is now a fully-functional stream cipher. It is in active development. The underlying algorithm is SATURNrng, a cryptographically-secure random number generator. SATURNrng is seeded with a 480-bit key and a 480-bit nonce which then produces a random stream used to encrypt a plaintext.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next
MongoDB Logo MongoDB