symmetric cryptography downloads
MultiObfuscator Cryptography & Obfuscation
2.00 download[Home & Help] homepage MultiObfuscator is a professional cryptography tool - HW seeded random number generator (CSPRNG) - Deniable cryptography - Up to 256Mb of secret file (binary ... Unique layers of security and obfuscation - 256bit+256bit symmetric-key cryptography with KDF4 password extension - 256bit symmetric-key ...
OpenPuff Steganography & Watermarking
4.01 download... steganalysis resistance Unique layers of security - 256bit+256bit symmetric-key cryptography with KDF4 password extension - 256bit symmetric key data scrambling (CSPRNG-based shuffling) - Data whitening ...
Cryptosystem ME6
15.0 download... ME6 is a Windows program which uses a symmetric key encryption system to encrypt information in either a single file or in multiple files (at once) so that it cannot ...
File Privacy
0.2 download... features: - File decryption/encryption - File compare for cryptography - Create random key hex string and save ... and a manual also included in application. In cryptography, Triple DES (3DES or TDES), officially the Triple ...
Steg Easy cross platform steganography
1.1.0.0 download... software, written in C++. It use steganography and cryptography techniques to hide information inside uncompressed and compressed ... steganography parameters, evaluates image's artifacts and uses both symmetric-key and asymmetric-key cryptography. Arbitrary data can be hidden ...
Advanced Encryption Package 2008 Professional
4.8.7 download... has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others ...
Advanced Encryption Package 2008 Professional
4.8.7 download... has support for RSA algorithm and Public-Private Key cryptography. One key is kept secret and is referred to as the private key while the other is made available to others ...
CrococryptLib
1.4b download... integrate encryption into your own application. No in-depth cryptography knowledge is required, save development time & budget... ... of new initialization vectors (IV) ** Any JCE-available symmetric cipher can be used alternatively - like Twofish, ...