•        0

This is a simple implementation of the MD5 cryptographic hashing algorithm and HMAC-MD5. This class consists of fully transparent C# code, suitable for use in .NET, Silverlight and WP7 applications.



Related Projects

Antfarm-automation - A Python framework for managing distributed parallel processing in a secure man

Inspired by the likes of MapReduce, Hadoop, and TheSchwartz, this project is a python framework for managing distributed parallel processing. Just as TheSchwartz is a reliable job queue, antfarm-automation is a job queue system with a twist of lemon. Here's what you get out of the box: a robust task manager, a status manager, python remote objects, built-in hmac-md5 message hashes, gzip message compression between task manager and client workers, and a magic admin interface provided by django.

Data-hash - String / Text / Byte Array / File / Web URL - hash viewer (CRC32, MD5, RIPEMD160, SHA1/2

AboutGUI for common hash algorithms and keyed hash algorithms from .Net namespace. Programm is able to generate hash string with following algorithms: MD5, RIPEMD160, SHA1, SHA256, SHA384, SHA512, CRC32, HMACMD5, HMACRIPEMD160, HMACSHA1, HMACSHA256, HMACSHA384, HMACSHA512 Used .Net implementation of CRC32 hash algorithm published by Damien Guard at his blog. Made with MonoDevelop FeaturesAvailable input data sources: Text - Input text field armed with encoding variator (ASCII, UTF7, UTF8, UTF32,

Webhooks - javax.crypto.SecretKey implementation for encoding Google Code project web hook secret ke

This project provides an implementation of javax.crypto.SecretKey, which can be used as the seed for HMAC-MD5 message authentication. HMAC-MD5 authentication is what Google Code uses to authenticate its web hook messages sent to projects after each commit to subversion. Use of this SecretKey implementation allows you to verify your received web hook messages in Java. A complete example of how to use this SecretKey implementation is provided below. package;import

Mantas Cryptography

Pequena biblioteca de criptografia com suporte aos algorítmos DES, RC2, Rexor e TripleDES. Gera hashes HMAC-MD5, HMAC-RIPEMD160, HMAC-SHA (SHA1, SHA256, SHA384, SHA512), MD5, RIPEMD160 E SHA (SHA1, SHA 256, SHA384, SHA512)

Smoothwall-roadster-libssh2 - Libssh2 1.2.7 for the Phaeton/Roadster Smoothwall Distro

libssh2 is a client-side C library implementing the SSH2 protocol Capabilities and Features Key Exchange Methods: diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1 Hostkey Types: ssh-rsa, ssh-dss Ciphers: aes256-cbc (, aes192-cbc, aes128-cbc, 3des-cbc, blowfish-cbc, cast128-cbc, arcfour, none Compression Schemes: zlib, none MAC hashes: hmac-sha1, hmac-sha1-96, hmac-md5, hmac-md5-96, hmac-ripemd160 (,

Sha2 - SHA-2 Lua binding

OverviewLua binding for the SHA-256/384/512 BSD-licensed C implementation by Aaron Gifford[1].Also contains the generic HMAC implementation per rfc2104 plus HMAC-SHA256/384/512 variants, and HMAC-MD5 (requires md5). Statusv0.2 (beta quality) for Lua 5.1 SHA tested with original test vectors on Win32 and 32bit and 64bit Linux HMAC-SHA tested with rfc4231 test vectors on Win32 and 32bit and 64bit Linux Changelogv0.2 - (26 Nov 2010) added HMAC modules and hex output variants v0.1 - (24 Nov 2010) in

Contiki-snmp - SNMP Implementation for Embedded Devices Supporting IEEE 802.15.4 and Contiki OS

IEEE 802.15.4 is a standard which specifies the physical layer and media access control for low-rate wireless personal area networks providing node-to-node frame delivery between devices within reachable distance. The standard is targeted at low-cost, low-speed and low-power devices. Simple Network Management Protocol (SNMP) is a widely deployed application protocol for network management and data retrieval. Its implementation can be very lightweight and may fit resource-constrained devices very

Bassh-secure-shell-in-bash - An attempt to write secure shell client in bash

This is an attempt to write a secure shell client using not much more than bash. Its a fun project with not much but possibly some users :) The following is the approach: a. Create a two way pipe b. Tee the contents written and read, through two files inflow and outflow c. Construct all the SSH packets using shell techniques (fold, awk, echo, ...) d. Write to the two way socket and read from it using netcat Later: Wrire algorithms such as md5, hmac, rc4 etc in bash Client output as of now:bash s

HMAC-MD5 - Release history of HMAC-MD5

Release history of HMAC-MD5

hcrack - HMAC-MD5 message-cracker built in C.

HMAC-MD5 message-cracker built in C.