siv-mode - RFC 5297 SIV mode of operation in Java

  •        45

RFC 5297 SIV mode: deterministic authenticated encryption

https://github.com/cryptomator/siv-mode

Dependencies:

org.bouncycastle:bcprov-jdk15on:1.60

Tags
Implementation
License
Platform

   




Related Projects

miscreant - Misuse-resistant symmetric encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support

  •    TypeScript

A misuse resistant symmetric encryption library designed to support authenticated encryption of individual messages, encryption keys, message streams, or large files using the AES-SIV (RFC 5297), AES-PMAC-SIV, and STREAM constructions. Miscreant is available for several programming languages, including C#, Go, JavaScript, Python, Ruby, and Rust.

Cryptomator - Multi-platform transparent client-side encryption of your files in the cloud

  •    Java

Cryptomator offers multi-platform transparent client-side encryption of your files in the cloud. Most cloud providers encrypt data only during transmission or they keep the keys for decryption for themselves. These keys can be stolen, copied, or misused. With Cryptomator, the key to your data is in your hands. Cryptomator encrypts your data quickly and easily. Afterwards you upload them protected to your favorite cloud service.

.NET Crypto Library (Devv.Core.Crypto)

  •    DotNet

Devv.Core.Crypto is an encryption library written in VB.NET. It supports all the major Cipher and Hash algorithms: RC2, DES, TripleDES, AES (Rijndael), SHA and MD5. The configuration can be done using the application settings file, and it's quite easy to integrate. Compatible ...

keyshuffling - Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain

  •    TeX

We demonstrate an attack on the secure bootchain of the Nintendo 3DS in order to gain early code execution. The attack utilizes the block shuffling vulnerability of the ECB cipher mode to rearrange keys in the Nintendo 3DS's encrypted keystore. Because the shuffled keys will deterministically decrypt the encrypted firmware binary to incorrect plaintext data and execute it, and because the device's memory contents are kept between hard reboots, it is possible to reliably reach a branching instruction to a payload in memory. This payload, due to its execution by a privileged processor and its early execution, is able to extract the hash of hardware secrets necessary to decrypt the device's encrypted keystore and set up a persistent exploit of the system. Information in this article (especially the keyshuffling vulnerability) is original, independent work unless cited otherwise. Note that the keyshuffling vulnerability detailed here is the same one documented publicly by much of this team including "stuckpixel" (also known as "dark_samus") on sites such as 3DBrew. Additionally, note that the persistence vulnerability detailed here is the same one documented publicly as "arm9loaderhax" by "plutoo", "derrek", and "smea" at the 2015 32c3 conference.

forge - A native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps

  •    Javascript

A native implementation of TLS (and various other cryptographic tools) in JavaScript. The Forge software is a fully native implementation of the TLS protocol in JavaScript, a set of cryptography utilities, and a set of tools for developing Web Apps that utilize many network resources.


Themis - Crypto library for storage and messaging for ObjC, Android, C++, JS, Python, Ruby and PHP

  •    C

Themis is open-source high-level cryptographic services library for mobile and server platforms, providing secure messaging and secure data storage. Themis provides three important cryptographic services Secure messaging, Secure session and Secure storage.

Simple Image Viewer (SIV)

  •    PHP

A small program to display and list images in a directory on a webserver that supports php.

neural-enhance - Super Resolution for images using deep learning.

  •    Python

Example #1 — Old Station: view comparison in 24-bit HD, original photo CC-BY-SA @siv-athens. As seen on TV! What if you could increase the resolution of your photos using technology from CSI laboratories? Thanks to deep learning and #NeuralEnhance, it's now possible to train a neural network to zoom in to your images at 2x or even 4x. You'll get even better results by increasing the number of neurons or training with a dataset similar to your low resolution image.

orion - Usable, easy and safe pure-Rust crypto

  •    Rust

Orion is a cryptography library written in pure Rust. It aims to provide easy and usable crypto while trying to minimize the use of unsafe code. You can read more about Orion in the wiki. This library has not undergone any third-party security audit. Usage is at own risk.

crypto-algorithms - Basic implementations of standard cryptography algorithms, like AES and SHA-1.

  •    C

These are basic implementations of standard cryptography algorithms, written by Brad Conte (brad@bradconte.com) from scratch and without any cross-licensing. They exist to provide publically accessible, restriction-free implementations of popular cryptographic algorithms, like AES and SHA-1. These are primarily intended for educational and pragmatic purposes (such as comparing a specification to actual implementation code, or for building an internal application that computes test vectors for a product). The algorithms have been tested against standard test vectors. This code is released into the public domain free of any restrictions. The author requests acknowledgement if the code is used, but does not require it. This code is provided free of any liability and without any quality claims by the author.

AESCrypt-ObjC - A simple and opinionated AES encrypt / decrypt Objective-C class that just works.

  •    Objective-C

AESCrypt is a simple to use, opinionated AES encryption / decryption Objective-C class that just works. AESCrypt uses the AES-256-CBC cipher and encodes the encrypted data with base64.

PrivateBin - A minimalist, open source online pastebin where the server has zero knowledge of pasted data

  •    PHP

PrivateBin is a minimalist, open source online pastebin where the server has zero knowledge of pasted data. Data is encrypted and decrypted in the browser using 256bit AES in Galois Counter mode.

ANUBIS Crypto Engine (Verilog)

  •    

This is a hardware crypto engine for the Anubis block cipher written in Verilog.

sjcl - Stanford Javascript Crypto Library

  •    Javascript

The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes.

Adaptive Steganography with AES

  •    C++

The software implements an adaptive steganography algorithm called Adaptive Minimum Error Least Significant Bit Replacement(AMELSBR) along with AES 128, 192 and 256 bit cipher for 24-bit bitmap files.

hat.sh - Encrypt and Decrypt files securely in your browser.

  •    Javascript

Hat.sh is a web app that provides secure file encryption in the browser. It's fast, secure and runs locally, the app never uploads the files to the server. It uses modern secure cryptographic algorithms with chunked AEAD stream encryption/decryption. The libsodium library is used for all cryptographic algorithms.

pidCrypt

  •    Javascript

pidCrypt is a crypto library offering modular cryptographic functions in JavaScript. Supports: AES (CBC amp; CTR Mode), RSA, MD5, SHA-1, SHA-256, SHA-384, SHA-512, ASN.1, Base64, UTF-8. The AES-CBC mode is compatible to OpenSSL.






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.