EMIHash - Managed hash library

  •        122

A managed hash library that supports SHA1, SHA256, SHA384, SHA512, MD5, MD2, CRC32_ZIP, CRC8, CRC16_IBM, CRC16_CCITT, CRC16_ARC, CRC16_XMODEM, CRC16_ZMODEM, CRC24, CRC32, CRC32_JAMCRC, CRC32_BZIP2, CRC64_ISO, CRC64_ECMA, MD4, SHA224, HMACSHA1, HMACSHA256, HMACSHA384, HMACSHA51...

http://emihash.codeplex.com/

Tags
Implementation
License
Platform

   




Related Projects

libsodium - A modern and easy-to-use crypto library.


Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It is a portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API, and an extended API to improve usability even further. Its goal is to provide all of the core operations needed to build higher-level cryptographic tools.

jshashes - Fast and dependency-free cryptographic hashing library for node


jshashes is lightweight library implementing the most extended cryptographic hash function algorithms in pure JavaScript (ES5 compliant).You can use the simple command-line interface to generate hashes.

sjcl - Stanford Javascript Crypto Library


The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes.

Cryptosolic - The Cryptography & Software Licensing Framework for .Net


Cryptosolic is an Open Source Cryptography & Software Licensing Framework for .Net. More Information and Downloads available soon.



linux cryptography library


I needed a library of functions that enabled me to perform hash functions and symmetric cryptography. I chose MD5 initially but eventually chose SHA as the hashing algorithm due to concerns regarding the \'collision resistance\' of MD5 due to weakne

Charm-crypto - A Python-based rapid prototyping framework for cryptosystems


Charm is a framework for rapidly prototyping advanced cryptosystems. Based on the Python language, it was designed from the ground up to minimize development time and code complexity while promoting the reuse of components. It supports Base crypto library, including symmetric encryption schemes, hash functions, PRNGs, digital signature, encryption and lot more.

MD5 computation program


MD5 project is a simple example of using ComputeHash method to create MD5 hash value from a file given in argument. It's written in C#. Also available at http://code.google.com/p/md5-computation-program/

NaCL - Networking and Crytography library


NaCl is a new easy-to-use high-speed software library for network communication, encryption, decryption, signatures, etc. NaCl provides a simple crypto_box function that does everything in one step. The function takes the sender's secret key, the recipient's public key, and a message, and produces an authenticated ciphertext.

Zero-Allocation-Hashing - Zero-allocation hashing for Java


Zero-allocation, pretty fast implementations of non-cryptographic hash functions for byte sequences or blocks of memory

chash - Very fast consistent hashing library


Consistent hashing is a scheme that provides hash table functionality in a way that the addition or removal of one slot does not significantly change the mapping of keys to slots. In contrast, in most traditional hash tables, a change in the number of array slots causes nearly all keys to be remapped. By using consistent hashing, only K/n keys need to be remapped on average, where K is the number of keys, and n is the number of slots.CHash is Dailymotion's implementation of consistent hashing, available as a light and fast C library (both static and shared objects provided), with PHP and Python bindings.

xkcd-hashing - A multiprocessing, brute force Skein1024 hash program which auto-submits answers.


xkcd-hashing is a multiprocessing, brute force Skein1024 hash program quickly created for the xkcd Externalities challenge. It runs on OS X, Ubuntu, and Windows and autosubmits low diff answers as they are found. This implementation was used for a time, before the student body switched to a C implementation. Results here.Search for data that hashes to the correct goal output hash. This script will randomly Skein1024 hash data and check the digest output to determine how many bits are different from the goal output. Whenever a "best" guess is found, it is submitted to the xkcd site, assuming your network connection is working.

Crypt


The Crypt component provides methods for generating random numbers and strings, also, password hashing and password hash verification and methods for encryption and decryption of strings.

flask-scrypt - Flask-Scrypt flask extension provides scrypt password hashing and random salt generation


Flask-Scrypt is a Flask extension used to generate scrypt password hashes and random salts. For those looking for extra security compared to SHA-1 and MD5 encryption. Flask-Scrypt depends on py-scrypt which should install automatically but can be installed manually using pip install scrypt.Generate random salt for use with the generate_password_hash function. You will want to store this salt with the rest of your users database information. This salt along with the generated hash will be used to check the password later on.

.NET Crypto Library (Devv.Core.Crypto)


Devv.Core.Crypto is an encryption library written in VB.NET. It supports all the major Cipher and Hash algorithms: RC2, DES, TripleDES, AES (Rijndael), SHA and MD5. The configuration can be done using the application settings file, and it's quite easy to integrate. Compatible ...

fscrypt - Go tool for managing Linux filesystem encryption


fscrypt is a high-level tool for the management of Linux filesystem encryption. This tool manages metadata, key generation, key wrapping, PAM integration, and provides a uniform interface for creating and modifying encrypted directories. For a small low-level tool that directly sets policies, see fscryptctl.To use fscrypt, you must have a filesystem with encryption enabled and a kernel that supports reading/writing from that filesystem. Currently, ext4, F2FS, and UBIFS support Linux filesystem encryption. Ext4 has supported Linux filesystem encryption since v4.1, F2FS added support in v4.2, and UBIFS added support in v4.10. Other filesystems may add support for native encryption in the future. Filesystems may additionally require certain kernel configuration options to be set to use native encryption.

BouncyCastle - Lightweight Cryptography API for Java and CSharp


Bouncy Castle Crypto APIs is a lightweight cryptography API for Java and CSharp. It has provider for the Java Cryptography Extension and the Java Cryptography Architecture. It supports TLS, PKCS7, PKCS12, OpenPGP, S/MIME, OCSP, TSP, CMP, Extended Access Control, ASN and lot more.

CryptoHelper - A solution of helper classes for Encryption/Decryption with AES, and Hashing.


A solution of helper classes for Encryption/Decryption with AES, and Hashing.

java-security-lib - Some hashing and encryption helpers and stuff


Some hashing and encryption helpers and stuff

node-crypt - utilities for encryption and and hashing in node.js


utilities for encryption and and hashing in node.js