CatCrypto also contains Swift bindings of Argon2, the password-hashing function that won the Password Hashing Competition (PHC). Context contains inputs and configures for function crypto.
https://github.com/ImKcat/CatCryptoTags | ios cryptography crypto password-hash message-digest asymmetric md2 md4 md5 md6 argon2 hashing encryption sha1 sha2 sha3 |
Implementation | C |
License | Public |
Platform |
A managed hash library that supports SHA1, SHA256, SHA384, SHA512, MD5, MD2, CRC32_ZIP, CRC8, CRC16_IBM, CRC16_CCITT, CRC16_ARC, CRC16_XMODEM, CRC16_ZMODEM, CRC24, CRC32, CRC32_JAMCRC, CRC32_BZIP2, CRC64_ISO, CRC64_ECMA, MD4, SHA224, HMACSHA1, HMACSHA256, HMACSHA384, HMACSHA51...
hash cryptography encryption hashingjshashes is lightweight library implementing the most extended cryptographic hash function algorithms in pure JavaScript (ES5 compliant).You can use the simple command-line interface to generate hashes.
hashing-algorithm hmac hexadecimal hash-encoding minim-library sha1 sha2 ripemd160 sha512 cryptography hash md5 sha256 hashes ripemd base64 crc encoding algorithmOpenSSL Digest frontend for Windows. This program can be used to create/verify MD2/MD4/MD5/SHA/SHA1/MDC2/RIPEMD160 checksums of your files. OpenSSL32 now supports file encryption/decryption using various encryption Ciphers, such as Blowfish, Idea, DES,
A native implementation of TLS (and various other cryptographic tools) in JavaScript. The Forge software is a fully native implementation of the TLS protocol in JavaScript, a set of cryptography utilities, and a set of tools for developing Web Apps that utilize many network resources.
crypto cryptography x509 message-digest aes asn1 cipher pkcs tls certificate pkcs7 pkcs1 pkcs12 pbkdf2 csr hmac sha1 sha256 md5 asn asn.1 cbc des gcm http https network pki prng rc2 rsa sha384 sha512 ssh x.509Hashing made simple. Get the hash of a buffer/string/stream/file.Convenience wrapper around the core crypto Hash class with simpler API and better defaults.
hash hashing crypto hex base64 md5 sha1 sha256 sha512 sum stream file fs buffer string text rev revving simple easyA program to calculate and verify checksums of multiple files with wizard-like GUI. Supports 12 hashes: CRC32, MD2, MD4, MD5, SHA1, SHA2, RIPEMD,Whirlpool, ED2K, AICH, Tiger, TTH. Allows processing of nested directories and updating of checksum files
KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.
This repository contains peer-reviewed libraries for password storage in PHP, C#, Ruby, and Java. Passwords are "hashed" with PBKDF2 (64,000 iterations of SHA1 by default) using a cryptographically-random salt. The implementations are compatible with each other, so you can, for instance, create a hash in PHP and then verify it in C#. This code uses the PBKDF2 algorithm to protect passwords. Better technologies for protecting passwords exist today, like bcrypt, scrypt, or Argon2. Before using this code, you should try to find a well-reviewed and carefully-made implementation of one of those algorithms for the language that you are using. These algorithms are "memory hard," meaning that they don't just need a lot of CPU power to compute, they also require a lot of memory (unlike PBKDF2). By using a memory hard algorithm, your passwords will be better protected.
Generate hashes from objects and values in node and the browser. Uses node.js crypto module for hashing. Supports SHA1 and many others (depending on the platform) as well as custom streams (e.g. CRC32). Starting with version 1.1.8 (released April 2017), new versions will consider the exact returned hash part of the API contract, i.e. changes that will affect hash values will be considered semver-major. Previous versions may violate that expectation.
object hash sha1 md5The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes.
cryptography toolkit encryption crypto javascript-cryptographySodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It is a portable, cross-compilable, installable, packageable fork of NaCl, with a compatible API, and an extended API to improve usability even further. Its goal is to provide all of the core operations needed to build higher-level cryptographic tools.
cryptography encryption pkcs hash digital-signatureFsum Frontend is a files integrity checker. It can calculate 96 hash and checksum algorithms(CRC32, MD5, SHA1, SHA2, ADLER, DHA256, FORK256, ...). You can verify your files using a .sfv/.md5/.sha1/.sha2 file or create your own checksum file.
High-performance pure-javascript SHA1 implementation suitable for large binary data, reaching up to half the native speed.
cryptography hash sha1 digest security cryptoto make the CryptoSwift awesome! Thank you. Why? Because I can.
aes cryptography commoncrypto cryptoswift md5 sha1 hmac-authentication sha3 cipher digestA GTK+ utility for computing message digests or checksums. Currently supported hash functions include MD5, MD6, SHA1, SHA256, SHA512, RIPEMD, HAVAL, TIGER and WHIRLPOOL.
hashPwd provides hashing algorithms within a classical windows form. Current Version: 1.0b
cryptography double-hashing md5 password security sha1A perceptual hash is a fingerprint of a multimedia file derived from various features from its content. Unlike cryptographic hash functions which rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the features are similar. Perceptual hashes are a different concept compared to cryptographic hash functions like MD5 and SHA1. With cryptographic hashes, the hash values are random. The data used to generate the hash acts like a random seed, so the same data will generate the same result, but different data will create different results. Comparing two SHA1 hash values really only tells you two things. If the hashes are different, then the data is different. And if the hashes are the same, then the data is likely the same. In contrast, perceptual hashes can be compared -- giving you a sense of similarity between the two data sets.
perceptual-hashes image image-hash hashMD5 project is a simple example of using ComputeHash method to create MD5 hash value from a file given in argument. It's written in C#. Also available at http://code.google.com/p/md5-computation-program/
computehash cryptography hash hashing md5Botan (Japanese for peony) is a cryptography library written in C++11. Botan's goal is to be the best option for cryptography in new C++ code by offering the tools necessary to implement a range of practical systems, such as TLS/DTLS, PKIX certificate handling, PKCS#11 and TPM hardware support, password hashing, and post quantum crypto schemes. In addition to the C++, botan has a C89 API specifically designed to be easy to call from other languages. A Python binding using ctypes is included, and several other language bindings are available.
cryptography crypto security pgp ssl secure-library
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.