M-Pin Strong Authentication System enables true two-factor authentication for web sites and applications, based on the open source M-Pin Authentication Server and M-Pin Managed Service. The M-Pin™ Managed Service is a highly available, fault tolerant software as a service that issues cryptographic secrets to M-Pin Authentication Servers and Clients.
The M-Pin Authentication Server uses just one leak-proof cryptographic key, and can't reveal any information about your users such as identity or login details, even if the key is compromised. The M-Pin Client is an HTML5 browser, so developers can easily integrate M-Pin into their websites and applications, enabling frictionless two-factor authentication and removing all username / password vulnerabilities.
Tags | 2factor authentication security cryptography |
Implementation | Java |
License | Public |
Platform | OS-Independent |
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, cryptography, and session management. With Shiro’s easy-to-understand API, you can quickly and easily secure any JVM-based application – from the smallest mobile applications to the largest web and enterprise applications.
jaas security-framework authentication authorization cryptography securityKeyczarKeyczar is an open source cryptographic toolkit designed to make it easier and safer for devlopers to use cryptography in their applications. Keyczar supports authentication and encryption with both symmetric and asymmetric keys. Keyczar was originally developed by members of the Google Security Team.
cryptography security symmetric library key-managementcryptlib is a powerful security toolkit that allows even inexperienced crypto programmers to easily add encryption and authentication services to their software. It provides support for S/MIME and PGP/OpenPGP secure enveloping, SSL/TLS and SSH secure sessions, CA services such as CMP, SCEP, RTCS, and OCSP, and other security operations such as secure timestamping.
cryptography encryption s-mime digital-signature security security-libraryThe Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes.
cryptography toolkit encryption crypto javascript-cryptographyCurve implements the CurveZMQ elliptic curve security mechanism, for use in ZeroMQ applications. This library is primarily a reference implementation for the CurveZMQ specification but may also be used for end-to-end security. CurveZMQ creates encrypted sessions ("connections") between two peers using short term keys that it securely exchanges using long term keys. When the session is over, both sides discard their short term keys, rendering the encrypted data unreadable, even if the long term keys are captured. It is not designed for long term encryption of data.
zeromq zeromq-security cryptography security elliptic-curveConscrypt is a Java Security Provider (JSP) that implements parts of the Java Cryptography Extension (JCE) and Java Secure Socket Extension (JSSE). It uses BoringSSL to provide cryptographical primitives and Transport Layer Security (TLS) for Java applications on Android and OpenJDK.The core SSL engine has borrowed liberally from the Netty project and their work on netty-tcnative, giving Conscrypt similar performance.
jce jsse security-provider java-cryptography-extension cryptographyTcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP.
tcp-encryption encryption cryptography network-security securityThemis is open-source high-level cryptographic services library for mobile and server platforms, providing secure messaging and secure data storage. Themis provides three important cryptographic services Secure messaging, Secure session and Secure storage.
secure-messaging secure-session secure-storage cryptography security librarystep is a zero trust swiss army knife. It’s an easy-to-use and hard-to-misuse utility for building, operating, and automating systems that use zero trust technologies like authenticated encryption (X.509, TLS), single sign-on (OAuth OIDC, SAML), multi-factor authentication (OATH OTP, FIDO U2F), encryption mechanisms (JSON Web Encryption, NaCl), and verifiable claims (JWT, SAML assertions). For more information and docs see the step website and the blog post announcing step.
security security-tools jwt oauth x509 tls oath totp encryption cryptography sso mfa jws jwe joseRustls is a modern TLS library written in Rust. It's pronounced 'rustles'. It uses ring for cryptography and libwebpki for certificate verification. It aims to provide a good level of cryptographic security, requires no configuration to achieve that security, and provides no unsafe features or obsolete cryptography.
tls cryptography ssl security rsaRustls is a modern TLS library written in Rust. It uses ring for cryptography and libwebpki for certificate verification. Rustls aims to provide a good level of cryptographic security, requires no configuration to achieve that security, and provides no unsafe features or obsolete cryptography.
tls ssl cryptography securityThe CLR security team codeplex site provides sample code and libraries of APIs to extend and debug the security APIs that ship with the .NET Framework. This codeplex site includes Security.Cryptography.dll which adds new cryptography algorithms to the .NET framework, as well ...
security cryptography clr clr-security debugging extension-methodsThis is a simple utility to enable Linux users to use 3G Internet from Bulgarian mobile operators with 3G USB modems without any configurations performed by the user. Currently tested on recent Ubuntu, Debian, Fedora and openSUSE distributions and following devices: HUAWEI E173 (Vivacom), Alcatel X220L (Vivacom), ZTE MF190 (Globul), ZTE K3565-Z (M-tel). connect_3g now supports PIN code security, though using it is not recommended.
Halite is a high-level cryptography interface that relies on libsodium for all of its underlying cryptography operations. Halite was created by Paragon Initiative Enterprises as a result of our continued efforts to improve the ecosystem and make cryptography in PHP safer and easier to implement.
easy-to-use cryptography cryptography-library libsodium composer encryption authentication digital-signature curve25519 ed25519 x25519 xsalsa20 poly1305 blake2b siphash argon2 php7 misuse-resistantBouncy Castle Crypto APIs is a lightweight cryptography API for Java and CSharp. It has provider for the Java Cryptography Extension and the Java Cryptography Architecture. It supports TLS, PKCS7, PKCS12, OpenPGP, S/MIME, OCSP, TSP, CMP, Extended Access Control, ASN and lot more.
security cryptography encryption pkcsApache Shiro is a powerful and flexible open-source security framework that cleanly handles authentication, authorization, enterprise session management, single sign-on and cryptography services.
JSecurity is a powerful and flexible open-source Java security framework that cleanly handles authentication, authorization, enterprise session management, and cryptography services.
Off-the-Record (OTR) Messaging allows you to have private conversations over instant messaging by providing encryption, authentication, deniability, and perfect forward secrecy. If you lose control of your private keys, no previous conversation is compromised.
chat secure-chat cryptography security privacy im-client instant-messagingThis is a guide to using YubiKey as a SmartCard for storing GPG encryption and signing keys. An authentication key can also be created for SSH and used with gpg-agent.
yubikey gpg gnupg ssh security gpg-agent gpg-configuration smartcard remote-access rsa-cryptographyBee2 is a cryptographic library which implements cryptographic algorithm and protocols standardized in Belarus. Additionally, Bee2 implements digital signature algorithms standardized in Russia and Ukraine.
cryptographic-library encryption-algorithms public-key-cryptography message-authentication-code hashing-algorithms elliptic-curve-diffie-hellman secret-sharing security
We have large collection of open source products. Follow the tags from
Tag Cloud >>
Open source products are scattered around the web. Please provide information
about the open source projects you own / you use.
Add Projects.