NextGenRNG

  •        51

Random Number Generators for .Net written in C# Regular use: * MersenneTwister 3 CNG Cryptographically secure RNG: * CTR_DRBG * DSS * DUAL Elliptic Curve Concurrency: * Thread-Safe Non-repetitive RNG Encryption Cipher: * Anubis (successor of Rijndael)

http://nextgenrng.codeplex.com/

Tags
Implementation
License
Platform

   




Related Projects

windows-cng - Ruby interface for Windows Next Generation Cryptography


Ruby interface for Windows Next Generation Cryptography

sjcl - Stanford Javascript Crypto Library


The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes.

fscrypt - Go tool for managing Linux filesystem encryption


fscrypt is a high-level tool for the management of Linux filesystem encryption. This tool manages metadata, key generation, key wrapping, PAM integration, and provides a uniform interface for creating and modifying encrypted directories. For a small low-level tool that directly sets policies, see fscryptctl.To use fscrypt, you must have a filesystem with encryption enabled and a kernel that supports reading/writing from that filesystem. Currently, ext4, F2FS, and UBIFS support Linux filesystem encryption. Ext4 has supported Linux filesystem encryption since v4.1, F2FS added support in v4.2, and UBIFS added support in v4.10. Other filesystems may add support for native encryption in the future. Filesystems may additionally require certain kernel configuration options to be set to use native encryption.

BouncyCastle - Lightweight Cryptography API for Java and CSharp


Bouncy Castle Crypto APIs is a lightweight cryptography API for Java and CSharp. It has provider for the Java Cryptography Extension and the Java Cryptography Architecture. It supports TLS, PKCS7, PKCS12, OpenPGP, S/MIME, OCSP, TSP, CMP, Extended Access Control, ASN and lot more.

rubyrsa - rsa encryption implementation for my cryptography course


rsa encryption implementation for my cryptography course



WilhelmCBC - Chaining Block Cipher Feistel type encryption program for my Cryptography class.


Chaining Block Cipher Feistel type encryption program for my Cryptography class.

Notebook PEA - Text Editor with Password Encryption


Password encryption tool with built-in text editor, to protect private notes. The program offers some styling and editing functionality for the text, a password generator, a password-strength meter and a virtual keyboard. The text is protected using authenticated encryption.

Jasypt - Java Simplified Encryption


Jasypt is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works. It provides unidirectional (digest) and bidirectional encryption techniques. It could encrypt text, byte arrays, objects, files etc. It could be integrated with Spring, Apache wicket.

Tcpcrypt - Encrypting the Internet


Tcpcrypt is a protocol that attempts to encrypt (almost) all of your network traffic. Unlike other security mechanisms, Tcpcrypt works out of the box: it requires no configuration, no changes to applications, and your network connections will continue to work even if the remote end does not support Tcpcrypt, in which case connections will gracefully fall back to standard clear-text TCP.

sio - Go implementation of the Data At Rest Encryption (DARE) format.


It is a common problem to store data securely - especially on untrusted remote storage. One solution to this problem is cryptography. Before data is stored it is encrypted to ensure that the data is confidential. Unfortunately encrypting data is not enough to prevent more sophisticated attacks. Anyone who has access to the stored data can try to manipulate the data - even if the data is encrypted.Authenticated encryption schemes (AE) - like AES-GCM or ChaCha20-Poly1305 - encrypt and authenticate data. Any modification to the encrypted data (ciphertext) is detected while decrypting the data. But even an AE scheme alone is not sufficiently enough to prevent all kinds of data manipulation.

EMISymCrypto - Managed symmetric & asymmetric cryptography library


A managed symmetric & asymmetric cryptography library that supports Aes192, Aes256, DES, RC2, Rijndael, TripleDES, Blowfish, Twofish, RC4, ARC4.

Cryptosolic - The Cryptography & Software Licensing Framework for .Net


Cryptosolic is an Open Source Cryptography & Software Licensing Framework for .Net. More Information and Downloads available soon.

Keyczar - Toolkit for safe and simple cryptography


KeyczarKeyczar is an open source cryptographic toolkit designed to make it easier and safer for devlopers to use cryptography in their applications. Keyczar supports authentication and encryption with both symmetric and asymmetric keys. Keyczar was originally developed by members of the Google Security Team.

Acra - Database protection suite with selective encryption and intrusion detection


Acra helps you to easily secure your databases in distributed, microservice-rich environments. It allows you to selectively encrypt sensitive records with strong multi-layer cryptography, detect potential intrusions and SQL injections and cryptographically compartment data stored in large sharded schemes. It's security model guarantees that compromising the database or your application does not leak sensitive data, or keys to decrypt it.

File Lock PEA - Filesystem-Level Encryption


The File Lock PEA (PEA = Password Encrypting Archive) encrypts data at the filesystem level and offers the possibility to decrypt single files or whole directories temporarily.

Python-gnupg - Python API which wraps the GNU Privacy Guard


The gnupg module allows Python programs to make use of the functionality provided by the GNU Privacy Guard (abbreviated GPG or GnuPG). Using this module, Python programs can encrypt and decrypt data, digitally sign documents and verify digital signatures, manage (generate, list and delete) encryption keys, using proven Public Key Infrastructure (PKI) encryption technology based on OpenPGP.

Cryptlib - provides Encryption and Authentication Service


cryptlib is a powerful security toolkit that allows even inexperienced crypto programmers to easily add encryption and authentication services to their software. It provides support for S/MIME and PGP/OpenPGP secure enveloping, SSL/TLS and SSH secure sessions, CA services such as CMP, SCEP, RTCS, and OCSP, and other security operations such as secure timestamping.

Charm-crypto - A Python-based rapid prototyping framework for cryptosystems


Charm is a framework for rapidly prototyping advanced cryptosystems. Based on the Python language, it was designed from the ground up to minimize development time and code complexity while promoting the reuse of components. It supports Base crypto library, including symmetric encryption schemes, hash functions, PRNGs, digital signature, encryption and lot more.