Cryptography Courses Online

Security - Cryptography

Live Instructor Led Online Training Cryptography courses is delivered using an interactive remote desktop! .

During the course each participant will be able to perform Cryptography exercises on their remote desktop provided by Qwikcourse.


How do I start learning Cryptography?


Select among the courses listed in the category that really interests you.

If you are interested in learning the course under this category, click the "Book" button and purchase the course. Select your preferred schedule at least 5 days ahead. You will receive an email confirmation and we will communicate with trainer of your selected course.

Cryptography Training


Discover CertForge

About

CertForge is a web-based certificate utility written in Java 1.6, to make or view X.509 certificates, keys, CRLs, manage keystore and truststore (CTL) for SSL sites, and run as a simple Certificate Authority (CA).


7 hours

1,656 €

Basics of CheckSome

About

MD5 & SHA256 File Checker

CheckSome is a simple windows app to show MD5 and SHA256 of a file File Information of Developer Generated File: Name: CheckSome.exe MD5: SHA256: SHA1:


7 hours

1,656 €

Discover Cifrar texto

About

Encriptador es un sencillo sistema para convertir un texto cualquiera en caracteres equivalentes sin sentido, y después poderlos volver a convertir en texto normal. En una única interfaz realizaremos tanto la encriptación como la desencriptación. Sólo hará falta pegar el texto en su ventana correspondiente, que depende si es para desencriptar o para encriptar, y listo


7 hours

1,656 €

Discover Cryppie

About

NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.


7 hours

1,656 €

Explore Cryptic Plus

About

Derived from TrueCrypt 6.3 release, I added some command line options to "TrueCrypt Format.exe" to allow TrueCrypt volumes to be created without using the graphical user interface


7 hours

1,656 €

Fundamentals of CryptoPad v1 0

About

AES-128 bit file encryptor

CryptoPad is a Java based file encryptor ! It can encrypt every type of file. The icing on the cake is that it's 100% cross-platform. i.e. You can run the same .jar file on Windows, Mac OS, Linux and any OS capable of running JRE 8 :) CryptoPad uses AES-128 bit symmetric key encryption to secure your data.


7 hours

1,656 €

Explore Cracx

About

simple and light-weight archive password cracker

Cracx allows you to crack archive passwords of any encryption using 7-zip, WinRAR or a custom command, via Brute Force or Dictionary attack. Note: You must NOT use this program with files you don't have the rights to extract/open/use them! Currently, the program requires a current version of either 7-zip or WinRAR to be installed, but you can also use it to bruteforce basically anything that is executably via command-line with custom parameters. On an i7 CPU, it runs approximately 30 combination tests per second. Feel free to make suggestions or contribute by implementing features and translating the tool into your native language!


7 hours

1,656 €

Explore Steghide UI

About

Steghide UI is a nifty GUI written by Drunken.Canadian for the console application steghide as the name suggests. It allows the user to everything steghide can but with a nice user friendly GUI. Now, steghide UI has a new options panel.


7 hours

1,656 €

Know jasypt java simplified encryption

About

PLEASE NOTE that we are in the process of moving to GitHub: Jasypt (Java Simplified Encryption) is a java library which allows the developer to add basic encryption capabilities to his/her projects with minimum effort, and without the need of having deep knowledge on how cryptography works. PLEASE NOTE that we are in the process of moving to GitHub:


7 hours

1,656 €

Work around with BruteForcer

About

A client-server multithreaded application for bruteforce cracking passwords. The more clients connected, the faster the cracking. Plugin-based. Supports only RAR passwords at the moment and only with encrypted filenames.


7 hours

1,656 €

Basics of Open Cryptographic Framework for Linux

About

A Linux port of the OpenBSD/FreeBSD Cryptographic Framework (OCF). This port aims to bring full asynchronous HW/SW crypto acceleration to the Linux kernel, OpenSwan, OpenSSL and applications using DES, 3DES, AES, MD5, SHA, PublicKey, RNGs and more.


7 hours

1,656 €

Fundamentals of KeePass Pronounceable Password Generator

About

A pronounceable password generator plugin for KeePass. DISCLAIMER: Compared to traditional randomly generated passwords of the same length, pronounceable passwords are inherently weaker against brute force attacks. Using pronounceable passwords sacrifice some resistance against brute force attacks to reduce the risk of inadvertent password exposure. Whether this trade-off is worth it or not depends entirely on your use case. When using this application I recommend generating considerably longer passwords to make any brute force attack as difficult as possible. This application uses FIPS-181 for generating passwords and it is particularly vulnerable to brute force attacks that are targeted specifically towards the algorithm. I added modifications to the implementation (such as allowing the insertion of random numbers or symbols between syllables) with the intention of protecting against a targeted attack, but I cannot make any supported claims as to its effectiveness.


7 hours

1,656 €

Know CrococryptFile

About

An encryption tool for creating file archives

CrococryptFile is a file encryption tool which creates encrypted archives of files and folders. The encryption features of CrococryptFile can be compared to a ZIP utility that uses ZIP's AES encryption. However, there are significant differences. CrococryptFile... - encrypts all file and folder information including filenames, time/date and filesize information, - disguises any information of the archive's content, because all data and meta-data is simply integrated into a giant file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...


7 hours

1,656 €

Work around with rcracki mt

About

Rcracki_mt can be used to perform a rainbow table attack on password hashes. It is intended for indexed&perfected rainbow tables, mainly generated by the distributed project www.freerainbowtables.com


7 hours

1,656 €

Fundamentals of SSL Diagnos

About

SSL Strength Evaluation and Test Utility

SSL Diagnos is used to test SSL strength; get information about SSL protocols (pct, ssl2, ssl3, tls, dtls) and cipher suites. It can also be used for testing and rating ciphers on SSL clients. It has also specific support for pop3s, sip, smtp and explicit ftps. Tests for heartbleed (including dtls). Furthermore a separate tool, SSLPressure, not using openssl can be used to check the whole spectrum of possible SSL protocols on a server. Can also be used for testing ssl for mssql-servers (was added since nessus did not support this) and contains mitm poc for stripping ssl from mssql-connections.


7 hours

1,656 €

Know DiskCryptor

About

DiskCryptor - fully open solution to encrypt all partitions, including system. The program is a replacement for proprietary DriveCrypt Plus pack and PGP WDE.


7 hours

1,656 €

Work around with Hash Calculator

About

This is a Hash Calculating tool that calculates hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.


7 hours

1,656 €

Fundamentals of Digital Signer

About

Sign PDF using PFX, USB, DSC, PKCS12, Store Cert., X.509, Smart Card.

Digital Signer (Digital Signature) is software that digitally signs PDF documents. Designed and developed by Pulkitsoft. Using this product you can quickly sign single/multiple PDF files (batch mode) by selecting input and output directory/folder. This is ideal for bulk signing of a large number of corporate documents rather than signing each one individually. Protects and prevents documents tamper-proof your personal, official, Invoice, Bills, Tax forms, Business Contracts, Legal and any other document. Prevent and protect PDF file editing, tampering and fraud. Your documents become permanently uneditable with high-grade security.


7 hours

1,656 €

Explore j4sign

About

This project is devoted to provide a simple software layer for digital signature, when an hardware cryptographic token is required. The default implementation tries to comply as strictly as possible with the italian law digital signature directives.


7 hours

1,656 €

Work around with cryptsync

About

A folder sync tool with encryption

Synchronizes multiple folders with each other, keeping them up-to-date. One folder of each pair is kept encrypted. Very useful when using cloud storage tools like SkyDrive, GDrive or Dropbox.


7 hours

1,656 €

Learn Cryptonik

About

Text encryption tool using Vigenère cipher

Cryptonik-Text is a useful, simple to use tool for encrypt/decrypt text docs, messages, notes etc. Application uses a charset that can be typed from any keyboard (on-screen or hardware). Some national symbols are converted to 26 standard latin letters.


7 hours

1,656 €

Learn Cryptotext Editor

About

Текстовый редактор с поддержкой шифрования. Переведён на русский язык. A text editor with encryption support. Translated into Russian. Alternate link: Официальный сайт:


7 hours

1,656 €

Discover EasyJCE

About

Provides encryption & password hashing for your app or Hibernate POJOs

EasyJCE provides an easy to use interface for encrypting, decrypting, and hashing data for transmission or storage using the Java Cryptographic Extension (JCE). A set of Hibernate user types is included to transparently integrate encryption into the data layer in a JPA/Hibernate environment, ensuring data is persisted in its encrypted form while obscuring encryption and decryption logic from application code. EasyJCE supports most algorithms implemented for the JCE, including those provided by third-party encryption service providers. Integrated MAC (Message Authentication Code) support can optionally be used to ensure data integrity and indicate possible data tampering. EasyJCE also provides basic encoding and decoding facilities for transmitting encrypted binary data through mediums which are limited to printable ASCII characters, such as email messages or URL's.


7 hours

1,656 €

Basics of EncrypIT

About

Program to quickly and easily encrypt or decrypt files or directories

Program to quickly and easily encrypt or decrypt files or directories using Encrypting File System (EFS) as well as add and remove domain user EFS permissions to a file. There is also a button to backup a users EFS PFX certificate.


7 hours

1,656 €

Learn Encrypting Safe

About

This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.


7 hours

1,656 €

Work around with Encryptron

About

An encryption software using C# 4.0

First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho Qsdsdpthrhudr!; 0/!Lhbsnrngu!Whrt`m!Rutehn/!) This is absolute fuzzy mess! That’s ‘encryption’ according to my software. Now feed this data back in the software you get usual form the plain English language. Put the same software at both terminals it may help in encoding and deciphering simultaneously


7 hours

1,656 €

Basics of Endico Text Encrypt

About

Fastest way to make secure text.

Help to convert text into secret codes , so that you can mail,chat and transfer text securely to prevent hacking. How to use : Step one - Open Endico 14 Step two - Decide what to do (Text Encode/Text Decode) Step three - If You Selected Text Encode -> Then Type/Copy/Open .txt file to convert. Step four - Copy the converted text into clipboard to chat,mail,print process etc. Step five - If you want to Decode the code the again follow step two. Step six - Congratulations! you done it . Advantages and Applications 1. Fast and East TEXT encoding. 2. Fast and Easy Code decoding. 3. Easy User Interface & 24x7 Support. 4. Low system requirements. 6. Easy to share outputs. Note : Use same application to decode the data . (C) Logicwoods Ind


7 hours

1,656 €

Know Files Hash code Verifier

About

A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.


7 hours

1,656 €

Know Format Preserving Encryption

About

Format-Preserving Encryption Library for Java

This package implements the FF1, FF3, and FFX algorithms and the A2 and A10 parameter sets for format-preserving encryption. The FF1 and FF3 methods for format-preserving encryption are implementations of NIST Special Publication 800-38G, Recommendation for Block Cipher Modes of Operation: Methods for Format-Preserving Encryption. The FFX algorithm and A2 and A10 parameter sets are implementations of "The FFX Mode of Operation for Format-Preserving Encryption," by Mihir Bellare, Phillip Rogaway, and Terence Spies. For more information see the README.txt and package-info.java files in the source.


7 hours

1,656 €

Know FreeOTFE4PDA

About

A free, open source, "on-the-fly" transparent disk encryption program. With this software, you can create one or more "virtual memory cards" on your PDA - anything written to which will be automatically, and securely, encrypted before being store


7 hours

1,656 €

Know Gryptonite

About

Cross-platform encrypted password and file database

A user-friendly, cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. It's not just easy to use, it's also highly secure. Security experts will be happy to know that it uses AES with CCM and has a solid security concept.


7 hours

1,656 €

Fundamentals of HcryptoJ

About

HcryptoJ (Historical cryptology in Java) is a Java based programming library for implementing and analyzing historical ciphers. HcryptoJ is designed to support research and teaching in historical cryptography and computer science. Licensed under GPL.


7 hours

1,656 €

Discover WebLocker

About

Ad-Blocker ,Anti-Porn, Anti-DNS Leak, Web Blocker, Connectivity Fixer

WebLocker is a free software that allows you to block annoying ads, block domains known to spread malware, block adult websites (Pornography), block social networks, block online gambling, stop DNS leaking and more features. Available for Windows: XP, 7, 8, 8.1 and 10. We hope you enjoy using WebLocker! TheYousSoft Team


7 hours

1,656 €

Know Elliptic Curve Cryptography in Java

About

JECC is an open source implementation of public key Elliptic Curve Cryptography written in Java. As of now it provides en-/decrypted out- and input streams.


7 hours

1,656 €

Discover Rainbow Tables Generation

About

Rainbow Tables Generation Project allow free use of rainbow tables for software RainbowCrack. Tables Generated by Winrtgen. Thank you, mao.


7 hours

1,656 €

Know extcv

About

Expand a TrueCrypt volume on the fly without reformatting. All kind of volumes (container files, disks and partitions) formatted with the NTFS file system are supported.


7 hours

1,656 €

Work around with loop AES

About

Fast and transparent file system and swap encryption package for linux. No source code changes to linux kernel. Works with 5.x, 4.x, 3.x, 2.6, 2.4, 2.2 and 2.0 kernels.


7 hours

1,656 €

Know Checksum Control

About

A program to verify and write checksumfiles. It supports SFV and MD5 , even some exotic MD5 file types. Very easy to use, with a wizard interface.


7 hours

1,656 €

Learn cryptmount

About

Linux encrypted filesystem management tool

cryptmount allows management and user-mode mounting of encrypted filing systems on GNU/Linux systems. Filesystems & crypto-swap can be on either raw block devices or ordinary files, with device-mapper (dm-crypt) and loopback devices setup automatically.


7 hours

1,656 €

Discover java sign

About

A software written in java to compute the digital signature on documents and verify them, using a smart card or a token file in p12 format


7 hours

1,656 €

Fundamentals of sshdos SSH SCP SFTP Telnet client

About

SSHDOS is a DOS port of SSH, SCP, SFTP and Telnet clients. Needs a packet driver (or a PPP driver for dialup connection) only. There are two separate packages for SSH1 and for SSH2.


7 hours

1,656 €

Work around with QPass password manager

About

QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.


7 hours

1,656 €

Work around with SSL Explorer

About

SSL-Explorer is a fully-featured, web-based SSL VPN server. This project is no longer actively maintained as the SSL-Explorer technology has now been acquired by Barracuda Networks, Inc.


7 hours

1,656 €

Fundamentals of IKEv2

About

Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryption algorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style


7 hours

1,656 €

Explore Is My Download Broken

About

a powerful multipurpose checksum utility

It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.


7 hours

1,656 €

Know J2MESafe

About

J2MESafe is an end-user Java application that stores sensitive information like passwords on mobile phones with strong encryption. Requires Java Micro Edition (J2ME) with MIDP-1.0, which is available on most current mobile phones.


7 hours

1,656 €

Know JCryptor

About

JCryptor is an encrypting tool based on the Caesar-cipher.

JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used by authorities to protect documents from unintentional reading. --UPDATE-- [25.01.14] Release 1.0 (final) -- Bugfixes [05.05.12] Release 0.2 -- implements polyalphabeticel substitution


7 hours

1,656 €

Explore JaBaCATs Java Basic C A Tools

About

The aim of this project is to create a set of basic java tools for developers who need Certificate Authority (CA) root certificates and user certificates signed by the CA.


7 hours

1,656 €

Explore JavaEncryptor

About

An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.


7 hours

1,656 €

Know Jay 39 s Secure Java Diary

About

A Secure Diary Program written in Java and using the bouncycastle JCE Cryptograpic library. It uses a combination of BlowFish and TripleDES (XORed) to encrypt Diary entries.


7 hours

1,656 €

Explore KeePassX

About

KeePassX is a cross platform port of the windows application "Keepass Password Safe". It is an OpenSource password safe which helps you to manage your passwords in an easy and secure way. It uses a highly encrypted database locked with one master key.


7 hours

1,656 €

Learn Kryptographie

About

Kryptographie is a student project to implement historic encryption methods. It has a linux style command line interface. This project will also include the notes for my talk I'll hold on cryptography in school. (in German).


7 hours

1,656 €

Basics of Leeter Clipboard Confuser

About

The Leeter is an easy-to-use and convinient program to easily write hardly understandable text. While this is mainly not the intention of normal chatters it may be a nice joke to try out on friends. Provides 5 different options to scramble up your text.


7 hours

1,656 €

Basics of Libgcrypt py

About

libgcrypt-py is a Python wrapper around the libgcrypt cryptographic library. It supports functionality/algorithms that are supported by libgcrypt, including Symetric Ciphers (3DES, AES, Twofish, Blowfish), Cryptographic Hashing (MD5, SHA1, RIPE-MD160), P


7 hours

1,656 €

Fundamentals of Mobile HelloWorld

About

Our plan is to portage “HelloWorld” to mobile devices and upgrade it with some specific mobile device features. Our main focus is to develop for Google Android. HelloWorld, a decentral network


7 hours

1,656 €

Learn Moria Secure Downloader

About

Portable tool for downloading files and automatic encryption

A portable download manager that automatically encrypts all downloads and lets user decrypt them and view with the correct password. Moria is lite and portable. Moria can download multiple files parallely. All downloads are automatically encrypted with a password either unique to each download or with a master password for convenience. Moria prompts to clean all traces when exiting and has a dedicated button to clean all traces, including partial downloads, encrypted downloads and decrypted downloads. Moria was made for fun using .NET framework by Srimal Fernando. It is free for personal and commercial uses. Srimal Fernando is not liable for any damage caused by using this application. Visit www.srimalfernando.com


7 hours

1,656 €

Learn My Text is Treasure

About

It is a simple password manager for your PC and Smartphone. It works like a text editor and uses a strong cryptography algorithm to generate the end file.


7 hours

1,656 €

Work around with N0m3nc Data Protection Software

About

Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..


7 hours

1,656 €

Fundamentals of ActiveLock

About

ActiveLock is an open-source copy protection, software licensing framework for all development enviroments supporting COM+ architecture. Core DLL available in VB2008 and VB6. Samples in C++, C#, Excel/Access VBA and keygens in PHP, ASP.NET available.


7 hours

1,656 €

Fundamentals of Global Platform for Java SmartCardIO

About

The project provides functionality to interface the SmartCardIO Java SDK library to Global Platform compliant smart cards, similar to globalplatform.sf.net. The difference is pure Java implementation and easy plug in to your SmartCardIO applications. This project is now more or less subsumed by Martin Paljak's continuation of the project at .


7 hours

1,656 €

Learn Open Hashtool

About

Comfortable hash-tool for texts and files

Open-Hashtool is an easy2use Qt based application, which can be used to calculate the hash (MD4; MD5; SHA-1; SHA-224; SHA-256; SHA-384; SHA-512; SHA3-224; SHA3-256; SHA3-386; SHA3-512) of texts and files. It's compatible with Windows and Linux. But Linux users need Qt5.1 or Wine (configuration: Windows Version <= Windows 2008) to run the Open-Hashtool. Please read the Wiki for compiling instructions.


7 hours

1,656 €

Work around with Hash Cracker

About

Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.


7 hours

1,656 €

Work around with FinalCrypt

About

FinalCrypt - Unbreakable One-Time Pad Encryption

Why FinalCrypt? 1. Most people choose Disk-Encryption as it's easier to unlock a whole drive, but Big-Brother or Malware can then also read all your files. Only use File-Encryption! 2. Most software uses recently broken AES encryption. 3. Soon The Shor's algorithm will instantly break all assymmetric encryption with Quantum Computers. 4. FinalCrypt uses Symmetric One Time Pad Encryption, which is the most unbreakable encryption there is. 5. FinalCrypt is the only "One Time Pad", OpenSource, Cross-Platform, (Bulk) File Encryption Software available.


7 hours

1,656 €

Work around with Password Keeper Generator

About

Free portable cross-platform graphical multi-user password manager

Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI - Graphical User Interface. PKG use crypto security random generator. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 - . Source - . Put a star on github please !


7 hours

1,656 €

Know DotNetOpenAuth

About

Formerly known as DotNetOpenId, this library brings easy and flexible OpenID, OAuth and InfoCard to the .NET platform. Official web site is at which includes source code downloads.


7 hours

1,656 €

Work around with Hash Codes

About

Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.


7 hours

1,656 €

Work around with NIA PHP ASP Encoder

About

NIA Encoder. The objective of this project is to provide a full featured multi-platform php and asp script encoder. It´s to protect your source code when creating commercial software with asp or php language.


7 hours

1,656 €

Work around with Ncr crypto

About

If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.


7 hours

1,656 €

Basics of NewAES2k Enigma

About

The NewAES2k is STRONG Crypto system which is a super-encipherment using many algorithms in composite, such as AES Rijndael, SERPENT, CAST, TWOFISH, RC6, SAFER+, ANUBIS, MARS, etc. With a var block 32 to 256 Chars & fixed 512 chars [4096-bit] Key.


7 hours

1,656 €

Learn Object Monitor

About

1.1

Object Monitor is an accessible and handy software that allows you to control the integrity of your files and registry keys. You can also set Object Monitor to automatically verify your applications and files on system start-up or at a preset time.


7 hours

1,656 €

Know OceanStore

About

OceanStore is an architecture for a global-scale file system which uses erasure coding, cryptography, and Byzantine agreement to provide available, highly durable storage in a peer-to-peer environment.


7 hours

1,656 €

Explore OhCrypt Encryption Tool

About

OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files


7 hours

1,656 €

Know Open SSTCP

About

The SSTCP protocol permits to establish a simple TCP/IP connexion across multiple AES secured channel. Simple but (/so?) secured and strong cryptographic methods are used. OpenSSTCP is the LGPL implementation of the SSTCP protocol.


7 hours

1,656 €

Learn PGP Individual UID Signer

About

PGP Individual UID Signer makes signing all the UIDs on all of the keys at a PGP Keysigning party much simpler. It prompts for verification fingerprints, and then signs each UID on each key separately and PGP/Mime encrypt-emails them to their recipient. NOTE: Developement now happens at GitHub:


7 hours

1,656 €

Learn PHP Web Toolkit

About

The PHP Web Toolkit enables the rapid development of multi-layered web applications and is designed to be easy to use, extensible, reliable, reusable, scalable and secure. It integrates with ADOdb, FCKeditor, kses, Libmcrypt, Libmhash and Smarty.


7 hours

1,656 €

Fundamentals of Papazulu

About

This is a program that creates one-time-pads, encodes plaintext files with the one-time-pads, decodes them, and creates number-stations-like sound files for message transmission.


7 hours

1,656 €

Know Papercrypt

About

This project aims at porting visual cryptography, which only works with transparent slides, to ordinary 80g/m^2 white paper. Please read the documentation before using the program.


7 hours

1,656 €

Learn PasswordMinder

About

It's hard remembering good passwords. Most people pick a one or two passwords and use them all over the place, which is a really bad idea, and we all feel bad about doing it. I got sick of feeling like this, so I wrote PWM to manage passwords for me. I f


7 hours

1,656 €

Discover Python3 GnuPGInterface GPG

About

Python3 GPG aka GnuPG Interface

Python3 port of Frank Tobin's Python GnuPGInterface incorporating the --keyring and --secret-keyring patch. "Python GnuPGInterface is meant to be a filehandle-concentrating Python interface to GnuPG, the GNU Privacy Guard. It has an API similar to the Perl module GnuPG::Interface" and identical to the Python2 module GnuPGInterface.


7 hours

1,656 €

Explore QFileHasher

About

A program to calculate and verify checksums of multiple files with wizard-like GUI. Supports 12 hashes: CRC32, MD2, MD4, MD5, SHA1, SHA2, RIPEMD,Whirlpool, ED2K, AICH, Tiger, TTH. Allows processing of nested directories and updating of checksum files


7 hours

1,656 €

Basics of RC4 NET

About

RC4.NET is a library that adds support for encrypting/decrypting using the symmetric RC4 algorithm in the .NET environment. The library is written in C# language, and performs equally well on both the Microsoft CLR and Mono platform.


7 hours

1,656 €

Learn Rainmaker

About

Rainmaker is a command line pseudo random number generator designed to work on multiple platforms. Rainmaker can be used produce cryptographically strong non-blocking output in many formats (Base-16, Alphanumeric, Numeric , and Alpha only modes).


7 hours

1,656 €

Know Random Front End

About

Random Front End is a Java front end that facilitates the use of batteries of statistical tests. The front-ended batteries are: ENT Battery, DIEHARD Battery, and NIST Battery. The project source is hosted at: . Post your questions to Random Front End mailing list at: .


7 hours

1,656 €

Know File Crypter

About

File Crypter is a Simple program, that is able to encrypt your files and decrypt them. A version of File Crypter is included as an example in the xCrypter Library and is called "ncrypter" which is short for "new crypter".


7 hours

1,656 €

Learn cppcrypto

About

C++ cryptographic library (modern hash functions, ciphers, KDFs)

cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon-128, SM4, Speck-128, Threefish, Twofish, and Rijndael (AES) with all block and key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. MAC functions: HMAC, Poly1305. Key derivation functions: PBKDF2, scrypt, Argon2 (Argon2i, Argon2d, Argon2id). Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm (CBC mode with HMAC). Check out the cppcrypto web site linked below for programming documentation and performance comparison.


7 hours

1,656 €

Discover cryptonit

About

A simple, secure and free tool for encryption and signature for Microsoft Windows and Unix. Part of the IDEALX "OpenTrust" suite (IDX-PKI, IMC, IDX-smbldap-tools...), it provides confidentiality and security through X.509-PKCS certificates. Languages:


7 hours

1,656 €

Explore TinyObfuscate

About

A tool for strings obfuscation tool in c++ by Michael Haephrati

When you need encrypt/obfuscate strings in your program so that they don't just show up with a strings or hex tool when your executable is examined, this tool can be useful. See Code Project article: by Michael Haephrati


7 hours

1,656 €

Learn LazLock

About

Free, cross platform, portable password manager.

The latest version of LazLock is at A free, lightweight, portable password manager for Windows & GNU/Linux that encrypts your data with 128 bit AES encryption. LazLock also includes a password generator which allows you to create more secure passwords. A plain text version of your data is never written to disk as all decryption is done in memory. LazLock is truly portable, no installation is required so it can be run from a USB drive. Unlike similar programs, there are no dependencies on the .NET Framework (Windows) or Mono (Linux) Easily Copy and Paste your login details into any website without having to manually type them out. Your passwords aren't shown on screen so you can use LazLock in front of others without compromising your security. Generate more secure passwords for the websites that you visit, you only need to remember one password to unlock them all.


7 hours

1,656 €

Work around with Mac GNU Privacy Guard

About

The goal of this project is to create a GnuPG front end for Mac OS X. To that extent, it will make installing GnuPG on OS X easier and provide inter application services to access GPG. Also, GPGME wrapper in ObjC will be done.


7 hours

1,656 €

Discover Simple Cipher Decoder

About

Decrypts and encrypts substitution, transposition and vigenere ciphers

Change log 1.01: 1)Error fixed on clicking solve and arrow buttons in the vigenere decoder 2)Error fixed when number of columns exceeds text length in substiution cipher 3)Can now handle variable block length when changing columns 4)Multiple identicle conversion values onn the frequency analysis page now not allowed This project is near its final stages but there may still be improvements to be made. If you could write some form of review or send me an email with advice I would greatly appreciate it. This is a series of three simple programs that will allow you to easily encrypt and decrypt text using any combination of substitutions, transpositions, vigenere ciphers or caesar shifts. The programs will not completely solve the ciphers for you haowever they will make it very clear to see how to solve them and ensure that there is no need for tedious manual work.


7 hours

1,656 €

Fundamentals of lazarcrypter

About

Simple file encryption utility with AES-256 for Windows 2000/2003/XP/Vista/7. Beside the standard enc/decryption operations has a Cut/Copy and Paste like interface.


7 hours

1,656 €

Fundamentals of SHA1 Implementation for Delphi XE2

About

Generate sha1 hash/digest from strings in Delphi

This is a Delphi unit that defines a TSHA1 class. It is simple to use and allows generating SHA-1 hash digests from Delphi strings according to . Unicode strings are encoded as UTF-1, which is what MySQL and several online tools I tested against do. So far, it seems to work. Currently waiting for permission form /www.bis.doc.gov before publishing the unit.


7 hours

1,656 €

Basics of SKIF Personal Password amp Data Sentinel

About

SKIF ppds - Personal Password and Data Sentinel- password manager and data security-tools. Single file (main database) encrypted Blowfish-cipher - for storage user acсounts and any text data. "Crypto" tools - and other


7 hours

1,656 €

Know SOLEid

About

SOLEid is a multi-purpose file protector that helps users to easily protect their files with different protection measures. The ones that are included till date are: password protection, hardware id lock, username and process protection.


7 hours

1,656 €

Discover Sample Privoxy Config File

About

This is a sample privoxy config file to replace the default privoxy config file. This will get you up and running anonymously quickly.


7 hours

1,656 €

Explore Scramble

About

“Scramble your social network data!” - With Scramble you can selective enforce you access control preferences for your content on social networks like Facebook or Twitter ...


7 hours

1,656 €

Basics of Secure BSD syslog RFC compliant

About

Syslog-sec, provides an open secure syslogd implementation based on (RFC) standards, including rfc3164 ("syslog") and the upcoming "syslog-sign" . Other extensions, will/can be added. More tools will be added, too


7 hours

1,656 €

Learn SecurePDF file encryption utility

About

This project aims to provide a desktop applet which secures any file by encapsulating it in a PDF document protected by RC4 128 bit encryption. This PDF file can be opened in any Adobe Reader after supplying the original password, making it easy to use.


7 hours

1,656 €


Is learning Cryptography hard?


In the field of Cryptography learning from a live instructor-led and hand-on training courses would make a big difference as compared with watching a video learning materials. Participants must maintain focus and interact with the trainer for questions and concerns. In Qwikcourse, trainers and participants uses DaDesktop , a cloud desktop environment designed for instructors and students who wish to carry out interactive, hands-on training from distant physical locations.


Is Cryptography a good field?


For now, there are tremendous work opportunities for various IT fields. Most of the courses in Cryptography is a great source of IT learning with hands-on training and experience which could be a great contribution to your portfolio.



Cryptography Online Courses, Cryptography Training, Cryptography Instructor-led, Cryptography Live Trainer, Cryptography Trainer, Cryptography Online Lesson, Cryptography Education