LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.
mcrypt is a replacement of the old unix crypt(1) under the GNU General Public License. Unix Crypt(1) was a popular(?) file encryption program in unix boxes. It was based on the enigma encryption algorithm but it was considerable trivialized. Mcrypt uses some modern block encryption algorithms. It also has a compatibility mode with unix crypt and with solaris des(1). It supports several block algorithms like Blowfish, Twofish, DES, 3DES, 3-WAY, SAFER-SK64/128, SAFER+, LOKI97, GOST, RC2, RC6, IDEA and CAST-128/256. Read more
mdp is an acronym for "Mot de Passe", which means "password" in French. It wraps GnuPG for encryption and deals with all the small details of generating, managing and fetching your passwords.
MixIt is a crypting program which makes given data unreadable using mixing, shifting, coding etc. MixIt offers you some features for an unbreakable communication via email using one time pads and password books.
murk is an rsync friendly encryption that runs on the UNIX command line. Encrypt a file and backup the changes to an untrusted host.
NewPKI is a PKI based on the OpenSSL low-level API, all the datas are handled through a database, which provides a much more flexible PKI than with OpenSSL, such as seeking a certificate with a search engine.
This project provides an implementation of the NTRU public-key cryptosystem: NTRUEncrypt and NTRUSign.
OneKript is a front-end for the TrueCrypt disk encryption system. It was developed with the Kommander environment for KDE.
OpenSignature is a graphical environment for executing cryptographic operations using several kinds of smart cards. Read more
Openswan is an implementation of IPsec for Linux. It supports kernels 2.0, 2.2, 2.4 and 2.6, and runs on many different platforms, including x86, x86_64, ia64, MIPS and ARM.
Papazulu is a program that creates one-time-pads, encodes plain text files with the one-time-pads, decodes them, and creates number-station-like sound files for message transmission.
PEA (an acronym for Pack, Encrypt, Authenticate) is OS-portable archiving software that offers flexible security options (up to AES-EAX authenticated encryption), deflate based compression, and multi-volume spanning. It supports its own native .pea archive format for archiving and extracting, and also supports raw file splitting and joining. Peach is a graphical frontend for the PEA program.
PGPacket analyzes and displays the contents of a PGP-encrypted file (or anything that follows the OpenPGP spec), showing the nature and contents of each packet (of course, the contents of many packets may be encrypted, and PGPacket does not decrypt).
pgpforwarder is a Perl server that accepts plain-text mails for users and sends them out encrypted.
Phantom Cipher is a block cipher that has a block length of 128 bits, and a key size of 256 bits.
ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules). In addition, database with files etc. could be encrypted with Blowfish algorythm and files that are protected could be store at any secure/bastion host to later replace them.
Password Storage and Retrieval System securely encrypts passwords, and then uses them to obtain an AFS token before your job starts, and keep refreshing the token for the length of your job so that your AFS token does not expire in the middle of your run.
Publimark is a command line tool to secretly embed text in an audio file. Like cryptography, it uses a pair of keys: the public one can be shared, whereas the private one must be kept secret. Anybody can send a steganographic message, but only the private key owner will be able read it. Marked audio files are still playable.
PyCrypt is a simple command line program that encrypts and decrypts files using the AES standard and a password given by the user.
pySteg is a simple GNOME GUI wrapper for steghide for GNU/Linux, inspired by the Steghide UI for Windows.
Qccrypt is a tiny graphical frontend for the ccrypt encryption/decryption commandline program. The file to encrypt/decrypt can be passed as a parameter on the commandline.
RC-Crypt is an easy to use command line program that encrypts your data. It uses the rc5 algorithm, with 128 bit block size, which has proved almost impossible to crack.
A slightly reduced strength bulk encryption. In exchange for the reduced strength, you get the ability to rsync the encrypted files, so that local changes in the plaintext file will result in (relatively) local changes to the cyphertext file.
The Ruby Crypt library is a Ruby implementation of a number of popular encryption algorithms. Block cyphers currently available include Blowfish, GOST, IDEA, and Rijndael (AES). Cypher Block Chaining (CBC) has been implemented. Twofish, Serpent, and CAST256 are planned for release soon.
sbd is a Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. sbd features AES-CBC-128 + HMAC-SHA1 encryption (by Christophe Devine), program execution (-e option), choosing source port, continuous reconnection with delay, and some other nice features. Only TCP/IP communication is supported.
Scylla Charybdis lets you get a data odyssey done with the help of two small monsters. It's easy to use, utilizes SSL (encryption), LIBZ (compression), and simple password protection.
ScramDisk for Linux (SD4L) is an on-the-fly encryption system which hides complete file systems within encrypted regular files called containers. It is a suite of Linux tools and a graphical user interface (GUI) which allow the creation of, and access to ScramDisk encrypted container files. Read more
Seahorse is a GNOME application for managing encryption keys. It also integrates with nautilus, gedit and other places for encryption operations. With seahorse you can create and manage PGP/SSH keys, publish and retrieve keys from key servers, and cache your passphrase. Read more
The seccure toolset implements a selection of asymmetric algorithms based on elliptic curve cryptography (ECC). In particular it offers public key encryption / decryption, signature generation / verification and key establishment.
Shade (Steganographically Hide and Analyze Data Entries) is a versatile and feature-rich program that was designed to analyze and manipulate LSBs (least significant bits) of files, attempting to either hide or pluck out data.
sharesecret splits a secret into parts given a threshold t, such that at least t parts are needed to reconstruct the secret.
Shasplit takes a large data block, splits it into smaller parts, and puts those into an SHA-based content-addressed store.
SQLCipher is an open source SQLite encryption extension. It provides transparent, full database, AES-256 encryption with minimal performance impact. SQLCipher works by encrypting database pages before they are written to storage and decrypts them on read so encryption functionality is completely separate from the application.
ssmart is a little Perl script to store a secure shell identity/cfs passwords blowfish-encrypted to a smartcard.
Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color-respectively sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests. Read more
Stego is a simple encryption and decryption program that hides data inside BMP files.
SteGUI is a graphical front-end to Steghide. It lets users view the images and play the sounds that Steghide allows as cover files, and command the program all with one tool. It also embeds a simple text editor to manage text payload files.
strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.
TEA Total is a very small 128 bit private key based encryption/decryption system which uses the block variant of TEA (Tiny Encryption Algorithm).
Tkccrypt is a simple frontend for editing small text files encrypted with Peter Selinger's ccrypt.
TkPGP intends to completely eliminate need to access command- line interface of PGP for UNIX. Currently most of casual activity such as signing, encrypting and decrypting is done in GUI. Key management remains a domain of command line for the time being.
Tomb is a system for easy encryption from the hashes of the dyne:bolic nesting mechanism.
TrueCrypt is on-the-fly disk encryption software that can create a virtual encrypted disk within a file and mount it as a real disk. It can also encrypt an entire hard disk partition, or a storage device such as USB memory stick. It supports plausible deniability. Read more
Truecrypt Installer for Debian
Truecrypt Installer for Debian helps to get Truecrypt running with a minimum of effort under Debian-based Linux systems (Debian and Ubuntu are officially supported). Truecrypt is Open Source disk encryption software which uses a concept of containers to store encrypted data. The containers (or volumes) can be read transparently under Linux and Windows. The installer creates installable *.deb packages from the Truecrypt sources, and those debs can be used in turn to activate Truecrypt.
Tunnel Vision creates an encrypted Virtual Private Network, or VPN, between two Tunnel Vision-capable sites on the Internet.
UsbCryptFormat is a graphical user interface (GUI) for the encryption of USB flash drives or external hard drives. It allows the user to reformat a USB flash drive, an SD card, or an external hard drive with an encrypted filesystem very easily and without the danger of destroying data on an internal hard drive because of incautious handling of device names.
Virtual Ideal Functionality Framework
Virtual Ideal Functionality Framework is a framework for creating efficient and secure multi-party computations (SMPC). Players, who do not trust each other, participate in a joint computation based on their private inputs. The computation is done using a cryptographic protocol which allows them to obtain a correct answer without revealing their inputs. Operations supported include addition, multiplication, and comparison, all with Shamir secret shared outputs.
Wisecracker is a high performance distributed cryptanalysis framework that leverages GPUs and multiple CPUs.
XML Security Suite
XML Security Suite provides security features such as digital signature, element-wise encryption, and access control to Internet business-to-business transactions.
Yavipind is a secure tunnel aka 2 peers securely forwarding packets toward each other. It forwards any kind of packet (IPv4, IPv6 or other) sent over the virtual point-to-point device (e.g. tun0). It fully runs in linux userspace.
Prev 50 Next 50