Any Windows Software - Shareware and Freeware Download Center for Windows

Top Downloads

New Downloads

Recent Searches

Latest Reviews


Monoalphabetic Substitution Ciphers

From Title
1.  Fragment substitution Estimation System - Utilities/Other Utilities
... This software is used for studies of comparative Molecular Evolution and Genomics. It can be used to obtain substitution estimates for coding sequences derived from a variety of different sequence data types from genomics projects. ...
 




Monoalphabetic Substitution Ciphers

From Short Description
1.  Cryptix for Mac OS - Internet/Tools & Utilities
... A complete solution for cryptography, encoding,ciphers and data encryption. You can also make numerous tasks and learn more about cryptography. The main interface is divided into 2 parts. One for the cryptography, the other one for the security, containing tools such as (Checksum, Network, Unix). You can also thanks to this software have any elements necessary for your security (Steganography, Passwords & System management).Key features: Aes 128 /256 bits, Ano, Blowfish 447, Cesar, ...
 
2.  showSSL - Utilities/Other Utilities
... ShowSSL is a tool for to test the strength of SSL servers by analyzing the ciphers supported. The report generated includes SSL protocol version and cypher supported, if sessionID is used and its timeout value, certificate chain e CA trusted by the serve ...
 
3.  InteliSSL - Utilities/Other Utilities
... A tool designed to determine all SSL/TLS ciphers and protocols supported by the target server. ...
 
4.  GodScrypt - Security/Encryption Tools
... GodScrypt is a portable email client that applies strong ciphers and hash algorithms to encrypt messages. Typical encryption yields a random sequence of meaningless characters. GodScrypt takes each character and assigns to it a random passage from the Holy Bible or the Holy Quran. It assigns meaning to otherwise random noise. The beautiful encoded message is undecipherable without an agreed upon passphrase or password. The program may also be used as a simple oracle, if we seek a meaningful ...
 
5.  Stealth Storage - Utilities
... Stealth Storage is a small and powerful file encryption tool. It encrypts files on-the-fly using well-known strong ciphers like BLOWFISH, RIJNDAEL etc. It is totaly invisible when installed. Nobody will even notice there are encrypted files on a computer. ...
 




6.  SubstDrive - Programming/Source Code
... API for work with substitution device (see DOS command "subst"). Win9x ONLY. For WinNT and Win2000 use native API call ...
 
7.  RegexTool - Utilities/Mac Utilities
... A lightweight and versatile search and replace tool using regular expressions pattern substitution.Written in ruby. Runs on the command line. ...
 
8.  INDISS - Utilities/Mac Utilities
... Initially intended merely as a digital substitution table for a school, some more ideas like displaying images and a message ticker have been added up to now. Also, plugins is a major aim. INDISS - Informational Display System for Schools ...
 
9.  nPhite - new PHITE PHP Site Framework - Utilities/Other Utilities
... The idea is to make with that it can be flexible in the acceptance of plugins and extensions, modifications, sources of data, substitution of modules and customizable. To give to it to an edition area on-line, upload of materials. ...
 
10.  stemplar - Utilities/Other Utilities
... stemplar is a Python template substitution module with handy loop control--- Command line usage example: $ cat stemplarExample.stm | python stemplar.py sHello=World sOut=Pest,Buda,Ob=da sInn=Left,Right--- brace3 usage: Repeat line, with [multiple] substitution; Can be used within brace4 block blahblah {{{sServer}}} blah {{{sPort}}} blah {{{{sCity4}}}} --- brace4 usage: Repeat block; Can be recursive {{{{sOut{{{{ ... {{{{sInn{{{{ blah {{{{sOut}}}}:{{{{sInn}}}} ... }}}}sInn}}}} ... }}}}sOut}}}} ...
 

Monoalphabetic Substitution Ciphers

From Long Description
1.  JBO Xia B Cipher - Security/Encryption Tools
... Xia B Cipher is an encryption software developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.Most traditional ciphers have a finite number of solutions consider a cipher system which uses an ...
 
2.  JBO Giova Cipher - Security/Encryption Tools
... Giova Cipher was developed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system which uses an alphabetic key ...
 
3.  JBO Catflap Cipher - Security/Encryption Tools
... JBO Catflap Cipher is an application developed to secure text and messages using classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which cannot be factored for security.Most traditional ciphers have a finite number of solutions ... consider a cipher system which uses an alphanumeric ...
 
4.  JBO Giova X Cipher - Security/Encryption Tools
... Giova X Cipher is an application especially designed to secure text and messages using classical cryptographic methods. What all ciphers (except a One Time Pad) have in common is that ultimately, they are breakable. The issue is the amount of time it would take to break them and whether such time would be well spent.Some modern methods of encryption rely on large numbers which cannot be factored for security. Most traditional ciphers have a finite number of solutions consider a cipher system ...
 
5.  JBO Zeta Cipher - Security/Encryption Tools
... Zeta Cipher is an application designed to secure text and messages using a modern implementation of neo-classical cryptographic methods. What all ciphers have in common is that ultimately, they are breakable.The issue is the amount of time it would take to break them and whether such time would be well spent. Some modern methods of encryption rely on large numbers which (so far) cannot be factored for security.Most traditional ciphers have a finite number of solutions consider a cipher system ...
 
6.  ASaturA - Multimedia & Design/Graphic & Design
... The usual way to demonstrate saturation in nucleotide sequences is to plot the fraction of differences between sequences against the evolutionary distance separating them. When the number of observed differences, for example for the fraction of third codon positions, no longer increases with increasing evolutionary distance, the sequence is said to be saturated. The same technique can be applied to amino acid (aa) sequences. We have developed a Java application called ASaturA that discriminates ...
 
7.  Frequency Analysis Utility - Utilities/Other Utilities
... A simple program that takes a cyphertext and analysis the occurrences of characters in order to make an educated guess as to their plaintext correspondence. Can be a devastating attack on substitution cyphers. ...
 
8.  Wsmake - Utilities/Other Utilities
... Wsmake is a make tool written in C/C++ for website development and maintenance. It features tag substitution, page ordering, and 'make'-like dependency checking. ...
 
9.  Kryptonic - Utilities/Other Utilities
... Kryptonic is a little tool for creating small substitution-permutation networks and offers the ability for attacking them with the methods of linear and differential cryptanalysis. All information and data can be saved as latex-src and pdf-document. ...
 
10.  CodeBreaker - Home & Personal/Misc
... CodeBreaker analyzes the letter frequencies, provides editable reference tables in 2 languages (for texts and written numbers) and thus makes it easier to break texts that have been encrypted with a substitution cipher. ...
 

Monoalphabetic Substitution Ciphers

Related Searches:

a - b - c - d - e - f - g - h - i - j - k - l - m - n - o - p - q - r - s - t - u - v - w - x - y - z - #
© 1997-2012 ShareMe Last Update: Wednesday, April 23, 2014 shareme | contact | notice | privacy | bookmark | link to us

Welcome to the ShareMe. Shareme is a dedicated internet portal bringing users the latest shareware & freeware from the world's best Software Authors. Shareme allows Shareware & Freeware Authors to submit their latest wares, so you the user are able to download their latest software updates all the time, after they are released! Always visit Shareme for your software needs.