Requirements: 4.1 and up
Overview:
Cryptography is a figure, hashing, encoding and learning apparatus for all ages. I will likely make this application a main cryptography device around Google Play. I do this by itself as a leisure activity like my different applications as well, so advance could be moderate. Experiment with and see more!
Cryptography is a figure, hashing, encoding and learning instrument for all ages. I will likely make this application a main cryptography device around Google Play. I do this by itself as a side interest like my different applications as well, so advance could be moderate. Experiment with and see more!
★ Rate, give criticism and disclose to me what figures you need to see on future discharges ★
Giving a one star rating without reason or contact is inept!
Figures
• Scytale figure.
• Atbash figure.
• Caesar figure.
• Rot 1 - 25 figure.
• Affine figure.
• Rail Fence figure.
• Keyword figure.
• Beaufort figure.
• Templar Cipher with picture send highlight.
• Porta figure.
• Vigenere figure.
• Gronsfeld figure.
• Autokey figure.
• Bacon Cipher.
• Chaocipher.
• Playfair figure.
• Two-Square figure (as of now scramble).
• Tri-Square figure (as of now scramble).
• Four-Square figure (as of now scramble).
• BIFID figure.
• Hill Cipher with editable Matrix.
• Visual Cryptography.
• Enigma figure with saveable settings.
• RSA figure with custom keys
• Blowfish figure
• Twofish figure (cutting edge Blowfish)
• Rijndael (AES) figure
• SCrypt (Password-based key deduction work, in advance)
• Elliptic Curve Diffie-helleman AES, like Curve25519
• ChaCha figure (Salsa20)
• Cast5 figure.
• Cast6 figure.
Hashes
• Whirlpool 0/1/W (hashing)
• HMAC - SHA1/SHA256/SHA512 (progressed hashing)
• Adler32 (hashing)
• CRC - 8/16/24/64 (hashing)
• ELF-32 (hashing)
• FCS-16 (hashing)
• HAS-160 (hashing)
• MD-2/4/5 (hashing)
• RIPEMD - 128/160/256/320 (hashing)
• SHA - 0/1/224/256/384/512 (hashing)
• Tiger - T/T2/128/160 (hashing)
• Sum - 8/16 (hashing)
• Xor8 (hashing)
• GOST (hashing)
• BCrypt (hashing)
• PBKDF2 (hashing) with java|php illustration.
• SipHash hashing calculation.
Encodings
• Base64 encoder/figure.
• Morse code encoder with sound playback. Sound might pester.
• Braille encoder.
• Semaphore encoder.
• Tap Code encoder.
• ASL (American Sign Language) encoder.
• Pigpen encoder.
• Betamaze encoder.
Devices
• Crypto Messenger End-to-End scrambled informing. (My new application identified with this).
• User Puzzles.
• Checksum device for content and documents.
• Custom Hmac SHA 1/256 + SHA256 secret key verification process maker apparatus. (java|php illustrations)
• File Encryption Tool. Perused instructional exercise from connections which are incorporated into clarification see or in device question mark.
• Hash Cracker for MD5 and SHA1 hashes (work in advance).
• Password Strength checker apparatus.
• Frequency Analysis.
• ASCII table (8-bit/255) with inquiry work.
• Binary, Hexadecimal, Decimal and Octal table with inquiry work.
• Text <-> Binary converter.
• Decimal <-> Binary converter.
• Hexadecimal <-> Binary converter.
• Integer(number) <-> Binary converter.
• Pseudo Random Number Generator (PRNG) with clarification.
• AFSK (Audio Frequency-move keying) generator. Collector comes in future discharges.
• Steganography, encode unscramble device in manufacture.
• ASCII Font Art device.
- Includes connection to great online SHA1 saltine.
Others
• Kryptos design.
• Voynich original copy.
• Dorabella's letter.
• Beale figures.
• Ricky Mc Cormick archives.
• Zodiacs cryptograms.
Informing
• Experimental informing highlight utilizing RSA with custom keys and hilter kilter trade framework.
- I don't gather individual data and this application is not sending private key's anyplace. I'm depicting this part on connection beneath. If it's not too much trouble read it.
• Read how it functions and where information goes, from here: _http://www.nitramite.com/informing guide.html
Advertisement free buy
• Can be found from right corner menu.
• Press "Proceed" to make installment.
• if there should be an occurrence of application expulsion, gadget change or other case, utilize "Reestablish" catch to reestablish buy.
I came up short on depiction field constrain, rest of it is here: _http://www.nitramite.com/cryptography-description.html
WHAT'S NEW
➥ A1Z26 encoder.
➥ Encrypted QR codes highlight for testing.
➥ Argon2 hash in stripped down (sitting tight for server).
➥ Small fixes.
https://uploadocean.com/em776ffxne71 Mirror Link
https://dailyuploads.net/lv16l5r739m8
No comments:
Post a Comment