Home | 10% - Off! | New | VCL | DB-Aware | Tools | DB Tools | Apps | Samples | .NET | .NET DB-Aware | .NET Tools | .NET Samples | Kylix | Docs | Bold | Discussion | Sites | Tips | DPFL | Authors | Uploads | RSS | Store | Advertisement | About
Components

Buttons and Check Boxes
Bars and Status Bars
Dialogs
Edits, Memos
Forms
Graphics
Grids
Indicators and Gauges
Labels
List and Combo Boxes
ListViews and TreeViews
Menus
Panels
Shapes
Sizers, Scrollers, etc.
Tabbed Components
Effects and Multimedia
Misc. Effects
Sound Effects
Reports
Print VCL
Charts and Graphs
Communications
Internet
System
Files and Drives
Miscellaneous
Tools
LAN and WAN
Installation
Date and Time
Data Compress
Science
Security
Shareware
Crypting Other
User Rights
Hardware
Passwords
Other
Crypting
Component Packs
Property Editors
Experts, IDE etc.
Components > Security > Crypting  

Companies News:

FastReport FMX 2 released
FastReport FMX 2 released

For Windows and MacOS X - end-user report designer and preview, full sources.

    - For all versions of FireMonkey - XE to XE7

    - For Delphi and C++Builder

    - New advanced PDF export filter

    - FireDac support

    - And more...

Get more info here

Want to know more ?

 

1Crypt v.1.1SW 604 k 05 Sep 2006
By Atma Software. A quick and professional way to add strong encryption to your application. 1Crypt is a function library (DLL) which allows you to easily and securely encrypt files, strings, and buffers using 256-bit Advanced Encryption Standard (Rijndael) encryption. Using strong encryption in your application doesn't have to be complicated.
 
Partially restricted
Source: None
Price: $19
Exe-Demo Included
Download: CB1 CB2k6 CB3 CB4 CB5 CB6 D2 D2005 D2006 D3 D4 D5 D6 D7  Register NowHomepage

AES dll v.0.1FWS 3 k 28 Mar 2005
By LOCK Soluciones. This is an easy to use unit, that allows encrypting and decrypting files using the aes.dll, which implements the AES / Rijndael 128 bit cypher algorithm.

For beginner users, EncodeFile (secretkey, infile, outfile), and DecodeFile (secretkey, infile, outfile), are available for easy encryption/decryption.

For advanced users, the DLL API functions are declared in the interface section of the unit.

The DLL is not included, but can be downloaded and distributed free from the URL there.
 
Fully functional
Source: Included

Download: D5  Homepage

AMPRNG rev1.0 v.2010.07.23FWS 10 k 23 Jul 2010
By Alexander Myasnikov. AMPRNG (revision 1.0) - is simple, fast and probably secure pseudo-random number generator (byte-level, for software implementation) and symmetric stream cipher with 80-512 bit key and (optional) 80-512 bit initialization vector (IV).

Includes C and Delphi sources.
 
Fully functional
Source: Included

Download: C2k10 C2k6 C2k7 C2k9 CB6 D2005 D2006 D2007 D2009 D2010 D7  Homepage

AecRijndael v.1.16FW 1380 k 20 Jun 2001
By TSM Inc.. Delphi implementation of the new standard algorithm as chosen in the recent AES competition. Rijndael was chosen from a panel of 15 different algorithms from top crypto experts, and has received a large amount of attention from cryptoanalysts in recent months. As of now, this is our recommended algorithm for symmetric encryption. The algorithm is patent and royalty free.

Features:

  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for free installation is "vnsj289+4Sxfl4s04kjsp".
 
Fully functional
Source: On purchase/registration
Source Price: $99
Download: CB3 CB4 CB5 CB6 D3 D4 D5 D6  Gift for Torry. Thank You !Register NowHomepage

AecTwofish v.1.0FW 779 k 04 Jan 1999
By TSM Inc.. Twofish is the AES candidate from the team lead by Bruce Schneier, author of the famous Blowfish algorithm. Twofish is designed for maximum speed and flexibility and is set to become the leading algorithm for the next decade. One advantage of Twofish over other AES candidates is that the algorithm is not now, nor never will be under any patent restrictions

Features:

  • Offers encryption using 128, 192 or 256-bit keys
  • ECB, CBC, CFB and OFB modes of operation
  • Automatically handles all padding of the input
  • High-level functions for encrypting strings, files, buffers and streams
  • Additional mode for producing CBC-MACs (keyed hashes)
  • Also includes support for base64 encoding and decoding strings
  • Full native Delphi source code included in Corporate version.
Password for installation is "Vpz86f7IGvo8vp".
 
Fully functional
Source: On purchase/registration
Source Price: $99
Download: CB3 CB4 CB5 CB6 D3 D4 D5 D6  Gift for Torry. Thank You !Register NowHomepage

AesLib v.3.0FWS 146 k 15 Oct 2014
By J. Rathlev, D-24222 Schwentinental. AesLib.pas is a Delphi interface to the AES encryption routines from Brian Gladman.
  • Generating of a salt value
  • Password verification
  • Generating of authentication code
  • Encryption of a stream
  • Decryption of a stream.
  • 32 and 64 bit versions
The source code of a sample program is included.
 
Fully functional
Source: Included
Download: DXE2  Homepage

AllLib: Cryptography SW 1039 k 29 Aug 2010
By Vlad Stepanov. Asymmetric cryptography using certified products.

Requires AllLib units.

Features:

  • Microsoft CryptoAPI RSA, RSA 128 bits (integrated in Windows) and Crypto-Pro GOST 28147-89, GOST R 34.11/34.10-94/2001 support (pure CryptoAPI calls; eToken, ruToken usage allowed by installing their drivers and configuring Crypto-PRO):
    • private and public key generation, requesting and installing certificates (not require XEnroll.dll etc.); issuing certificates by standard Microsoft Certification Authority; reading/viewing certificate, certificate request fields (from binary data or Base64), adding certificate to CryptoAPI store (can be viewed from IE);
    • asymmetric data (string, file or stream) encrypting and decrypting by keys or installed certificates, with ability of key caching; encrypting and decrypting with multiple receivers using certificates, verifying by Certification Authority certificate(s);
    • signing and sign verifying by keys or installed certificates with ability of key caching; certificate can be inserted into signature, verified by Certification Authority certificate(s), reading certificate or it fiels from signature.
  • Signal-COM Message-PRO RSA or SKZI GOST 28147-89, GOST R 34.11/34.10-94/2001 trial-version support (with eToken, ruToken PIN dialogs):
    • asymmetric data (string or file) encrypting and decrypting with ability of key caching;
    • signing and sign verifying with ability of key caching, certificate can be included into signature or not; ability to read certificate or it field from signature;
    • keys and certificate request generation by calling Admin-PKI (with no replacing 00000001.key for disk carrier medias); installing certificates (with switching to key corresponding to certificate (for disk carrier medias); reading/viewing certificate or certificate request fields; converting old SKZI Crypto-COM 3.0 keys to new SKZI Crypto-COM 3.1 format; password changing.
  • Miscellaneous encoding and cryptographic routines, licensing object (based on CPU/BIOS/HDD information reading from hardware, realized on AllLib), AllLib object to work with symmetric algorithms and CRC/hashing using streams/files/string; object to call CryptoAPI/Crypto-PRO or Signal-COM Message-PRO from same methods, signing/signature verifying dialogs etc.

 
Partially restricted
Source: On request
Exe-Demo Included
Download: D5 D7  Homepage

Cartman block cipher 1.2 mK v.1.2mKFWS 4 k 03 Mar 2009
By Alexander Myasnikov. Full source code of Cartman block cipher implementation. Cartman-1.2mK encrypts 128 bit block with 256 or 512 bit key.
 
Fully functional
Source: Included
Download: CB2k6 CB2k7 CB4 CB5 CB6  Homepage

Cartman block cipher 2.DDP.5 v.2.DDP.5FWS 56 k 03 Mar 2009
By Alexander Myasnikov. Full source code of Cartman block cipher implementation. Cartman-2.DDP.5 encrypts 128 bit block with 256 or 512 bit key.
 
Fully functional
Source: Included
Download: CB2k6 CB2k7 CB3 CB4 CB5 CB6  Homepage

Cartman-2P block cipher v.2.PFWS 56 k 03 Mar 2009
By Alexander Myasnikov. Full source code of Cartman block cipher implementation. Cartman-2P encrypts 128 bit block with 384, 512 or 640 bit key. This is alternative version with 8x8 256-byte S-box tables and data-dependent permutation technique (DDP). Includes unique key-dependent operations technology enabled transformation rounds . Cipher inludes new round fuctions, has new structure, not used in Cartman family before this edition.
 
Fully functional
Source: Included
Download: CB2k6 CB2k7 CB3 CB4 CB5 CB6  Homepage

Cosmos Encryption Component v.0.01bC 275 k 15 Jul 2008
By Sercan Oz, Suat Alper Seyhan. Cosmos is a powerful 256-bit encryption system that you can encrypt texts in a file. You can use this encryption system for multiple uses. For example you can use Cosmos Engine for creating Log-in and access control dialogs for your applications.Cosmos is a dll based component which you can use with any programming language. You can call procedures and functions of Cosmos from the any programming environment that you design your application.

Demo includes a application which can be used as a Log-in dialog which stores encrypted passwords in a file called "password.dat" in an apllication directory.
 
Demo only
Source: On purchase/registration
Price: $9
Source Price: $250
Exe-Demo Included

Download: D2007  Homepage

CryptLib FWS 170 k 04 Aug 1998
By Duff Neill. Contains several Advanced Encryption Standard Canidate encryption algorithms in pure Object Pascal.
 
Fully functional
Source: Included
Exe-Demo Included
Download: D3  

Crypto Library v.1.0FWS 142 k 11 Mar 1996
By CRYPTOCard Corporation. Industrial Strength Encryption and Hashing routines for BP7 and Delphi compilers. If you need to protect data in your applications, then this is a good place to start. These are NOT the simple XOR routines found in most programming books. These are implementations of the best cryptographic algorithms available today.
 
Fully functional
Source: Included
Download: D1 D2  Homepage

CryptoBlackbox v.12.0.257FWS 1361 k 22 Aug 2014
By EldoS Corporation. CryptoBlackbox package of SecureBlackbox is a free collection of components and classes that offer wide range of both basic and sophisticated cryptography functions. This includes:
  • symmetric and asymmetric (PKI-based) cryptography
  • one-time password generation, cryptographic hashes and key derivation functions
  • X.509 certificate management and validation
  • certificate-based data encryption/decryption, signing and signature validation, timestamping
  • TSP and OCSP clients.
CryptoBlackbox is available in .NET, Java and VCL editions.

Unlike other freeware and open-source libraries, CryptoBlackbox comes with documentation, sample projects and support.

All CryptoBlackbox functions are included into SecureBlackbox, the comprehensive library for data protection, secure transfer and storage.
 
Fully functional
Source: Included

Download: CBXE CBXE2 CBXE3 CBXE4 CBXE5 D2005 D2006 D2007 D2009 D2010 D5 D6 D7 DXE DXE2 DXE3 DXE4 DXE5  Homepage

DCPcrypt v.2.0 Beta 3FWS 197 k 05 Sep 2006
By Dave Barton. DCPcrypt is an open source library of cryptographic components (encryption and hash algorithms). The idea behind DCPcrypt is that it should be possible to "drop in" any algorithm implementation to replace another with minimum or no code changes.

Algorithms implemented include: Blowfish, Twofish, Cast-128, Cast-256, DES, 3DES, Ice, Thin Ice, Ice2, IDEA, Mars, Misty1, RC2, RC4, RC5, RC6, Rijndael (the new AES), Serpent, TEA, Haval, MD4, MD5, RipeMD-128, RipeMD-160,SHA-1, SHA-256, SHA-384, SHA-512, Tiger.
 
Fully functional
Source: Included

Download: CB4 CB5 CB6 D2005 D4 D5 D6 D7  Hot Stuff!Homepage

Delphi Encryption Compedium Part I v.3.0FWS 678 k 31 Aug 1999
By Hagen Reddmann. A Compendium of various strong Encryption Algorithm and more... includes:
  • 40 Ciphers (IDEA, Blowfish, Twofish, DES, Square ...)
  • 23 Hashs (MD4/5, SHA/1, RipeMD, Havel, Tiger ...)
  • 5 Checksums (CRC32, CRC16-CCITT, CRC16-Standard ...)
  • 6 Text formats (MIME Base 64, XX/UU Coding, RFC1760 Six Word ...)
  • 2 Randoms (LFSR Linear Feedback Shift Register with variable Period upto 2^2032-1 ...)
  • with Ciphers can be encrypt in Modes CTS/ CBC/ CFB/ OFB/ ECB
  • Ciphers supports Message Authentication Codes in CBC-MAC/ CFB-MAC/ CTS-MAC
  • fast Implementation (i.e. Blowfish > 8Mb/sec, MD4 > 27Mb/sec)
  • full and easy object oriented
  • High optimized Assembler Core
  • Designtime Components to managing Cipher- and Hash- classes
  • Message Authentication Codes for all Hash's (Internet RFC2104-HMAC's ...)
  • Internet RFC2289/RFC1760/RFC2444 One Time Password Routines as Component
  • Many more...

 
Fully functional
Source: Included
Exe-Demo Included
Download: CB3 CB4 D2 D3 D4 D5  Hot Stuff!

Fundamentals Cipher v.4.07FWS 164 k 26 Aug 2011
By Fundamentals Library. Fundamentals Cipher Library allows encryption, decryption using the following ciphers:
  • AES
  • DES
  • RC2
  • RC4
  • RSA

 
Fully functional
Source: Included
Download: D2005 D2006 D2007 D2009 D2010 D5 D6 D7 DXE  Homepage

GPLib v.1.3.0.7FW 156 k 26 Apr 2010
By Richen Software. GPLib - interfaced library (GPLib.dll), containing procedures and functions to (de)encryption and digital signature data in your programs.

Currently library supports:

  • Algorithms (symmetric) encryption: Blowfish, Twofish, IDEA, Cast 128, Cast 256, RC2 (Rivest), RC4 (Rivest), RC5 (Rivest), RC6 (Rivest), Rijndael (AES Winner), Square, SCOP, Sapphire, Gost, TEA, TEAN
  • Hash algorithms: MD4, MD5, SHA, SHA 256 bit, SHA 512 bit, Sapphire, RIPE MD 128 bit, RIPE MD 256 bit, Haval 128 Bit, Haval 256 Bit, Whirlpool, Square, Snefru 128 Bit, Snefru 256 Bit
  • Algorithms conversion: Hex, MIME Base 32, MIME Base 64, PGP with PGP-Checksum

  •  
    Fully functional
    Source: None
    Exe-Demo Included
    Download: D2006 D5 D6 D7  Homepage

    GTEA Green TEA block cipher v.29.04.2009FWS 272 k 30 Apr 2009
    By Alexander Myasnikov. GTEA (Green TEA) block cipher is based on ideas of popular TEA ciphers and new Cartman cipher family. Cipher has 128 bit block, uses by default 512 bit key, runs on 32 full cycles. Cipher has nice speed - over 26 MBytes/second on AMD x2 3600 (Intel C compiled version).

    Speed is not key-dependent, key can be from 256 to 4096 bit, long keys makes better round subkeys.
     
    Fully functional
    Source: Included

    Download: CB2k6 CB2k7 CB3 CB4 CB5 CB6  Homepage

    HashCart-XT v.2010.07.27FWS 2 k 27 Jul 2010
    By Alexander Myasnikov. HashCart-XT is the secure hash function with 128 bit digest output, based on XTEA-3 block cipher as compression routine. Includes sample code for hashing binary file, block and string.
     
    Fully functional
    Source: Included
    Download: C2k10 C2k6 C2k7 C2k9  Homepage

    Hurricane cipher v.1.0FNCS 18 k 04 Jan 2005
    By Roman Ganin. Hurricane is the algorithm wich provides the strong 128 (and more) bit data encryption even better than such fammous algorithms as DES, AES (Rijndael), 3DES, Twofish and others, and much more faster. This implementation is easy to understand and it can be used to create file- or socket-relayed secure applications. The demo is included.
     
    Fully functional
    Source: Included
    Download: D1 D2 D3 D4 D5 D6 D7  Homepage

    KA Steganography Image v.3.0FWS 375 k 24 Apr 2007
    By Kiril Antonov. TKASteganographyImage component provides basic Steganography features of embeding text and binary data in a bitmap image.
    • Only windows bitmaps (*.bmp) are supported
    • Bitmap size is not altered so empty image and image containing data have same size.
    • Each LSB bit in the RGB triple of the bitmap contains embedded data so human eye cannot find the difference between empty image and image containing data.
    • Data is password protected.
    • Long passwords gives better protection of the data.
    • Embedding large files allowed via usage of multiple images
    WARNING: If you forget the password used to embed the data, data cannont be recovered in any way, becouse password is used as a base to encrypt the message XOR-ing password and the embedded data.

    Version 3.0 is not compatible with the previous versions of KASteganographyImage.
     
    Fully functional
    Source: Included
    Exe-Demo Included

    Download: D2005 D2006 D2007 D7  Homepage

    LZCipher v.1.0FWS 2 k 01 Apr 2007
    By Miguel Andrade. String encryption and decryption routines
     
    Fully functional
    Source: Included
    Download: CB1 CB2k6 CB3 CB4 CB5 CB6 D2005 D2006 D2007 D4 D5 D6 D7  Homepage

    LockBox v.3.2.0FWS 2359 k 19 Apr 2011
    By Turbo Power Software. LockBox 3 is a Delphi library for cryptography. Currently supported compilers include Delphi 2007 and Delphi 2010. It provides support for AES, DES, 3DES, Blowfish, Twofish, SHA, MD5, a variety of chaining modes, RSA digital signature and more...
     
    Fully functional
    Source: Included
    Download: D2007 D2010  Homepage

    MD5 FWS 4 k 29 Aug 2002
    By Dimka Maslov. The MD5 hashsum evaluation unit.

    This unit is a translation of the RSA Data Security, Inc. MD5 Message-Digest Algorithm described in RFC 1321. The unit contains functions to evaluate MD5 hashsum of a string, a file, a stream or any memory buffer, to convert a hashsum evaluation function result into a string of hexadecimal digits and to compare results of two evaluations.

    No other files nor dynamic libraries are required to compile and use this unit.
     
    Fully functional
    Source: Included

    Download: D5 D6  Homepage

    MD5-Karn rev1.0FWS 7 k 14 Jun 2010
    By Alexander Myasnikov. Karn-MD5 - Karn encryption cipher, symmetric block cipher based on hash function (MD5). Key size is 768 bit, block size is 256 bit.
     
    Fully functional
    Source: Included
    Download: C2k10 C2k6 C2k7 C2k9  Homepage

    MPC Coder v.2.0FWS 325 k 30 Nov 2006
    By MPC. MPC Coder - component used crypt algorytm by MPC.
     
    Fully functional
    Source: Included
    Exe-Demo Included
    Download: D1 D2 D3 D4 D5 D6 D7  Homepage

    Opensource strong ciphers pack v.2010.1GPLS 424 k 21 May 2010
    By Alexander Myasnikov. Opensource strong ciphers pack - collection of 19 Russian block ciphers and one stream cipher (cryptographic PRNG). All source codes are ready to use in application and were passed statical tests with nice results.
     
    Fully functional
    Source: Included
    Download: C2k6 C2k7 CB6 D2005 D2006 D2007 D6 D7  

    Optimized XTEA and VMPC ciphers v.0.1FWS 1 k 13 Feb 2009
    By Alexander Myasnikov. Full source code of optimized XTEA implementation (fixed edition with more nice shifts and rounds) and VMPC stream cipher (strong version of RC4).
     
    Fully functional
    Source: Included
    Download: CB2k6 CB2k7 CB3 CB4 CB5 CB6  Homepage

    PC1 Encryption Algorithm for Delphi v.1.0FWS 108 k 24 Feb 2003
    By Alexander Pukall. The source code for the PC1 encryption algorithm in Delphi, C, C++.

    The PC1 algorithm is a stream cipher secure against linear and differential cryptanalysis. You can use 128 or 256 bits keys.
     
    Fully functional
    Source: Included

    Download: D2 D3 D4 D5 D6 D7  Homepage

    PRGCrypto v.1.07SW 73 k 04 Dec 2002
    By PRGSoftware. The PRGCrypto Delphi component allows you to add strong cryptography to your application. This component is different from most other development libraries in that it is written in Delphi Object Pascal code and is full featured. There are no DLL's to tote around. This component links right into your application's executable. It is very easy to use.
     
    Trial (work while IDE is running)
    Source: On purchase/registration
    Price: $19.95
    Source Price: $49.95
    Download: D3 D4 D5 D6  Register NowHomepage

    SEAL 3.0 rev 1.0FWS 6 k 14 Jun 2010
    By Alexander Myasnikov. SEAL 3.0 - fastest symmetric stream cipher, very useful in software implementation. Here is my simple-to-read implementation of this cipher (key size 160 bit) in C and Delphi.
     
    Fully functional
    Source: Included
    Download: C2k10 C2k6 C2k7 C2k9 D2005 D2006 D2007 D2009 D2010 D7  Homepage

    SecureBlackbox Delphi v.12.0.258C 48924 - 151921 k 22 Aug 2014
    By EldoS Corporation. SecureBlackbox (VCL edition) is the comprehensive component collection for Internet security.

    SecureBlackbox is split to several packages:

    • PKIBlackbox - offers support for Public Key Infrastructure (X.509 certificates, certificate requests, certificate revokation lists, certificate storages etc.). PKIBlackbox supports Windows Certificates and Windows Certificate Storages. PKIBlackbox lets you manage certificates, stored on CryptoCards and USB CryptoTokens, via CryptoAPI.
    • PGPBlackbox - clean-room implementation of all PGP algorithms and standards with support for operations with PGP keys and keyrings
    • PDFBlackbox - clean-room implementation of PDF compression, encryption and signing specifications. Public Key (X.509 certificates) and symmetric encryption is supported. PKCS#1 and PKCS#7 signing is supported.
    • SSLBlackbox - client and server components that provide complete support for SSL2, SSL3 and TLS1. Unlike other components SSLBlackbox contains original implementation of all encryption algorithms and security protocols, used in the package, and doesn't depend on third-party libraries.
    • MIMEBlackbox - high-quality MIME components with own character conversion tables and own MIME parser/assembler. MIMEBlackbox offers support for S/MIME and PGP/MIME too. DomainKeys technology is supported.
    • SSHBlackbox - client and server components that provide support for SSH1 and SSH2 (including compression) and don't depend on third-party libraries.
    • SFTPBlackbox - client and server components that provide support for Secure File Transfer Protocol (SFTP, SSH-based protocol).
    • FTPSBlackbox - client-side component, which implements FTP (RFC 959) and FTP-over-SSL (RFC 2228) protocols for secure file transfer.
    • Many more...

     
    With Nag-Screen
    Source: On purchase/registration
    Download: C2k10 C2k7 C2k9 CBXE CBXE2 CBXE3 CBXE4 CBXE5 CBXE6 D2005 D2006 D2007 D2009 D2010 D6 D7 DXE DXE2 DXE3 DXE4 DXE5 DXE6  Gift for Torry. Thank You !Register NowHomepage

    Skipjack Encryption Algorithm Implementation FWS 10 k 22 Sep 1998
    By Dave Barton. A block cipher for the clipper chip program. 64bit blocksize, 80bit keysize. This implementation was developed totally outside of the USA and so it is free from export restrictions.
     
    Fully functional
    Source: Included
    Download: D1 D2 D3 D4  Homepage

    StreamFilters v.1.0FWS 90 k 01 Jul 1999
    By Cintra Software Engineering AS. Contains stream wrapper classes that allows the programmer to encrypt and decrypt streams with the encryption algorithms IDEA, Blowfish, RC5 and RC6, calculate checksums on streams with the algorithms 8, 16 and 32-bit byte-sum, CRC16 and CRC32, SHA-1 and MD5 (the last two are message digests), zLib compression (dll) and decompression on streams, persistent storage and streams, and Zip creation/reading (through zlib dll).

    Classes are built as new TStream descendant classes and can thus be used wherever normal streams can be used. They wrap around existing classes so that you can use them with whatever TStream descendant classes you might already be used.
     
    Fully functional
    Source: Included

    Download: D3 D4  Homepage

    StreamSec Tools v.3.0SW 4010 - 4137 k 01 Nov 2005
    By StreamSec. StreamSec Tools 3.0 is a complete rewrite of the entire StreamSec Tools code base, and does not share a single unit with StreamSec Tools 2.1. You can have StreamSec Tools 2.1 installed together with any of the StreamSec Tools 3.0 products.

    StreamSec Tools 2.1 was in some sense was a "too" comprehensive tool set. It contained everything from basic symmetric encryption to complex protocols such as SSL/TLS. Most customers were really only looking for a single security feature, and consequently they (a) paid for features they didn't really need and (b) had a hard time finding their way in the tool set. It also became increasingly hard to extend, since modularity and code size had not been design goals from the start.

    For this reason, StreamSec Tools 3.0 is a complete rewrite with a modular architecture that both allows us to sell just parts of it to fit specific customer demands, and allows us to extend it with new features without cluttering the API for every user each time we do so.
     
    Trial (work while IDE is running)
    Source: On purchase/registration
    Price: $599

    Download: D2005 D2006 D5 D6 D7  Register NowHomepage

    TDM5 v.1.0FWS 5 k 09 Sep 1999
    By Alexey Chubar. Component which perform data hashing with MD5 (Message-digest) algorithm.
     
    Fully functional
    Source: Included
    Download: CB3 CB4  Homepage

    TMD5 FW 728 k 05 Sep 2006
    By TSM Inc.. Delphi implementation of the MD5 message digest algorithm. MD5 provides a 128 bit cryptographically secure hash (Message Digest) of a given input. MD5 was one of the first generally accepted cryptographically secure hashes, and is still widely in use today.

    Features:

    • 160 bit hash length
    • Offers high-level functions for producing the hash of a string, file or stream
    • Full native Delphi source code included in Corporate (with source) version.
    Installation password is "JHHJGJudzfugUG5".
     
    Fully functional
    Source: On purchase/registration
    Source Price: $99
    Download: CB3 CB4 CB5 CB6 D3 D4 D5 D6  Register NowHomepage

    TSecHash v.0.03FWS 8 k 09 Jun 1998
    By Frank Kroeger. A component to generate a condensed representation of a message called message digest using the Secure Hash Standard-1 (SHA-1). SHA-1 has been developed by the NIST (National Institut of Standards and Technology) and been published in FIP-180 (Federal Information Processing Standards Publication 180). SHA-1 produces a 160-Bit output (the message digest) of a message or a data file. SHA-1 is called secure because it is computationally infeasible to find a message corresponding to a given message digest or to find a second (different) message which produces the same message digest.
     
    Fully functional
    Source: Included
    Download: D3  

    TWOPES v.1.0FWS 4 k 07 Feb 2009
    By Alexander Myasnikov. TwoPES - my ideas on improving PES (Proposed Encryption Standard) by extending key to 256 bit and using 16 rounds.
     
    Fully functional
    Source: Included
    Download: CB2k6 CB2k7 CB5 CB6  Homepage

    Threefish-512 block cipher v.0.3FWS 3 k 17 Feb 2009
    By Alexander Myasnikov. Threefish is tweakable block encryption algorithm designed by Bruce Schneier, Niels Ferguson, Stefan Lucks, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, and Jesse Walker. Threefish-512 has 512 bit key, 512 bit block and 72 rounds.
     
    Fully functional
    Source: Included
    Download: CB2k6 CB2k7 CB4 CB5 CB6  Homepage

    UnixCrypt v.1.2.2SW 228 k 25 Apr 2006
    By UtilMind Solutions. The UnixCrypt component is the ultra fast crypt implementation for Delphi/C++ Builder. It works exactly as crypt(key, salt) Unix comand (one-way encryption algorithm), which used to encrypt passwords in .htpasswd files in password protected Web directories.
     
    With Nag-Screen
    Source: On purchase/registration
    Price: $9
    Source Price: $17
    Download: CB1 CB2k6 CB3 CB4 CB5 CB6 D1 D2 D2005 D2006 D3 D4 D5 D6 D7  Download exe-demoRegister NowHomepage

    XTEA-1 v.2009FWS 1 k 28 Feb 2009
    By Alexander Myasnikov. My optimized implementation of XTEA-1 block cipher by Tom St Denis (128 bit key, 64 bit block). XTEA-1 is more secure edition of TEA block cipher with large block and large key.
     
    Fully functional
    Source: Included
    Download: CB2k6 CB2k7 CB3 CB4 CB5 CB6  Homepage

    XTEA-3 block cipher v.0.1FWS 5 k 31 Jan 2009
    By Alexander Myasnikov. My implementation of XTEA-3 block cipher by Tom St Denis (256 bit key, 128 bit block). XTEA-3 is more secure edition of TEA block cipher with large block and large key.
     
    Fully functional
    Source: Included
    Download: CB2k6 CB2k7 CB2k9 CB5 CB6 D2005 D2006 D2007 D2009 D3 D4 D5 D6 D7  Homepage

    aecDES FW 739 k 05 Sep 2006
    By TSM Inc.. Delphi implementation of the 'old faithful' of the block encryption algorithms. DES has a relatively short key length of 56 bits, but has stood the test of time to show that the quickest attack on DES is to search the entire keyspace for the correct key. DES is the most thoroughly inspected block ciphers.

    Features:

    • ECB, CBC, CFB and OFB modes of operation
    • Automatically handles all padding of the input
    • High-level functions for encrypting strings, files, buffers and streams
    • Additional mode for producing CBC-MACs (keyed hashes)
    • Also includes support for base64 encoding and decoding strings
    • Full native Delphi source code included in Corporate version.
    Password for installation is "bog08gG((ihiiH".
     
    Fully functional
    Source: On purchase/registration
    Source Price: $99
    Download: CB3 CB4 CB5 CB6 D3 D4 D5 D6  Register NowHomepage

    blins Crypt v.0.1FNCS 733 k 14 Oct 2008
    By Oleg Karakin. Crypting components, works with libmcrypt.

    Encrypt/Decrypt string, stream, dataset string fields.
     
    Fully functional
    Source: Included
    Exe-Demo Included

    Download: D2005 D2006  Homepage

    wodCrypt ActiveX Component v.1.3.1SW 2106 k 15 May 2007
    By WeOnlyDo Software. wodCrypt is a lightweight component that provides strong encryption for your applications. It provides support for most common crypto algorithms, such as:
    • AES
    • DES, TripleDES
    • Blowfish
    • Cast
    • RC2
    • RC4
    • RC5
    • UNIX crypt command
    for symmetric encryption and decryption,
    • RSA
    • DSA
    for making and verifying signatures, and
    • MD5
    • SHA1
    for creating hashes.
     
    Evaluation (time-limit)
    Source: On purchase/registration
    Price: $139
    Source Price: $289
    Download: CB1 CB2k6 CB2k7 CB3 CB4 CB5 CB6 D2005 D2006 D2007 D3 D4 D5 D6 D7  Register NowHomepage


    News from our Sponsors

      Delphi Books
    Various books for Delphi Developers: databases, graphics, video, iOS, Android, Windows and more and more and more... more... more...


      Coding in Delphi
    Coding in Delphi is a new programming book by Nick Hodges that covers a variety of powerful Delphi programming features and techniques including Generics, Interfaces, Exception, Handling, Anonymous Methods, Collections, RTTI, Enumerators, Attributes, Dependency Injection and Unit Testing more... more...

    Advertising on Torry's Delphi Pages

     

    Sort order
    Title
    Modification
    Publication
    Quick Search
    Exact phrase
    Title
    Description


    Advertising on Torry's Delphi Pages

    Guest Book
    Guest Book

    Subscribe to news in RSS 2.0 format!Subscribe to news in RSS 2.0 format!
    Bookmark and Share
    Up | Home | 10% - Off! | New | VCL | DB-Aware | Tools | DB Tools | Apps | Samples | .NET | .NET DB-Aware | .NET Tools | .NET Samples | Kylix | Docs | Bold | Discussion | Sites | Tips | DPFL | Authors | Uploads | RSS | Store | Advertisement | About
    Copyright  Torry's Delphi Pages Torry's Delphi Pages Maintained by Torry Team. Notes? Comments? Feel free to send...

    The Ultimate Source of Object Pascal and Delphi Programming Knowledge.

    Copyright © 1996-2014
    All trademarks are the sole property of their respective owners
    Privacy Policy