CEX is one of the worlds most powerful encryption tools. It is a state of the art document encryptor, loaded with security tools and safe guards combined to protect your sensitive data. There are three strong encryption algorithms included in CEX, all based on the Rijndael encryption algorithm used in AES. RDX uses an extension of the Rijndael encryption algorithm, the same one used in the AES standard. What we have done is to extend Rijndael so that it now accepts a longer key length (512 bits). The extended key length provides more security against attacks that attempt to brute force the key, and also adds eight more rounds to the diffusion algorithm. The increased number of rounds brings the total from 14 rounds with a 256 bit key, to 22 rounds with the 512 bit key size. These added passes through the diffusion algorithm further disperse the input through row and column transpositions, and XOR's with a longer rounded key. RSX is a hybrid of the Rijndael and Serpent ciphers. Most encryption algorithms can be thought of as having two main parts; The key scheduler, and the diffusion algorithm. The key scheduler takes a small amount of initial entropy, (the user key), and expands it into a larger working array that is used in the diffusion algorithm. Rijndael has what is considered a weak key scheduler; it relies on a strong diffusion algorithm to thoroughly whiten the input data. One of the strongest key schedulers is a part of the Serpent algorithm. From the authors of Serpent: "Serpent has none of the simpler vulnerabilities that can result from exploitable symmetries in the key schedule: there are no weak keys, semi-weak keys, equivalent keys, or complementation properties." The result is the best parts of both ciphers have been combined into a hybrid that can encrypt using up to a 512 bit key length. DCS is a type of stream cipher that uses two Rijndael streams in an AES configuration; that is a 256 bit key and 128 bit block size. It creates two AES SIC (Segmented Integer Counter) streams using two unique keys and 128 bit counters. These two independent streams are combined using a logical exclusive OR operation (XOR) to produce a pseudo random output stream. That stream is than XOR'd again with the input data to produce the cipher text. DCS uses a single 768 bit key to generate the random stream, making it invulnerable to brute force attacks. It is also automatically parallelized, designed to run at high speed on multi processor systems.
V-Pad V is for Vernam
A Vernam cipher also called a One Time Pad (OTP), or the perfect cipher, is a cryptographic algorithm where plaintext is combined with a random key. It is the only existing mathematically proven unbreakable form of encryption. First patent
Chiron Fortress Chiron Fortress 1.0.5 is a simple application which aims to simplify the process of encrypting important files to keep their contents hidden from those who should not be viewing them.
Chiron Fortress uses a familiar explorer type interface to navigate
DRM-Plus Encrypter For WMV/WMA/ASF DRM-Plus Encrypter For WMV/WMA/ASF is designed to encrypt .wmv, .wma, and .asf media files; the encrypted media files can only be played after obtaining the playback license provided by your Web server. You can set the following playback rights for your co
USBSoftProtect USBSoftProtect can provide solid security for your files. This software allows you to easily transfer the created .exe with encrypted data via any USB memory device from one PC to another. USBSoftProtect is compatible with any USB flash drive (even USB 1.0
Windows 2000 Group Policy File Vulnerability Patch This update resolves the "Opening Group Policy Files for Exclusive Read Access Blocks Policy Application" issue affecting Windows 2000 domain controllers and is discussed in Microsoft Security Bulletin MS02-016. Download it to prevent an attacker from bloc
Odisef Remember Pad This program is a security software which encrypts your textual data. We assure you that there is no crack available for this software that can break the encryption. Moreover it comes with a nice and simple GUI. You can save your frequently used passwords
BizCrypto for SQL Server BizCrypto for SQL Server lets you secure the data, which is stored and transferred via your MS SQL Server Integration Services scripts.
When you need to transfer the data securely via SFTP, FTPS or AS2 protocol, you will find the appropriate connection
SecEx MD5+ Digest From the developer: ""This free secure hash signature utility allows you to create and verify MD5, SHA-1 and RIPE-MD 160 message digests on one or multiple files. SecExMD5+ features a graphical wizard style interface, full integration with Windows expl
SpyBuddy SpyBuddy is the spy software and computer monitoring product for monitoring spouses, children, co-workers, or just about anyone else! SpyBuddy allows you to monitor all areas of your PC, tracking every action down the last keystroke pressed or the last fil
CryptArchiver With CryptArchiver, you can hide, encrypt, and password-protect your important files and folders. Secure data with CryptArchiver. All you do is drag-and-drop your important files and folders into an encrypted drive. CryptArchiver is encryption software for
Password Generator 2004 Diplodock Password Generator 2003 is a professional random password generator that can produce 100,000s of passwords, serial numbers, registration codes, masked strings, usernames, and more in seconds. Having features like built-in dictionaries, customizab
Supported Operating Systems:
Windows 7 |
Windows 8 |
Comments on CEX:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10