CEX for Windows Free Download in Encryption & Decryption Software Tag

Drivers  Disk & File Software  Video Players  Graphic Design Software  Security Software  CAD Software  Educational & Science Software  Database Management Software  Digital Photo Software  Video Software  Audio Software  Communication Software  Games  3D Modeling Software  Business & Office Software  Wireless Networking Software  System Utilities  Developer Tools  Networking Software  Privacy Software & Access control  Internet Software 
Search by Category
Audio Software
Business & Office Software
CD & DVD Software
Communication Software
Desktop Enhancements
Developer Tools
Digital Photo Software
Disk & File Software
Educational & Science Software
Entertainment & Hobby Software
Graphic Design Software
Home & Family Software
Internet Software
iTunes & iPod Software
Networking Software
Productivity Software
Security Software
Antivirus Software
Corporate Security Software
Encryption & Decryption Software
Firewall Software
Internet Security Software Suites
Password Managers
Privacy Software & Access control
Security Monitoring Software
System Utilities
Travel & Navigation Software
Video Software
Web Development Software


Version: 1.0
Platforms: Windows

Categories: Security Software
Upload Date: 27 Dec 14
Developer: Vtdev.com
Distribution Type: Shareware
Price: 29.95 $
Downloads: 5
File Size: 2043 Kb

Rating: 0.0/5 (Total votes: 0)


CEX is one of the worlds most powerful encryption tools. It is a state of the art document encryptor, loaded with security tools and safe guards combined to protect your sensitive data. There are three strong encryption algorithms included in CEX, all based on the Rijndael encryption algorithm used in AES. RDX uses an extension of the Rijndael encryption algorithm, the same one used in the AES standard. What we have done is to extend Rijndael so that it now accepts a longer key length (512 bits). The extended key length provides more security against attacks that attempt to brute force the key, and also adds eight more rounds to the diffusion algorithm. The increased number of rounds brings the total from 14 rounds with a 256 bit key, to 22 rounds with the 512 bit key size. These added passes through the diffusion algorithm further disperse the input through row and column transpositions, and XOR's with a longer rounded key. RSX is a hybrid of the Rijndael and Serpent ciphers. Most encryption algorithms can be thought of as having two main parts; The key scheduler, and the diffusion algorithm. The key scheduler takes a small amount of initial entropy, (the user key), and expands it into a larger working array that is used in the diffusion algorithm. Rijndael has what is considered a weak key scheduler; it relies on a strong diffusion algorithm to thoroughly whiten the input data. One of the strongest key schedulers is a part of the Serpent algorithm. From the authors of Serpent: "Serpent has none of the simpler vulnerabilities that can result from exploitable symmetries in the key schedule: there are no weak keys, semi-weak keys, equivalent keys, or complementation properties." The result is the best parts of both ciphers have been combined into a hybrid that can encrypt using up to a 512 bit key length. DCS is a type of stream cipher that uses two Rijndael streams in an AES configuration; that is a 256 bit key and 128 bit block size. It creates two AES SIC (Segmented Integer Counter) streams using two unique keys and 128 bit counters. These two independent streams are combined using a logical exclusive OR operation (XOR) to produce a pseudo random output stream. That stream is than XOR'd again with the input data to produce the cipher text. DCS uses a single 768 bit key to generate the random stream, making it invulnerable to brute force attacks. It is also automatically parallelized, designed to run at high speed on multi processor systems.


10-day trial

Like it? Share with your friends!   



Other Windows Software of Developer «Vtdev.com»:

V is for Vernam A Vernam cipher also called a One Time Pad (OTP), or the perfect cipher, is a cryptographic algorithm where plaintext is combined with a random key. It is the only existing mathematically proven unbreakable form of encryption. First patent

» show all

Similar Applications:

MD5 CheckerMD5 Checker
MD5 Checker 2.31 - 18th February 2007. Utility to verify downloads with an MD5 checksum from the makers of MidWavi Pro (it's only 100K and this is a true Windows program). Tiny (100K unzipped) full Windows program to verify (and create) MD5 checksums (that
GiliSoft CD DVD EncryptionGiliSoft CD DVD Encryption
With GiliSoft CD DVD Encryption's help, your burning software can burn password-protected and encrypted discs. It supports most of the burning softwares, if you have a recorder and a burning software, and you want to burn an encrypted disc, please use this
Text Encryptionator (64-bit)Text Encryptionator (64-bit)
Text Encryptionator (64-bit) uses a digital adaptation of the One Time Pad encryption technique to encrypt messages. One Time Pad is considered one of the only unbreakable encryption techniques in existence. Text Encryptionator (64-bit) can encrypt and dec
miniLock lets you encrypt any file quickly and easily, and share it securely with any friend that has a miniLock ID. Open miniLock and enter your email and passphrase. miniLock uses your passphrase to generate a miniLock ID. You can then send your miniL
BitCleaner easily removes your Internet history, unwanted files, and any other personal information your computer has stored. It uses a unique, highly intelligent method to remove this information without leaving a trace. BitCleaner completely removes file
Eureka Public KeyEureka Public Key
Public key version of the powerful Eureka Encryption technology. Create and distribute public keys and use them to encrypt/decrypt files. Very easy to use.Requirements:Windows 95/98/NT/2000
imlSoft Folder Guard ProfessionalimlSoft Folder Guard Professional
It is s a power file encryption software program that can quickly and safely lock and hide files, folder,and drives,and it can use 256-bit AES encryption (Encryption Standard Adopted by the US Government) to protect your files located on HDD drive or any p
Have you ever thought that you can hide a file or a folder behind another file? If you have thought about it before but you don't know how to work that up, Veil will do the job for you. Veil not just only hide your file or folder, it also encrypted it and
Solid EncryptionSolid Encryption
This gives you access to unbreakable OTP encryption. You can encrypt to and from files or directly to the clipboard. Paste cipher-text directly into text documents. Generate real random keys with no more than a radio and a sound card. One-Time Pad (OTP) en
Provides interactive User Interface for defining and managing encryption tasks. Supports AES, TripleDES, and DES encryption standards. Can encrypt either files or standalone strings. Encryptions can either be to binary or base64 Text encoding. Keys can be

Supported Operating Systems:
Windows 7 |  Windows 8 | 

Comments on CEX:

Comments not found



Enter text from image below:

Turn on images!


Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10

© Pantich 2016 all rights reserved